How HPE is elevating supply chain security
By: Hewlett Packard Enterprise View more from Hewlett Packard Enterprise >>
Download this next:
Targeted attacks: Preparation and Mitigation
By: TechTarget Security
Type: eGuide
When it comes to defending your enterprise against targeted attacks, it can feel like convincing senior management of the risks is half the battle. In order to realize security success, you need to make the business case for targeted attack defense – and change user behaviors as part of your mitigation strategy.
This expert e-guide will provide you with the tools, facts and figures you need to make the business case for targeted attack prevention. Learn how you can keep your organization safe – read on now to get started.
These are also closely related to: "How HPE is elevating supply chain security"
-
Targeted cyber attacks in the UK and Europe
By: TechTarget ComputerWeekly.com
Type: Essential Guide
This research from Quocirca examines the perceptions and experiences related to targeted cyber attacks across 600 European organisations in 2015, and includes a list of the worst 40 reported attacks.
Targeted attacks are a concern for the vast majority. Almost a quarter said such attacks are now inevitable and more than one fifth admitted to a recent data theft. However, despite this bleak picture, organisations can take effective action to counter the threat.
- Most organisations have already been attacked.
- The UK has been badly affected.
- All is not lost; protective measures do work.
-
How to prevent phishing attacks: User awareness and training
By: TechTarget Security
Type: eGuide
Phishing attacks continue to be successful and are a genre of email attacks becoming more focused through spear phishing, which is a directed attack against a certain individual. In order to counter this threat and ultimately keep data safe and compliance efforts in line, organizations need a mix of technical controls and awareness training of high-profile targets. This expert E-Guide discusses the anatomy of a spear phishing attack as well as best practices on how to reduce the threat of spear phishing.
Find more content like what you just read:
-
The state of the global DDoS threat landscape
By: Cloudflare
Type: Research Content
Distributed denial-of-service (DDoS) attacks targets websites with overwhelming amounts of traffic in order to make them unavailable to users. In this threat report, analysts from Cloudflare leverage key data to provide insight into the state of the state of the global DDoS threat landscape. Access now to learn more.
-
E-Book: Technical Guide on Combatting Emerging Web Threats
By: TechTarget Security
Type: eBook
Attackers are almost exclusively targeting enterprises with hacks perpetrated over the Web. As most enterprises move operations and functionality online, Web-based applications become a tempting threat vector for cybercriminals. Read this e-book for a look at Web threats and vulnerabilities – and how to protect your organization against them.
-
Browser isolation: Your key to combatting cybercrime
By: Cradlepoint
Type: White Paper
Despite the ease and sophistication that browsers have brought to internet use, they also have become the target choice for cybercriminals looking to hack into your organization and personal data. But why exactly is this? Dig into this white paper to learn more.
-
Is Your Organization A Target?
By: Kaspersky
Type: Infographic
Security teams in organizations the world over are struggling with alert overload, disconnected tools, overwhelmed analysts, and so much more. But with an extended detection and response (XDR) solution, analysts can gain access to a single pane of glass with simple, fast automation tools. Learn more about XDR in this infographic.
-
Stopping application layer DDoS attacks: What you need to know
By: TechTarget Security
Type: eGuide
While a DDoS attack can be damaging to any organization, DDoS attacks specifically at the application-layer can be more ominous. Understanding these attacks are the first step to keeping your organization protected. In this e-guide, explore how DDoS is being used, what you can do to stop them, the future of the web threat landscape and more.
-
Infographic: Business email compromise red flags
By: TechTarget ComputerWeekly.com
Type: Infographic
Business Email Compromise (BEC) attacks typically target individuals with access to financial records and other sensitive information. However, BEC prevention involves making everyone more aware of email security risks and social engineering red flags. Here are 7 things to look out for when identifying a BEC attack.
-
The Ultimate Guide to Ransomware and Cybersecurity Planning
By: Infinidat
Type: eGuide
Read through this comprehensive e-guide for everything you need to know about cybersecurity planning for ransomware: types of attacks, common attack vectors, prevention methods and tools, best practices for recovery, and more.
-
Types of DNS Attacks Reveal DNS Defense Tactics
By: TechTarget Security
Type: eGuide
This E-Guide from SearchSecurity.com details different types of common domain name system (DNS) attacks, the unusual behaviors they invoke, and which defense tactics work best in the given scenario. View now to learn more!
-
5-step guide to mitigating zero-day attacks
By: Mimecast
Type: White Paper
Many organizations are unprepared for zero-day attacks, making them vulnerable and largely helpless to defend themselves during the time between an attack’s discovery and mitigation. How do you both proactively and reactively mitigate the risk of a zero-day attacks? Access this this guide to learn more.
-
ISM Essentials Guide – Threat Management
By: TechTarget Security
Type: Essential Guide
In this essential guide, gain a complete overview of today's threat landscape. Discover the new platforms – such as mobile devices, social media, and the cloud – that cybercriminals are targeting, learn key antimalware strategies, and more by reading on today.
-
Powerful DDoS attacks leveraging IoT
By: Arbor Networks
Type: eGuide
A series of potent, record-setting DDoS attacks hit several targets in 2016 using IoT malware to infect and leverage a large number of internet connect devices. Inside this guide, experts reveal 11 key takeaways for this type of attack and real-world examples of companies suffering from the aftermath including Dyn.
-
Securing against MFA-targeted attacks
By: Cisco
Type: Webcast
Attackers are increasingly using MFA Fatigue to wear down a user's patience and diligence with repeated fake MFA prompts, only to ultimately pose as a helpful IT support person. Fortunately, there are ways to defend against these attacks. Watch this on-demand webinar to hear directly from an in-the-field researcher how to strengthen authentication.
-
Defending your sites against ecommerce attacks
By: Cloudflare
Type: Product Overview
Targeted ecommerce attacks are on the rise. With Cloudflare, your customers can benefit from fast site performance, while your internal teams can easily protect servers, services, apps, and networks against traffic spikes and cyber-attacks. Read on to learn more.
-
12 API security best practices
By: TechTarget ComputerWeekly.com
Type: Infographic
As more businesses enable access to data and services through APIs, these vectors present an attractive target for data theft and software attacks. Insecure APIs are a serious threat - the following 12 best practices can help expand and elevate the security of an organization's APIs.
-
Defend against smishing in 3 steps
By: Cofense
Type: Blog
You’ve likely heard of phishing scams, but are you aware of smishing? To unlock an introduction to the cyberthreat, and to discover 3 actionable steps for defending against it, review this blog.
-
Technical Guide on Malware Trends
By: TechTarget Security
Type: eGuide
TechTarget’s Security Media Group presents a comprehensive guide to malware trends. Our experts help you adopt your security strategies, policies and spending to address the ever-changing and customized world of malware to keep targeted attacks, phishing scams and other malware-based attacks at bay.
-
3 practices to mitigate software supply chain attacks
By: ReversingLabs
Type: Gartner Research Report
In the last couple of years, we’ve seen software supply chain attacks play out in several large-scale incidents. Gartner, recognizing how few organizations have taken steps to evaluate the risks of these complex attacks, compiled 3 practices security leaders can use to protect their organizations. Discover these, and more insights, in this report.
-
A Security Assessment of Android Full-disk Encryption
By: TechTarget ComputerWeekly.com
Type: eGuide
This article in our Royal Holloway Security Series describes an attack on Android 5.0 full disk encryption and discusses potential countermeasures.
-
Top 14 ransomware targets in 2023 and beyond
By: TechTarget ComputerWeekly.com
Type: eGuide
According to a 2022 global survey, two in three organizations suffered a ransomware incident in the previous 12 months, up 78% over the previous year. In this article, we take a look at the 14 top ransomware targets by sector, based on the Sophos survey and other data.
-
Malware Attacks Demand a New Malware Defense Approach
By: TechTarget Security
Type: eGuide
Customized, targeted malware attacks require new defense measures beyond those currently in place. This e-guide from SearchSecurity.com offers advice on protecting your organization from these new threats. View now to learn more!
-
Ransomware & extortion report
By: Palo Alto Networks Unit42
Type: eBook
While much attention has been paid to ransomware in recent years, modern threat actors increasingly use additional extortion techniques to coerce targets into paying. Download this e-book to access executive recommendations from Unit42 to address the concerns of rising extortion and prepare yourself for the worst.
-
4 adversaries exploiting identities & how to stop them
By: CrowdStrike
Type: eBook
When hackers target your organization with phishing attacks and identity compromise threats, they are affectively forcing your workforce to act as your last line of defense. In this e-book, experts from CrowdStrike investigate the dangers of identity-based attacks, as well as how you can thwart them. Download now to learn more.
-
Combating Today’s Security Threats
By: TechTarget Security
Type: eGuide
In this expert guide, gain a better understanding of advanced persistent threats (APTs) and how you can stay one step ahead. View now to gain key insight into security strategies that can help you protect your organization.
-
Manufacturing sector guide: Top risks and cyber resilience
By: Vodafone
Type: eBook
In this eBook, you’ll learn about what issues manufacturing organizations are facing, key trends that are impacting them and how technology can help these firms build resilient supply chains against operational risks. Read the eBook.
-
Data protection: 8 questions to ask yourself regularly
By: Netrix
Type: White Paper
The best defense is often formed by envisioning the potential offense in the eyes of the attacker and taking preventative action. So when looking to protect your data, it helps to think like a hacker. To consider how and why a hacker might target you, download this white paper and access 8 questions you should be asking yourself regularly.
-
Security Spotlight Report: Mitigating Mobile Security Threats
By: T-Mobile for Business
Type: Analyst Report
As attackers increasingly target mobile endpoints, organizations are seeking to detect and mitigate malicious attacks with mobile threat management products. When considering a use case approach to IT security and risk, enterprises should evaluate potential solutions for 2 factors. Uncover these 2 critical factors in this IDC report.
-
12-page e-book: Cloud security recommendations
By: SentinelOne
Type: eBook
As bad actors target cloud environments with advanced attacks, how can organizations supercharge their cloud security? Enter “Practical Guidance for Cloud Defense in Depth,” here to help. To unlock tips for your journey to stronger cloud security, download the 12-page e-book.
-
Cyber security in the Middle East
By: TechTarget ComputerWeekly.com
Type: eGuide
As organisations increase their reliance on IT through rapid digital transformations, the threat of cyber attack grows. It is not just western countries such as the US and the UK that are being targeted by hackers, as the rapidly developed and wealthy nations of the Middle East become targets of both politically and financially driven attacks.
-
How CyberArk Customers Secure Their Endpoints
By: CyberArk
Type: Case Study
Organizations remain vulnerable to cyberattacks due to the proliferation of identities, increased number of endpoints, ransomware attacks, cloud and remote work. CyberArk Endpoint Privilege Manager helps organizations reduce the attack surface and defend from threats. Learn about CyberArk customers’ success stories in this e-book.
-
Zero Trust Impact Report
By: Illumio
Type: eGuide
In this eGuide, you will hear that many organizations have begun to implement Zero Trust architectures to modernize their cybersecurity programs and attempt to limit the impact of attacks. Take this survey and gain insight into how organizations are faring with their Zero Trust initiatives.
-
5 strategies for ironclad endpoint security
By: Palo Alto Networks
Type: eBook
What can security teams do to stop attackers from penetrating endpoints and deploying ransomware or stealing information? Read this e-book to explore the top requirements to consider when pursuing a more modern approach to securing endpoints.
-
Comprehensive Guide to Security Operations
By: Arctic Wolf
Type: eBook
Despite sizeable budgets and an array of technology solutions at their disposal, most security teams can barely keep up with the bombardment of threats targeting IT environments as the attack surface continues to expand. Access this guide to learn a pragmatic approach to reducing the risk and impact of an attack and improving security resiliency.
-
Hacking the Human Operating System
By: TechTarget ComputerWeekly.com
Type: Essential Guide
Cyber attackers often bypass the consciousness of their targets and attempt to manipulate victims through subconscious influences. This report from Intel Security offers advice on how to mitigate these risks.
-
Threat Management: Devising a new strategy to tackle today's cyberattacks
By: TechTarget Security
Type: Essential Guide
This Information Security Essential Guide on Threat Management explores the new strategies organizations are developing to tackle the threat of today’s growing malware threats and targeted attacks.
-
Scale Your SOC with Cortex Xpanse and Cortex XSOAR Healthcare
By: Palo Alto Networks
Type: eBook
Healthcare organizations are an attractive target for adversaries due to unencrypted medical IoT device traffic and a prevalence of healthcare devices running outdated and insecure operating systems. Discover how automating attack surface management can address these unique security challenges for healthcare organizations in this e-book.
-
Continuous monitoring for better data protection
By: GoSecure
Type: Video
As the value of data increases, hackers are much more incentivized to target your organization with an attack. GoSecure Titan Response MXDR services combine endpoint, network, and email threat detection into a single solution, combining manual and automated tools to protect your data. Watch this video to learn more about GoSecure Titan.
-
Endpoint security: 15 questions to ask vendors – and more
By: SentinelOne
Type: Buyer's Guide
To unlock insights for bolstering your endpoint security strategy, check out this 10-page buyer’s guide.
-
Why SMBs’ mobile security spend is missing the mark
By: T-Mobile for Business
Type: Infographic
Most SMBs feel they have a good handle on securing mobile devices and data, and many deploy mobile-specific security products. Yet there are still a wide range of mobile-based attacks on employees’ devices, apps, data, and network connections. Discover where SMBs are missing the target on mobile security spend in this infographic.
-
The Ultimate Guide to Ransomware Defense: How to prevent system lockdowns, maintain operations and reduce the likelihood of suffering an attack
By: Tanium
Type: Resource
Read the Ultimate Guide to Ransomware Defense to learn how to prevent system lockdowns, maintain operations, and reduce the likelihood of suffering an attack.
-
CW ASEAN November 2016
By: TechTarget Security
Type: Ezine
Small businesses in the ASEAN region could unknowingly be allowing hackers to access large corporate networks.
-
How intrusion prevention systems (IPS) can be used with a 'honeynet' to gather intelligence on cyber attacks
By: TechTarget ComputerWeekly.com
Type: Research Content
This article in our Royal Holloway security series explains how intrusion prevention systems (IPS) can be used with a 'honeynet' to gather intelligence on cyber attacks
-
The Inside-out Enterprise: Redefining IT SecOps for the Remote-First Workplace
By: Tanium
Type: White Paper
Enterprise IT teams are adapting to a new IT landscape with a workforce mostly or entirely remote indefinitely. The inside-out enterprise: redefining IT SecOps for today’s remote-first workplace explores three security risk management challenges related to managing clients and what organizations can do to overcome them.
-
Technical Guide on Emerging Threats
By: TechTarget Security
Type: eGuide
It takes time and money to adjust IT security in response to evolving attack tactics. As defenders gradually update their security measures, attackers respond accordingly. Such arms-race dynamics lead to threats of increasing sophistication and efficiency.
-
CrowdStrike found a 288% increase in cloud environment targeting
By: CrowdStrike
Type: White Paper
Cloud environments are more vulnerable than ever before, and you need a solution that can mitigate attacks faster than hackers can execute them. Download this white paper to learn how you can secure your cloud environment with Falcon Cloud Security.
-
What is a Cloud-Native Application Protection Platform (CNAPP)?
By: Tenable
Type: White Paper
With cloud infrastructure serving as the new datacenter for many organizations, and with many of these organizations still in a state of transition, it is no surprise cloud is the new target. Tenable Cloud Security is a comprehensive Cloud-Native Application Protection Platform (CNAPP) for AWS, Azure and GCP. Read on to learn more.
-
Risk-based authentication with Cisco Duo
By: Cisco
Type: Webcast
Attackers are increasingly targeting account takeovers in an attempt to gain access to corporate resources. Duo’s new Risk-Based Authentication dynamically detects potential threat signals and adjusts security requirements. Join this webinar to learn more about Duo’s Risk-Based Authentication.
-
Towards more robust internetworks
By: TechTarget ComputerWeekly.com
Type: Essential Guide
This article in our Royal Holloway Security Series explains how graph theory can be used to model internetworks and improve their resilience against failures and attacks.