Vertical Industries  >  

Security Equipment Industry

RSS Feed    Add to Google    Add to My Yahoo!
Security Equipment Industry Reports
 
BadUSB 2.0: Exploring USB man-in-the-middle attacks
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series explores the uses and capabilities of rogue USB hardware implants for use in cyber espionage activities.
Posted: 30 Aug 2016 | Published: 30 Aug 2016

ComputerWeekly.com

Insider Threat Report 2015
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This survey of 500 cyber security professionals offers insight into the state of insider threats and solutions to prevent them.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

ComputerWeekly.com

Expert Viewpoints on Access Management and Federation
sponsored by IBM
WHITE PAPER: Learn how web access management and identity federation enable organizations to manage access both from and to external systems, including cloud services, in a consistent way.
Posted: 24 Feb 2017 | Published: 24 Feb 2017

IBM

Two-Factor Authentication Helps Officers Protect and Serve New York
sponsored by BlackBerry
WHITE PAPER: Learn how the field officers of the Suffolk County Police Department of Long Island, NY utilize two-factor authentication to protect and serve their constituents, keep their database safe, and enable secure mobility.
Posted: 20 Dec 2016 | Published: 30 Nov 2016

BlackBerry

Ransomware: Block Attackers with a Layered Defense
sponsored by Cisco Systems, Inc.
WHITE PAPER: Uncover what ransomware is, what it does, and how customers can defend their organizations against it. Reveal what a layered defense strategy can do for your organization and how to best implement it.
Posted: 24 Feb 2017 | Published: 24 Feb 2017

Cisco Systems, Inc.

SANS Survey Report: Incident Response Capabilities in 2016
sponsored by Intel Security
RESEARCH CONTENT: The 2016 SANS survey was conducted to assess the current state of incident response (IR), polling 591 respondents on metrics such as dwell time and automation. Explore the survey's results in this report to uncover critical findings about the current IR landscape, breach environment, and areas that could see improvement in the near future.
Posted: 26 Sep 2016 | Published: 30 Jun 2016

Intel Security

Securing the Private Cloud
sponsored by Fortinet, Inc.
WHITE PAPER: The demands on private cloud all too often leave operators in a position of favoring performance and agility over security. This white paper details how you can protect your private cloud environment by building security into the network that can accommodate powerful threat detection technologies while maximizing throughput and flexibility.
Posted: 07 Nov 2016 | Published: 28 Jul 2016

Fortinet, Inc.

Addressing PCI Compliance
sponsored by CA Technologies.
WHITE PAPER: Read this white paper to learn how you can meet the requirements of Payment Card Industry Data Security Standard version 3 and better protect your network.
Posted: 01 Feb 2016 | Published: 16 Dec 2015

CA Technologies.

2016 Cost of Data Breach Study: Global Analysis
sponsored by IBM
WHITE PAPER: This Ponemon Institute study encapsulates the results of 383 organizations from 12 countries gathering recent data breach trends and costs of remediation.
Posted: 01 Sep 2016 | Published: 01 Jun 2016

IBM

2016 Security Operations Center Report
sponsored by Neustar
WHITE PAPER: This report analyzes some of the major attack types seen in today's digital world and discusses trends for the future of cyber threats. You'll see statistics on DDoS attack vectors, attack volume and what sort of damage these attacks caused so you can best plan for the dangerous future of cybercrime.
Posted: 29 Sep 2016 | Published: 31 Aug 2016

Neustar
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement