IT Management  >   Systems Operations  >   Security  >  

Cyber Security

RSS Feed   
Cyber Security White Papers (View All Report Types)
 
Who needs malware? How Adversaries use Fireless Attacks to Evade your Security
sponsored by CrowdStrike
WHITE PAPER: According to CrowdStrike, 8 out of 10 attack vectors that resulted in a successful breach used fileless attack techniques. Access this white paper to learn how fileless attacks work and why traditional techniques fail to protect your organization.
Posted: 04 Jun 2019 | Published: 04 Jun 2019

CrowdStrike

Eliminating the Insider Threat: Mitigating Internal Risks Within Your Organization
sponsored by FairWarning
WHITE PAPER: 1 in 3 data breaches involve internal actors, according to the Verizon Data Breach Investigation Report 2019. There are many different insider threat profiles that have varying intentions. In this white paper, explore 5 of these profiles and learn how to protect your organization from each.
Posted: 24 Jul 2019 | Published: 24 Jul 2019

FairWarning

The 6 Most Common Types of Phishing Attacks
sponsored by Inky Technology
WHITE PAPER: Phishing attacks are on the rise and attackers are constantly evolving their tactics to trick victims. In this white paper, explore 6 of the most common types of phishing attacks.
Posted: 28 Jun 2019 | Published: 28 Jun 2019

Inky Technology

Endpoint Protection Buyers Guide
sponsored by CrowdStrike
WHITE PAPER: Endpoint security is one of the most critical components of a cybersecurity strategy. Unfortunately, for those responsible for protecting their organizations' endpoints, it has never been more challenging to select the best solution for the job. In this white paper, discover an evaluation of endpoint protection platforms based on 5 key elements.
Posted: 04 Jun 2019 | Published: 04 Jun 2019

CrowdStrike

Evolution of ICS Attacks and the Prospects for Future Disruptive Events
sponsored by Dragos
WHITE PAPER: Headlines are full of proclamations covering the latest in industrial control system (ICS) attacks and threats to critical infrastructure. In this white paper, explore an analysis of ICS disruptive events from the past 4 years. Also, learn how these threats have evolved over time, and what measures are necessary to defeat them.
Posted: 06 Aug 2019 | Published: 06 Aug 2019

Dragos

Utility Regulations Demand Robust Third-Party Risk Management
sponsored by BitSight
WHITE PAPER: In this white paper, learn how utilities organizations can comply with regulations and prevent cyberattacks, data breaches, and potential physical harm by using a robust third-party risk management program.
Posted: 18 Jul 2019 | Published: 18 Jul 2019

BitSight

Advanced Threat Protection Beyond the AV
sponsored by Cynet
WHITE PAPER: While large enterprises can cover attack surfaces with a SIEM or employ a staff of skilled SOC analysts, mid-sized organizations have to address similar cyber-risks with significantly less resources. In this white paper, discover strengths and weaknesses of two Advanced Threat Protection approaches: Endpoint Protection and Network Analytics.
Posted: 04 Jun 2019 | Published: 04 Jun 2019


Threat Intelligence: Far-Fetched Idea or Must-Have Security Tactic? How Every Ciso Can Make It a Priority
sponsored by Mimecast
WHITE PAPER: If threat intelligence isn't part of your cyber resilience strategy in some capacity, you have a massive gap on your hands. And you may be blindsided by a phishing attack, malware incident or worse. In this white paper, learn how CISOs can make threat intelligence a priority in their cyber resilience planning.
Posted: 24 Sep 2019 | Published: 24 Sep 2019

Mimecast

5 Ways to Reduce Risk and Boost Productivity
sponsored by Citrix
WHITE PAPER: While IT must enable both the flexibility employees need to be productive and the security the business requires, this balancing act often ends in compromise. In this white paper, explore 5 ways a secure digital workspace can reduce risk and boost productivity.
Posted: 05 Sep 2019 | Published: 05 Sep 2019

Citrix

Accelerate ERP Threat Detection
sponsored by Appsian
WHITE PAPER: Your ERP applications house your organization's most sensitive data, making them a tempting target for cyber-attacks. This calls for improved threat detection and remediation features in your security infrastructure. In this white paper, learn how Appsian's Real-Time Analytics solution can help your organization prevent ERP data breaches.
Posted: 12 Aug 2019 | Published: 12 Aug 2019

Appsian
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement