IT Management  >   Systems Operations  >   Security  >  

Internet Threats

RSS Feed    Add to Google    Add to My Yahoo!
Internet Threats Reports
 
Disrupt the Machine-to-Human Fight with a New Defender Lifecycle Model in Security Operations
sponsored by Gigamon
WHITE PAPER: In this white paper, learn how Gigamon's security delivery platform combats breaches and cyberattacks by integrating machine learning, artificial intelligence (AI) and security workflow automation.
Posted: 20 Sep 2017 | Published: 31 Jul 2017

Gigamon

Moving from Vulnerability Management to Effective Vulnerability Response
sponsored by ServiceNow
WEBCAST: Watch this webcast to uncover how Seton Hall University went from using spreadsheets for tracking vulnerability information to a new approach to vulnerability response.
Posted: 31 Aug 2017 | Premiered: Jul 11, 2017

ServiceNow

The Building Security in Maturity Model Examined
sponsored by Synopsys
RESEARCH CONTENT: In this white paper, you'll find the Building Security in Maturity Model (BSIMM) which compiles the information given by 109 security professionals. Read on to learn the important roles found in a successful security initiative, as well as how you contemporaries are managing their compliance policies, testing protocols, analytics, and more.
Posted: 12 Jan 2018 | Published: 12 Jan 2018

Synopsys

How to Create a Scalable Threat Model
sponsored by Synopsys
WHITE PAPER: Find out how to make threat modeling more efficient and cost-effective with an automated, scalable, template-based approach.
Posted: 12 Jan 2018 | Published: 21 Sep 2017

Synopsys

7 Key Questions to Ask When Selecting an Incident Response Service Provider
sponsored by Dell SecureWorks
WHITE PAPER: This white paper offers 7 key questions to ask when selecting an incident response service provider, to help you evaluate vendors based on your organization's needs.
Posted: 20 Dec 2017 | Published: 20 Dec 2017

Dell SecureWorks

Security Investigations: The Importance of Detection and Rapid Response
sponsored by Splunk
WHITE PAPER: Gain a holistic view of what defines a security investigation, as well as a security program that provides an analytics-driven approach to security. Discover how through analytics you'll be able to detect threats, visualize security data, and more.
Posted: 11 Sep 2017 | Published: 11 Sep 2017

Splunk

New Security Challenges Redefine Risk and Vulnerability
sponsored by Fortinet, Inc.
WHITE PAPER: Learn the latest areas of security in which IT pros should be honing their focus to keep pace with the ever-evolving threat landscape. For example, training the 70% of uncertified IT pros to protect IoT devices.
Posted: 07 Sep 2017 | Published: 07 Sep 2017

Fortinet, Inc.

10 Network Security Tools and Tests Everyone Should Use
sponsored by Global Knowledge
WHITE PAPER: Discover the 10 network security tools and tests that you should consider implementing and know how to use.
Posted: 01 Dec 2017 | Published: 01 Dec 2017

Global Knowledge

Web security: Important but often overlooked
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide we take a look at the different approaches you can take in order to bolster your web security. We find out how to identify and address overlooked web security vulnerabilities, how security controls affect web security assessment results and why web opportunities must be met with appropriate security controls.
Posted: 24 Nov 2017 | Published: 24 Nov 2017

ComputerWeekly.com

How to Bolster Endpoint Security Protection
sponsored by Symantec
EGUIDE: This expert e-guide examines a Symantec platform that is designed to protect its users with security for both physical and virtual endpoints. Learn how to enhance endpoint security with key features like anti-malware, firewalls, and more.
Posted: 16 Aug 2017 | Published: 11 Aug 2017

Symantec
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement