IT Management  >   Systems Operations  >   Security  >  

Zero Day Threats

RSS Feed    Add to Google    Add to My Yahoo!
Zero Day Threats Reports
 
3 Steps to Improving Incident Response
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Learn why 68% of companies want incident response tools that can detect and fully assess threats that infiltrate from an array of devices and geographies.
Posted: 27 Feb 2017 | Published: 27 Feb 2017

Symantec & Blue Coat Systems

Why Being Confident in Your Disaster Recovery Plan is Key to Stopping New and Rising Threats
sponsored by Iron Mountain
EGUIDE: As the threat landscape evolves, you need to be able to change with it. In this expert guide, learn some of the ways ransomware operates in order to ready yourself for what may be an inevitable attack. Then, read about what tactics other companies use that allow them to be confident in the strength of their disaster recovery plan.
Posted: 22 Feb 2017 | Published: 22 Feb 2017

Iron Mountain

Cybersecurity and Overcoming the Intelligence Disconnect
sponsored by BAE Systems
RESEARCH CONTENT: Cybersecurity is now a business risk issue like any other. In this research report, discover how to unite the two different perspectives of the C-Suite and IT decision-makers, especially in regards to what threats they think are greatest, who's accountable for defense, how to use outsourcing, and more.
Posted: 27 Feb 2017 | Published: 27 Feb 2017

BAE Systems

Office of the CIO - Box Case Study
sponsored by IBM
WHITE PAPER: Learn how to secure Box on the cloud, and in doing so yield more benefits than just keeping your data safe.
Posted: 03 Feb 2017 | Published: 01 Feb 2017

IBM

2017 Study on Mobile and IoT App Security
sponsored by IBM
RESEARCH CONTENT: According to this Ponemon Institute study, 58% of respondents are slightly more concerned about getting hacked through an IoT app than a mobile app. This research report reveals how many companies are unprepared for the risks created by vulnerabilities in IoT apps.
Posted: 20 Feb 2017 | Published: 31 Jan 2017

IBM

How to Streamline Vendor Risk Management
sponsored by BitSight
WHITE PAPER: Explore how vendor risk management has traditionally been handled, why traditional strategies alone are inadequate, and 3 ways to make vendor risk management more efficient.
Posted: 06 Feb 2017 | Published: 06 Feb 2017

BitSight

Agility meets Control: 3 Ways to Boost Security in the Cloud
sponsored by Microsoft
WHITE PAPER: Explore how to implement modern, cloud-capable security strategies that empower rather than hinder development and innovation. Find out 3 ways to boost security in the cloud with Windows Server 2016, starting with your OS, your data center and critical workloads, business apps, and more.
Posted: 14 Feb 2017 | Published: 31 Dec 2016

Microsoft

Deploying a Multiā€Gigabit Web Filtering Architecture
sponsored by ContentKeeper
WHITE PAPER: This white paper explores how to redouble web filtering efforts in the face of growing bandwidth and processing requirements. Discover multiple approaches to cultivating a well-managed multi-gigabit architecture, exploring the pros and cons of each, plus uncover tips on how to keep up with one-to-one computing and SSL encrypted sites.
Posted: 08 Feb 2017 | Published: 31 Dec 2016

ContentKeeper

2016 Mobile Security & Business Transformation Study
sponsored by IBM MaaS360
WHITE PAPER: Enterprise mobility has transformed security and business practices. Access the 2016 Mobile Security & Business Transformation Study, and learn what 200 respondents had to say about how organizations like yours can conduct -- and secure -- enterprise mobility.
Posted: 24 Feb 2017 | Published: 24 Feb 2017

IBM MaaS360

Your Data on the Move: Taking Back Control of Your Most Precious Asset
sponsored by Globalscape
WHITE PAPER: This white paper examines some of the risk factors organizations face when managing their data and explores best practices for conducting risk assessments. Read on to learn about 3 main risk factors threatening your organization, 3 signs you've lost control of your data, 4 steps to regaining control over your data, and more.
Posted: 27 Feb 2017 | Published: 27 Feb 2017

Globalscape
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement