IT Management  >   Systems Operations  >   Security  >  

Computer Security Threats

RSS Feed   
Computer Security Threats White Papers (View All Report Types)
 
Digital Transformation Must Include Network Security
sponsored by Fortinet, Inc.
WHITE PAPER: Find out how you can create a unified security fabric for your network's defense that takes a broad view of endpoints, integrates with your existing security system, and automates key elements of network protection.
Posted: 30 May 2018 | Published: 07 Feb 2018

Fortinet, Inc.

The Evolution of RBAC Models to Next-Generation ABAC
sponsored by Axiomatics
WHITE PAPER: In order to provide secure data access, organizations can no longer afford to define authorization policies based solely on a user's role. Access this white paper to learn how attributed based access control (ABAC) ABAC builds up existing roles and expands the range of attributes used in the authorization process for stronger data protection.
Posted: 14 Feb 2018 | Published: 14 Feb 2018

Axiomatics

Top 9 DDoS Threats Your Organization Must be Prepared For
sponsored by Radware
WHITE PAPER: Use this resource to gain a better understanding of the top 9 DDoS threats your organization should prepare for.
Posted: 07 Mar 2018 | Published: 07 Mar 2018

Radware

PIM, PAM and PUM: 2018 Fundamentals and Best Practices for Linux/Unix Privileged Identity and Access Management
sponsored by HelpSystems
WHITE PAPER: This white paper touches on the importance of PIM, PUM and PAM understanding and planning. Find out how you can transform your multi-vendor Linux and Unix server environment into one centrally managed security domain to simplify security policies and control access rights.
Posted: 28 Jun 2018 | Published: 28 Jun 2018

HelpSystems

3 Use Cases for Deception Technology in Healthcare
sponsored by Illusive Networks
WHITE PAPER: In the healthcare industry, security teams struggle to keep pace with the escalation of cyber risk. In this white paper, learn 3 use cases of deception technology in healthcare to protect both the mission and the bottom line by stopping attacks before they can do significant damage.
Posted: 22 Feb 2018 | Published: 26 Feb 2018

Illusive Networks

Combating the Top Five Cyberattacks with Managed Detection and Response
sponsored by Arctic Wolf
WHITE PAPER: This white paper walks through the top 5 security attacks, by providing insights into tactics, techniques and procedures commonly used by threat actors. Then, find out how a managed detection and response strategy can take your security protocols to the next level and protect your organization.
Posted: 05 Jun 2018 | Published: 05 Jun 2018

Arctic Wolf

A Guide to Protecting Cryptocurrency from Web Threats and DDoS Attacks
sponsored by Imperva
WHITE PAPER: In this white paper, learn about the vulnerabilities in the emerging cryptocurrency market, and learn about the key components of cryptocurrency defense, including web application firewalls, DDoS protection, and content delivery network services.
Posted: 21 Jun 2018 | Published: 21 Jun 2018

Imperva

How To Succeed in Data Loss Prevention (DLP) Projects
sponsored by Docauthority
WHITE PAPER: Inside, find out how AI and document security, combined with your DLP project, can help you to significantly improve the coverage for the data protected.
Posted: 20 Jun 2018 | Published: 20 Jun 2018

Docauthority

The SIEM Buyer's Guide
sponsored by Splunk
WHITE PAPER: How have SIEM platforms evolved? This SIEM Buyer's Guide reveals the differences between modern SIEM and legacy SIEM and offers 9 technical capabilities of a modern SIEM strategy and how it can improve your overall security.
Posted: 23 May 2018 | Published: 23 May 2018

Splunk

How to secure cloud and software-defined data centers
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: Find how you can meet the added security challenges that stem from increasing virtualization with unified visibility and automated, policy-based controls across your physical and virtual infrastructure.
Posted: 10 May 2018 | Published: 31 Dec 2017

ForeScout Technologies, Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement