Business of Information Technology  >   Business Management  >   Financial Management  >   Budgeting  >   IT Spending  >  

IT Security Spending

RSS Feed   
IT Security Spending White Papers (View All Report Types)
 
2020 APPLICATION SECURITY OBSERVABILITY REPORT
sponsored by Contrast Security
WHITE PAPER: Nearly 96% of applications contain at least one vulnerability, yet only 26% have a serious vulnerability – modern vulnerability management, especially when it comes to applications – is about effectively prioritization. For more findings and guidance for building an application security strategy, read this research report.
Posted: 21 Sep 2020 | Published: 13 Jul 2020

Contrast Security

Faster Threat Detection and Response with Data Science and Next-gen SIEM
sponsored by Cysiv
WHITE PAPER: Download this white paper for a closer look at Cysiv’s data science-driven approach to more quickly, effectively and efficiently investigate cyber threats within their next-gen security information and event management (SIEM) platform.
Posted: 17 Jul 2020 | Published: 22 Apr 2020

Cysiv

Evaluating Client-side Web Security: Questions to Ask Your Vendor
sponsored by Tala Security
WHITE PAPER: When it comes to online interactions, protecting end-users from Magecart, XSS and other data theft attacks is critical to safeguarding both their sensitive data as well as brand reputation. This article offers 3 questions you should be asking your web security vendor – and why they matter.
Posted: 19 Aug 2020 | Published: 19 Aug 2020

Tala Security

Covid-19 & the New Normal for E-commerce
sponsored by Tala Security
WHITE PAPER: While online shopping has increased dramatically since the beginning of the pandemic, so too have threats targeting shoppers and other users. In fact, Magecart attacks have increased by 20%. Read on to explore how COVID-19 is shifting the e-commerce landscape and discover the long-term implications of these changes.
Posted: 20 Aug 2020 | Published: 20 Aug 2020

Tala Security

Stimulus Phishing Report: The Newest Wave of Pandemic Phishing Attacks
sponsored by Inky Technology
WHITE PAPER: Phishing attacks have always been one of the most prominent and pervasive cyberthreats facing organizations – but the 2020 pandemic gave rise to a new wave of phishing tactics and entry points. Read this report for a closer analysis (with examples) of the phishing tactics facing today’s inboxes.
Posted: 02 Dec 2020 | Published: 02 Dec 2020

Inky Technology

THE EVOLUTION OF RANSOMWARE: HOW TO PROTECT ORGANIZATIONS FROM NEW TRENDS AND METHODS
sponsored by Crowdstrike
WHITE PAPER: Each year, ransomware attacks grow increasingly frequent and successful – leading to more dollars lost. In fact, by 2021 global damages from ransomware is expected to reach $20 billion. In this white paper, you’ll discover a comprehensive overview of the evolution of ransomware, common trends and how to protect against it.
Posted: 19 May 2020 | Published: 19 May 2020

Crowdstrike

Using Farsight Passive DNS
sponsored by Farsight Security
WHITE PAPER: For a hacker, the efficiency and ease-of-use of DNS-related phishing attacks is second to none. In fact, one Verizon study found phishing to be the #1 cause of data breaches. Download this white paper to learn more about Farsight’s Passive DNS tool, which embraces NIST’s 4-phase incident response lifecycle to help you thwart DNS-related threats.
Posted: 15 Jun 2020 | Published: 31 Jul 2019

Farsight Security

How to Ensure NIAP Mobile Application Compliance
sponsored by NowSecure
WHITE PAPER: Mobile applications allow for improved business operations and more seamless experience. However, for federal agencies, the heavy burden of ensuring each app meets the National Information Assurance Partnership (NIAP) security requirements causes a massive roadblock. Download this white paper to learn ease this headache.
Posted: 19 Jun 2020 | Published: 19 Jun 2020

NowSecure

GUIDE TO AV REPLACEMENT
sponsored by Crowdstrike
WHITE PAPER: As cyberattacks evolve into most sophisticated and directed attacks, traditional detection methods, like antivirus (AV) tools, grow increasingly insufficient. Download this guide to better understand the critical information needed to make an informed decision about replacing your AV or endpoint security tools.
Posted: 08 Jun 2020 | Published: 08 Jun 2020

Crowdstrike

The State of Email Security 2020
sponsored by Mimecast
WHITE PAPER: Year after year email remains the most popular attack vector, and 2020 was no exception. In fact, 60% of organizations believe it’s inevitable they will suffer an email-born attack in the coming year. So, how can organizations defend their inboxes? Download this white paper for email security insights and guidance.
Posted: 16 Jun 2020 | Published: 16 Jun 2020

Mimecast
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences