IT Management  >   Systems Operations  >   Security  >  

Zero Day Threats

RSS Feed    Add to Google    Add to My Yahoo!
Zero Day Threats Reports
 
PASSIVE Voice Biometrics in ACTIVE Channels
sponsored by NICE Systems, Inc
RESEARCH CONTENT: Learn about the evolution of active vs. passive voice biometrics (VB) and how they combine with other speech processing technologies like automated speech recognition (ASR) to improve authentication and identity assertion in tandem with machine learning and AI.
Posted: 04 Aug 2017 | Published: 04 Aug 2017

NICE Systems, Inc

How UEBA Reduces the Threat of Insider Data Leakage
sponsored by Veriato, Inc.
WHITE PAPER: Insider access means an employee can learn where sensitive data resides, the value of that data, and the best times to initiate an attack. This white paper examines how you can stop insider data leaks.
Posted: 03 Aug 2017 | Published: 03 Aug 2017

Veriato, Inc.

The Challenges of Legacy SIEM Platforms
sponsored by Exabeam
WHITE PAPER: Explore 3 reasons why legacy SIEM tools no longer meet the needs of most organizations. Plus, uncover the benefits of a modern security intelligence [platform.
Posted: 02 Aug 2017 | Published: 02 Aug 2017

Exabeam

Ransomware and Cloud Security: Keys to Stop the Threat
sponsored by Cisco Umbrella
EGUIDE: Highly complex threats are targeting corporate assets and resources every day. In this e-guide, security expert Kevin Beaver reveals 5 ways to prevent a ransomware infection through network security and assistant editor Kathleen Casey explores 5 ways to fend off cloud security threats.
Posted: 27 Jul 2017 | Published: 24 Jul 2017

Cisco Umbrella

Securing DNS: What to Do, and What to be Aware of
sponsored by Cisco Umbrella
EGUIDE: In order to understand how DNS attacks work, it is important to understand DNS security weaknesses. In this e-guide, security pros Peter Wenham and Vladimir Jirasek reveal best practices and recommendations for securing DNS and staying ahead of its vulnerabilities.
Posted: 27 Jul 2017 | Published: 24 Jul 2017

Cisco Umbrella

Secure Browsing: Common Gaps, Best Practices, and New Technology
sponsored by Citrix
WHITE PAPER: Are you prepared to protect your browsers from targeted attacks seeking to compromise your organization? Take an inside look at one strategy that can help you centralize and secure browsers.
Posted: 04 Aug 2017 | Published: 31 Dec 2016

Citrix

Why a Virtual Browser is Important For Enterprise Security
sponsored by Authentic8, Inc.
WHITE PAPER: More malware enters via the web browser than any other place across the network. Find out how to create more sophisticated and granular security controls with a cloud-based, virtual browser. Learn what features virtual browsers should offer, what their potential pitfalls are, and more.
Posted: 28 Jul 2017 | Published: 28 Jul 2017

Authentic8, Inc.

Secure Cellular Connectivity Empowers BlueNRGY's Global Reach
sponsored by Aeris
CASE STUDY: IoT and machine-to-machine (M2M) connectivity enables networks to overcome critical issues like interrupted services, security breaches, and high implementation and maintenance costs. Discover how BluNRGY enabled secure cellular connectivity for IoT in 190 countries and with more than 550 carriers.
Posted: 03 Aug 2017 | Published: 03 Aug 2017

Aeris

Stopping the Next Ransomware Outbreak
sponsored by Carbon Black
WHITE PAPER: The spike in ransomware outbreaks in the last two years has left security analysts and administrators searching for better protection. Discover 5 simple tips to prevent a ransomware outbreak at your enterprise.
Posted: 10 Aug 2017 | Published: 09 Aug 2017

Carbon Black

Enterprise Cloud Applications & Services Adoption, Use, and Threats
sponsored by Symantec
RESEARCH CONTENT: This special "Shadow Data Research Report" addresses the challenges faced when securing data in cloud apps and services specific to Shadow. Plus the report covers the potential repercussions of data leakage including compliance and mitigation costs that we guarantee you'll never want to face.
Posted: 08 Aug 2017 | Published: 08 Aug 2017

Symantec
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement