IT Management  >   Systems Operations  >   Security  >  

Software Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
Software Security Threats Reports
 
Preventing Ransomware: Healthcare CIO Discusses Top Technologies
sponsored by Cisco
EGUIDE: In this expert e-guide, David Reis, a former CISO and current senior vice president and CIO at Lahey Health in Burlington, Mass., discusses specific technologies healthcare organizations can use to prepare for all sides of a ransomware attack, including technologies to detect, prevent and recover from them.
Posted: 07 Feb 2017 | Published: 02 Feb 2017

Cisco

Risk Management: Best and Worst Practices
sponsored by BitSight
EGUIDE: Discover the downsides to digitization, how to manage the risk to your organization's data, and 5 top IT risk management mistakes.
Posted: 15 Feb 2017 | Published: 15 Feb 2017

BitSight

Securely Go Digital with Your Business Processes
sponsored by Cisco
RESOURCE: Discover two use cases of small business owners and the path that led them to become "secure digitizers", enabling a first-move advantage in terms of digitization for a smaller organization. Learn how to secure roaming users, implement secure guest access, scale security along with the network, and more.
Posted: 23 Jan 2017 | Published: 23 Jan 2017

Cisco

How the Houston Astros Protected their Network from Internet Threats
sponsored by ContentKeeper
CASE STUDY: Explore how the Houston Astros implemented a multi-layered approach to web security to protect against malware, botnets, phishing scams and other online threats. Discover how they unlocked real-time monitoring and reporting of Internet activity for mobile users connecting to their VPN and gained more granular control of SSL encrypted web traffic.
Posted: 07 Feb 2017 | Published: 31 Dec 2016

ContentKeeper

Cybersecurity Essentials for 2017
sponsored by Neustar
VIDEO: In this webinar, Scott Crawford, Research Director for Information Security with 451 Research, and Rodney Joffe with Neustar will examine essential cybersecurity trends and highlight key tactics to better prepare you for what the coming year may bring.
Posted: 30 Jan 2017 | Premiered: 25 Jan 2017

Neustar

6 Tips to Maximize Productivity with Identity-as-a-Service (IDaaS)
sponsored by Microsoft
WHITE PAPER: Identity-as-a-Service (IDaaS) is an emerging strategy for managing and simplifying access to apps, but there are a number of feature, architecture and maturity considerations when selecting an IDaaS. Learn the top six considerations to keep in mind when selecting your IDaaS.
Posted: 26 Jan 2017 | Published: 22 Jun 2015

Microsoft

Taking a Proactive Approach to Addressing Ransomware
sponsored by AttackIQ
TRANSCRIPT: Industry expert, Kevin Beaver discusses best practices in approaching and addressing ransomware. Access this transcript to uncover real-world stories and practical advice on how you can make ransomware a manageable threat that can be mitigated without impacting business operations.
Posted: 16 Feb 2017 | Published: 09 Feb 2017

AttackIQ

Prevent DNS Catastrophes: Learn Best Practices on Shoring Up DNS for 2017
sponsored by Neustar
VIDEO: Discover if your current DNS strategy stacks up to the next generation of internet demands. Learn why it makes sense to have a backup DNS provider, what IoT insecurities threaten your business, and more.
Posted: 27 Jan 2017 | Premiered: 20 Jan 2017

Neustar

Navigate Your Way Around Ransomware
sponsored by Barracuda Networks
WHITE PAPER: Gain valuable insight into how to prepare your organization's defense and disaster recovery policies for modern ransomware attacks. Take a closer look at how ransomware works, the most common variants that are active today, and 3 steps to recover from ransomware.
Posted: 20 Jan 2017 | Published: 20 Jan 2017

Barracuda Networks

Understanding and Mitigating DNS DDoS Attacks
sponsored by Box
WHITE PAPER: A DDoS Attack or distributed denial of service attack can happen to any online entity, at any time. So what are your company's risks and how can you mitigate them?
Posted: 06 Feb 2017 | Published: 31 Dec 2015

Box
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement