IT Agents  >   IT Workforce  >   Information Technology Professionals  >   IT Managers  >  

IT Security Managers

RSS Feed   
IT Security Managers White Papers (View All Report Types)
 
Future of the SOC Forces shaping modern security operations
sponsored by Chronicle
WHITE PAPER: The age of AI, IoT, cloud computing and other disruptive technologies has driven fundamental change in security operations approaches and objectives. This white paper explores 3 fundamental forces that are shaping the need to change threat management and SOCs – read on to learn more.
Posted: 18 Aug 2020 | Published: 18 Aug 2020

Chronicle

Zero Trust eXtended Ecosystem Platform Providers
sponsored by Ionic Security
WHITE PAPER: This Forrester Wave Report evaluates the top vendors and offerings within the Zero Trust platform market – read on to unlock the vendor comparison matrix, scoring criteria and an in-depth analysis of each of the 15 most significant Zero Trust platform providers.
Posted: 06 Oct 2020 | Published: 24 Sep 2020

Ionic Security

Key Steps in Defining a Shared Responsibility Model for Public Cloud Services
sponsored by Alert Logic
WHITE PAPER: As public cloud has become more widely adopted, cybercriminals have altered their tactics to exploit cloud environments. Read this e-guide to discover how (and why) to implement the Shared Responsibility Model for public cloud services.
Posted: 16 Feb 2021 | Published: 16 Feb 2021

Alert Logic

Understanding Phishing: Text Direction Deception!
sponsored by Inky Technology
WHITE PAPER: Phishing scams continue to evolve, and attackers apply an ever-growing bag of tricks to fool recipients as well as email protection tools. In this edition of Understanding Phishing, the cybersecurity experts at INKY dissect a recently uncovered tactic which uses Cascading Style Sheets (CSS) to bypass security protocols by mixing scripts.
Posted: 30 Sep 2020 | Published: 30 Sep 2020

Inky Technology

Webroot Threat Report
sponsored by ColorTokens
WHITE PAPER: Each year, Webroot releases a threat report highlighting a look back at trending threats, successful security tactics, and more. Download this year’s report for a closer look into: malware, ransomware, phishing, high-risk URLs, malicious IP addresses, security awareness training & more.
Posted: 07 Oct 2020 | Published: 07 Oct 2020

ColorTokens

The CIO’s Cybersecurity Checklist
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: CIOs have never been under more duress than they are under now. An enlarged attack surface coupled with a growing threat landscape means that senior leaders have to dot their i’s and cross their t’s when it comes to network security. Want to stay ahead? View this CIO cybersecurity checklist to know where you are and where you need to be.
Posted: 04 Sep 2020 | Published: 04 Sep 2020

Arctic Wolf Networks, Inc.

Insurance Fraud Prevention & Detection
sponsored by Actico
WHITE PAPER: For insurance providers, automation and machine learning provide the ability to process claims at unmatched speed, detect and prevent insurance fraud, and more. Read this white paper to learn more about ACTICO, an insurance claims platform that embraces automation and machine learning capabilities.
Posted: 22 Dec 2020 | Published: 22 Dec 2020

Actico

2020 Election Security
sponsored by WhiteHat Security
WHITE PAPER: Around the globe, we’ve witnessed how cybercriminals can create chaos during election cycles by disqualifying legitimate voters, corrupting voter data and launching denial-of-service attacks. In recent years, U.S. elections have come under continuous assault. See this white paper to learn about the security challenges this causes for the country.
Posted: 17 Nov 2020 | Published: 17 Nov 2020

WhiteHat Security

It’s All About the Data
sponsored by Tala Security
WHITE PAPER: Online retailers are quickly realizing that enhanced user experience often comes at the cost of security – but that doesn’t necessarily need to be the case. In this blog post, take a closer look at the challenges, risks and opportunities as they related to data privacy and security.
Posted: 19 Aug 2020 | Published: 19 Aug 2020

Tala Security

10 Cybersecurity Best Practices for Securing Remote Workers
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: As a result of the pandemic, organizations are being forced to re-allocate their resources in order to focus on securing their predominantly remote workers. In order to help organizations adjust to the new normal, Arctic Wolf created this checklist of 10 WFH best practices – read on to get started.
Posted: 31 Aug 2020 | Published: 31 Aug 2020

Arctic Wolf Networks, Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info