All resources sponsored by:

ColorTokens

12 Matches
How Visibility Unlocks Zero-Disruption Microsegmentation
sponsored by ColorTokens
WEBCAST:Microsegmentation is gaining popularity amongst security architects for its ability to enhance agility, incident response, compliance readiness and more. Watch this webinar to learn more about the benefits and possibilities of microsegmentation from 2 distinguished experts.
Posted: 08 Oct 2020 | Premiered: Jul 29, 2020
Get This Now


Path to PCI-DSS 4.0: Simplifying Compliance and Securing Cardholder Data
sponsored by ColorTokens
VIDEO:PCI-DSS v4.0 is expected to arrive in late 2020/early 2021 – and organizations are beginning to prepare. This webinar provides an overview of PCI-DSS 4.0, including the expected changes, what will (likely) remain unchanged, how zero-trust fits in, and more – watch now to get started.
Posted: 07 Oct 2020 | Premiered: 12 Jun 2020
Get This Now


Webroot Threat Report
sponsored by ColorTokens
WHITE PAPER:Each year, Webroot releases a threat report highlighting a look back at trending threats, successful security tactics, and more. Download this year’s report for a closer look into: malware, ransomware, phishing, high-risk URLs, malicious IP addresses, security awareness training & more.
Posted: 07 Oct 2020 | Published: 07 Oct 2020
Get This Now


Best Practices for Special-Purpose System Security
sponsored by ColorTokens
RESOURCE:A special-purpose system is an endpoint with a specific function, such as an airport kiosk or an ATM. And while these endpoints facilitate convenience, they also present significant security challenges. Read this article to learn more about where the vulnerabilities lie and how to address them.
Posted: 06 Oct 2020 | Published: 15 Aug 2020
Get This Now


Microsegmentation: The First Step to Zero-Trust Security
sponsored by ColorTokens
RESOURCE:Modern security will see the elimination of adding network layer after network layer to fix security vulnerabilities. Businesses need a tighter security method, one that allows them to control traffic within and between segments. This is the basis of microsegmentation. Read this article to learn why microsegmentation is the way forward.
Posted: 06 Oct 2020 | Published: 23 Mar 2020
Get This Now


Approaches to Micro-Segmentation: Pros and Cons
sponsored by ColorTokens
RESOURCE:Micro-segmentation is emerging as one of the most effective methods in combating lateral threats that perimeter security fails to protect against. This article provides an overview of the 3 primary approaches to micro-segmentation, including the pros and cons of each approach – read on to get started.
Posted: 05 Oct 2020 | Published: 22 Apr 2020
Get This Now


How to Comply with PCI-DSS 4.0
sponsored by ColorTokens
RESOURCE:PCI-DSS 4.0 is expected to roll out mid-2021, and organizations are preparing their compliance strategies to reflect the expected adjustments. This article provides an overview of what will change in PCI-DSS 4.0, what will carry over, and how to pick a technology partner to help achieve compliance.
Posted: 05 Oct 2020 | Published: 05 Jun 2020
Get This Now


What is Micro-Segmentation?
sponsored by ColorTokens
WHITE PAPER:The cost of a data breach and the time it takes to find and isolate it are both inordinately high, underscoring the fact that the traditional castle-and-moat approach to cybersecurity is no longer relevant. Read on to learn why micro-segmentation is gaining traction as the best way to secure and govern all areas of your business’s data systems.
Posted: 02 Oct 2020 | Published: 02 Oct 2020
Get This Now


The Complete Guide to PCI-DSS 4.0
sponsored by ColorTokens
RESOURCE:PCI-DSS 4.0, the latest version of the Payment Card Industry Data Security Standard, is expected to be released in mid-2021. Although the full text of PCI-DSS 4.0 has yet to be released, there’s some information out there. In this overview, find out how PCI-DSS 4.0 will impact your business next year.
Posted: 02 Oct 2020 | Published: 02 Oct 2020
Get This Now


COVID and Cybersecurity: Threats, Trends, and Predictions
sponsored by ColorTokens
WEBCAST:View the webinar COVID and Cybersecurity: Threats, Trends, and Predictions for a deep dive into the latest research about the nature of today’s increasingly complex cyber threats – and how your organization can secure its critical assets.
Posted: 01 Oct 2020 | Premiered: Oct 1, 2020
Get This Now


Definitive Guide to Zero-Trust Security
sponsored by ColorTokens
EBOOK:Upon first hearing the term zero-trust, it can feel a bit worrying to implement what sounds like a “never trust” security policy. But what it actually provides is “just enough trust” to authorized users while blocking out all other traffic. To learn more, dive into the Definitive Guide to Zero-Trust Security to understand how zero trust works.
Posted: 01 Oct 2020 | Published: 01 Oct 2020
Get This Now


Key Tenets of Zero Trust Architecture
sponsored by ColorTokens
RESOURCE:Zero-trust architecture (ZTA) is a security blueprint built on the premise that attackers are already present and that anything can be compromised at any point. Broadly speaking, the tenets of ZTA can be classified under three security domains. Read this short article alongside the NIST SP 800-207 to examine the vital roles of these tenets.
Posted: 30 Sep 2020 | Published: 04 Sep 2020
Get This Now


12 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info