IT Management  >   Systems Operations  >   Security  >  

Cyber Security

RSS Feed   
Cyber Security White Papers (View All Report Types)
 
5 Best Practices for AWS Security Monitoring
sponsored by Sumo Logic AWS
WHITE PAPER: Cloud infrastructures and capabilities enable organizations to enhance their operations with improved scalability, agility and cost savings. However, security unfortunately remains a key pain point for cloud users. In this white paper discover a set of best practices designed to help protect sensitive data in AWS environments.
Posted: 05 Jun 2020 | Published: 05 Jun 2020

Sumo Logic AWS

Retooling Cybersecurity Programs for the Cloud-first Era
sponsored by Capsule8
WHITE PAPER: The amount of cloud-resident sensitive data is expected to double over the next 2 years, and organizations are preparing for the onslaught of threats by making careful reconsiderations within their cybersecurity strategy to include the protection of cloud data and applications, but how are they going about this? Read on to find out.
Posted: 08 Jun 2020 | Published: 08 Jun 2020


Data Protection for Kubernetes on VMware
sponsored by Dell Technologies & Intel®
WHITE PAPER: Containers were originally developed as a method to package, deploy and isolate applications from each other to improve density. But as cloud native applications have matured, so too has the orchestration capabilities of containers. Download this white paper to learn more about data protection for containerized apps.
Posted: 12 Jun 2020 | Published: 12 Jun 2020

Dell Technologies & Intel®

Spear Phishing: Top Threats and Trends
sponsored by Barracuda
WHITE PAPER: Business email compromise (BEC) is an emerging cybersecurity threat that targets user inboxes. While BEC makes up just 7% of spear-phishing attacks, it’s responsible for over $26 billion in losses in the last four years. In this report, explore the latest BEC tactics used by scammers and best practices for protecting your organization.
Posted: 18 May 2020 | Published: 30 Nov 2019

Barracuda

2020 Data Breach Executive Brief
sponsored by Verizon
WHITE PAPER: Each year, Verizon conducts a Data Breach Investigations Report (DBIR) to observe and analyze data breaches and provide industry professionals with key takeaways, industry highlights, relevant best practices, and more. Download this executive brief to unlock this year’s findings.
Posted: 10 Jul 2020 | Published: 10 Jul 2020

Verizon

2020 SANS Network Visibility and Threat Detection Survey
sponsored by ExtraHop
WHITE PAPER: Today’s networks – which embrace cloud, encryption, IoT and third-party vendor access – are becoming more complex, making visibility and security difficult. The following SANS report provides an in-depth look at the results from a recent network visibility and threat detection survey. Read on to view current trends and challenges.
Posted: 18 Jun 2020 | Published: 18 Jun 2020

ExtraHop

2020 User Risk Report
sponsored by Proofpoint
WHITE PAPER: Access this white paper to discover user cybersecurity awareness and knowledge gaps while discovering specific actions you can take to empower your people and build up your cyber resilience.
Posted: 25 Jun 2020 | Published: 24 Jun 2020

Proofpoint

A Buyer's Guide to Cloud Security
sponsored by Forcepoint
WHITE PAPER: Given the amount of critical data being hosted in the cloud, it should come as no surprise that organizations are taking careful steps to safeguard their sensitive information. In this buyer’s guide, explore evaluation criteria and a competitive analysis designed to equip you with the knowledge to find the right cloud security provider for you.
Posted: 29 May 2020 | Published: 29 May 2020

Forcepoint

Using Farsight Passive DNS
sponsored by Farsight Security
WHITE PAPER: For a hacker, the efficiency and ease-of-use of DNS-related phishing attacks is second to none. In fact, one Verizon study found phishing to be the #1 cause of data breaches. Download this white paper to learn more about Farsight’s Passive DNS tool, which embraces NIST’s 4-phase incident response lifecycle to help you thwart DNS-related threats.
Posted: 15 Jun 2020 | Published: 31 Jul 2019

Farsight Security

The Top 5 Mistakes That Everyone in Vulnerability Remediation is Making
sponsored by Vulcan
WHITE PAPER: Cyberattackers are growing cleverer with each passing year, exposing new vulnerabilities and exploiting old ones to cause costly and disruptive breaches. Its time for organizations to fight back. In this white paper take a closer look at the top five most common mistakes in vulnerability management and how to avoid them.
Posted: 14 May 2020 | Published: 14 May 2020

Vulcan
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info