IT Management  >   Systems Operations  >   Security  >  

Zero Day Threats

RSS Feed    Add to Google    Add to My Yahoo!
Zero Day Threats Reports
 
10 Reasons Your Cyber Security Strategy Needs A Checkup
sponsored by Rackspace
RESOURCE: Click into this infographic to learn the 10 reasons your security might need a checkup.
Posted: 27 Jun 2017 | Published: 27 Jun 2017

Rackspace

Top 7 Reasons to Optimize Network Security with a Security Delivery Platform
sponsored by Gigamon
EBOOK: Uncover the top 7 reasons to optimize your network security model with a security delivery platform, ranging from evolving attacks like malware-as-a-service to the rise of SecOps.
Posted: 19 Jun 2017 | Published: 19 Jun 2017

Gigamon

SSL: Get the Best for You and Mitigate Vulnerabilities
sponsored by A10 Networks
EGUIDE: Inside this e-guide industry experts uncover how security professionals can overcome SSL security issues. Access now to discover how to approach SSL security, tactics to choose the best SSL for your business, 7 steps to overcome SSL vulnerabilities and more.
Posted: 05 Jun 2017 | Published: 30 May 2017

A10 Networks

Your IIoT Security Plan: Risks in Manufacturing
sponsored by Bayshore Networks
EGUIDE: In this e-guide learn how to get smart about industrial IoT security risks in manufacturing, as well as how to map out an industrial IoT plan to create a smooth-running, smart factory.
Posted: 02 Jun 2017 | Published: 26 May 2017

Bayshore Networks

Stopping Crypto Ransomware
sponsored by Datto, Inc.
WHITE PAPER: Discover a 16-point guide to combating crypto ransomware in today's threat landscape.
Posted: 02 Jun 2017 | Published: 02 Jun 2017

Datto, Inc.

Threat Landscape Report Q1 2017
sponsored by Fortinet, Inc.
RESEARCH CONTENT: Uncover the trends from last year and the first quarter of this year to better understand how to protect your organization from the evolving threat landscape.
Posted: 09 Jun 2017 | Published: 09 Jun 2017

Fortinet, Inc.

Your Guide to Combating Phishing in 2017
sponsored by PhishMe
WHITE PAPER: To better understand the benefits, costs, and risks associated with PhishMe, Forrester interviewed executives at five companies with experience using simulator, reporting, and triage tools. Uncover the results in this report today.
Posted: 13 Jun 2017 | Published: 12 Jun 2017

PhishMe

The State of Endpoint Security: Approaches, Opportunities and Conclusions
sponsored by TrendMicro
WHITE PAPER: Discover an overview and breakdown of approaches, opportunities and conclusions regarding of the current state of endpoint security.
Posted: 13 Jun 2017 | Published: 13 Jun 2017

TrendMicro

Active defence through deceptive IPS
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This article in our Royal Holloway security series explains how intrusion prevention systems (IPS) can be used with a 'honeynet' to gather intelligence on cyber attacks
Posted: 05 Jun 2017 | Published: 05 Jun 2017

ComputerWeekly.com

Leveraging Multi-factor Authentication to Power Protection
sponsored by Centrify Corporation
WHITE PAPER: In order to protect this attack surface against advanced cyberthreats, modern enterprises must level up their security strategies. In this e-book, discover how this can be accomplished with multi-factor authentication.
Posted: 28 Jun 2017 | Published: 28 Jun 2017

Centrify Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement