IT Management  >   Systems Operations  >   Security  >  

Information Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
Information Security Threats Reports
 
Top 5 IT Challenges Facing Canadian Businesses
sponsored by Rogers Communications, Inc.
WHITE PAPER: Business success increasingly hinges on a company's ability to use new technology to drive innovation and improve operational efficiency. But IT leaders say their ability to advance the business is challenged. Read this brief white paper to learn about the IT challenges facing businesses today and why IT departments are wasting 200 hours per week.
Posted: 25 Mar 2016 | Published: 08 Mar 2016

Rogers Communications, Inc.

2016 Cyberthreat Defense Report
sponsored by Citrix
ANALYST REPORT: This detailed 2016 cyberthreat defense examines the current and planned deployment of countermeasures across the globe to give you a better understanding of how your security perceptions, concerns, and defenses stack up against your peers.
Posted: 22 Apr 2016 | Published: 22 Apr 2016

Citrix

What to Look for in Multifactor Authentication Tools
sponsored by SearchSecurity.com
EBOOK: In our threat-laden environment, multifactor authentication tools are a critical defense. Access this resource and learn the latest about MFA technology, how to compare MFA tools and select the right product for your organization.
Posted: 21 Mar 2016 | Published: 05 Jan 2016

SearchSecurity.com

Building a Cloud Network: What Does It Mean?
sponsored by MASERGY
EGUIDE: Building a network that supports cloud computing appears, for many engineers, to be a path paved by fat pipes. But that's not always the case. Find out what it means – and what it will take – to build a cloud network for your business.
Posted: 25 May 2016 | Published: 19 May 2016

MASERGY

CIS Critical Security Controls - Accelerated & Simplified
sponsored by AlienVault
WHITE PAPER: The CIS Critical Security Controls (CSCs) provide 20 controls that organizations of any size can use to improve their security posture and reduce the risk of cyber threats to critical assets, data, and network infrastructure. This document describes how the AlienVault USM platform maps to each of the CIS CSCs.
Posted: 04 Apr 2016 | Published: 23 Mar 2016

AlienVault

What Are the Best Ways to Improve SMB Security?
sponsored by CDW
EGUIDE: Expert Mike O. Villegas advises SMBs on security defenses. Uncover control measures to improve security, such as: defining data breach notification requirements, using firewalls, antivirus software, and up-to-date patches, and more.
Posted: 19 May 2016 | Published: 18 May 2016

CDW

Managing Critical Security Controls
sponsored by Splunk
WHITE PAPER: In this e-book, you'll learn what security professionals find suitable to support access controls. Discover ways to verify incoming data, execute the requirements needed, and support human activities associated with a control.
Posted: 27 Apr 2016 | Published: 27 Apr 2016

Splunk

A Cloud Security Primer
sponsored by Intel Security
WHITE PAPER: With different cloud models available (public, private, hybrid) there's a lot of confusion around how to secure them and what methods work best for each model. No matter how far along you are with the cloud or how simple or complex your cloud deployment, access this white paper now so you can proactively prepare to repel inevitable attacks.
Posted: 06 May 2016 | Published: 29 Apr 2016

Intel Security

Report: Modern Threat Intelligence
sponsored by IBM
WHITE PAPER: The complexities of doing business at scale, both strategic and technical, create barriers in preventing breaches. Uncover ways to focus on user education and systematic protocols for operating a strong risk assessment program, allowing you to overcome these barriers.
Posted: 15 Mar 2016 | Published: 29 Feb 2016

IBM

The Impostor in the Machine: Understanding the Motives and Mayhem Behind Impostor Emails
sponsored by Proofpoint, Inc.
WHITE PAPER: In this white paper, learn how hackers evade current email filtering security strategies to dupe high-level employees and steal data. Read on to learn how next-gen email security strategies enable you to quarantine imposter emails before they reach the inbox and discover several proven defense strategies.
Posted: 28 Apr 2016 | Published: 28 Apr 2016

Proofpoint, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement