IT Management  >   Systems Operations  >   Security  >  

Internet Threats

RSS Feed    Add to Google    Add to My Yahoo!
Internet Threats Reports
 
Discover True Advanced Threat Detection
sponsored by Microsoft
RESOURCE: In this infographic, explore a service that enables you to detect, investigate and respond to complex targeted attacks on your networks.
Posted: 18 Sep 2017 | Published: 18 Sep 2017

Microsoft

Create A Simpler, Secure, more Agile Network
sponsored by Nokia
WHITE PAPER: Uncover the immediate benefits of a virtualized software-based approach that makes it easier to enable essential network security elements. These include authentication, authorization and accounting, diameter routing agents and session border controllers.
Posted: 28 Sep 2017 | Published: 28 Sep 2017

Nokia

The Smart, Secure Cloud for India: Learn How Google Cloud Infrastructure Keeps Your Data Secure
sponsored by Google Cloud
WHITE PAPER: Google Cloud's Mumbai cloud region provides faster data transfers and reduced latency to the India region. Download the whitepaper for a look under the hood of Google's infrastructure security, and explicit detail on the process we go through to build and maintain GCP regions. Download the report and find out more now.
Posted: 25 Sep 2017 | Published: 25 Sep 2017

Google Cloud

Research Report: IoT DDoS Attacks Show the Stakes Have Changed
sponsored by Arbor Networks
WHITE PAPER: How can IT network pros defend against DDoS attacks on IoT devices? In this white paper, uncover the recommendations on how to design your DNS infrastructure for stronger security against botnets. Then find out how Forrester Research believes the business technology ecosystem is changing.
Posted: 19 Oct 2017 | Published: 19 Oct 2017

Arbor Networks

Security Analytics: Putting Together an Effective Incident Response Plan
sponsored by Cisco Systems, Inc.
WHITE PAPER: In this white paper, learn how to create and implement an effective incident response plan to detect security breaches and react before attacks wreak havoc on your network and reputation.
Posted: 20 Sep 2017 | Published: 20 Sep 2017

Cisco Systems, Inc.

Analytic Stories or; "How I Learned to Stop Worrying and Respond to Threats"
sponsored by Splunk
WEBCAST: This webcast is designed to help you make threat analytics a reality, so you can stop worrying and start fighting back. Watch now to learn how to develop analytical stories, the 4 types of searches you can complete within said stories, and more.
Posted: 13 Oct 2017 | Premiered: Sep 26, 2017

Splunk

WhoDunIt? The Mystery of the Advanced Persistent Threat (APT)
sponsored by Kaspersky Lab
WHITE PAPER: For companies that experienced a targeted cyberattack, 68% report data loss or exposure as a direct result of the attack. Advanced Persistent Threats (APTs) are even more disconcerting. Learn how to protect your company's sensitive information from APT attacks, and discover real-world examples of companies who used Kaspersky for attribution.
Posted: 01 Sep 2017 | Published: 01 Sep 2017

Kaspersky Lab

IT Managers Survival Guide for Moving Your Fax Infrastructure to the Cloud Webinar
sponsored by J2 Cloud Services
WEBCAST: In this webinar, listen to Michael Flavin, Senior Product Marketing Manager, j2 Cloud Services about common misconceptions about cloud computing and the 10 key questions your organization should be asking when evaluating cloud providers.
Posted: 14 Sep 2017 | Premiered: Jun 4, 2015

J2 Cloud Services

"The Next WannaCry" Vulnerability is Here – Let's Stop it before it's too Late
sponsored by Check Point Software Technologies Ltd.
RESOURCE: Go inside to learn why the WannaCry attack was able to exploit the EternalBlue vulnerability 2 months after a patch was released, where the next big attack might come from, as well as tips you can take to bolster your system now to defend against malware in the future.
Posted: 19 Oct 2017 | Published: 11 Aug 2017

Check Point Software Technologies Ltd.

DDoS Emerges as Primary Threat Vector for IoT
sponsored by Arbor Networks
WHITE PAPER: In this research content, learn why many organizations are turning to a cloud-based DDoS mitigation service with tremendous data scrubbing capacity. Then uncover how past IoT attacks influence organizations to prevent and detect application layer attacks faster.
Posted: 20 Oct 2017 | Published: 11 Nov 2016

Arbor Networks
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement