IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Information Security Policies

RSS Feed   
Information Security Policies White Papers (View All Report Types)
 
Understanding Phishing: Text Direction Deception!
sponsored by Inky Technology
WHITE PAPER: Phishing scams continue to evolve, and attackers apply an ever-growing bag of tricks to fool recipients as well as email protection tools. In this edition of Understanding Phishing, the cybersecurity experts at INKY dissect a recently uncovered tactic which uses Cascading Style Sheets (CSS) to bypass security protocols by mixing scripts.
Posted: 30 Sep 2020 | Published: 30 Sep 2020

Inky Technology

EXECUTIVE BRIEF: WHY SECURE MOBILE ACCESS IS A STRATEGIC BUSINESS IMPERATIVE
sponsored by SonicWall
WHITE PAPER: According to a recent study, 75% of organizations consider flex work to be the new norm. However, in order to support their distributed workforce, organizations need to ensure they make secure mobile access a strategic imperative. Download this white paper to learn more about secure mobile access and discover why organizations are embracing it.
Posted: 29 May 2020 | Published: 29 May 2020

SonicWall

Auth0’s Approach to Information Security Identity in the Real World: the Tao of Extensibility
sponsored by Auth0
WHITE PAPER: Identity solutions, like any cybersecurity tool, require more than just strength and ability – they need to be flexible in order to meet the needs of your business environment and fit into your strategy. This white paper takes a closer look at the role of extensibility and practicality for identity solutions, read on to learn more.
Posted: 02 Jul 2020 | Published: 02 Jul 2020

Auth0

Smarter Data Protection with Machine Learning
sponsored by HelpSystems
WHITE PAPER: As data grows in its volume and value, organizations should ensure their data privacy capabilities are poised to address today’s cyberthreats and compliance requirements. Read this white paper and discover how machine learning and artificial intelligence can enhance data security programs.
Posted: 08 Dec 2020 | Published: 08 Dec 2020

HelpSystems

Keeping your Cloud out of the News
sponsored by DivvyCloud
WHITE PAPER: It’s a common misconception that embracing cloud requires forfeiture of security. In fact, Gartner predicts that through 2022, at least 95% of cloud security failures will be the customer’s fault, not the provider. This white paper illustrates where the faults lie and explores how DivvyCloud may be able to help.
Posted: 14 Apr 2020 | Published: 14 Apr 2020

DivvyCloud

THE TRUE COST OF A DDoS ATTACK
sponsored by Radware
WHITE PAPER: Many executives make the mistake of viewing cybersecurity strictly as a cost center. Organizations must reevaluate how the balance investment vs. risk equation and alter how and when they implement cybersecurity. In this Radware guide, learn the true cost of a DDoS attack, and see why it makes sense to invest now, not pay later.
Posted: 26 Jan 2021 | Published: 26 Jan 2021

Radware

Insights into attacker activity in compromised email accounts
sponsored by Barracuda
WHITE PAPER: Spear phishing and email account takeovers are proving to be a lucrative and accessible opportunity for cybercriminals – and attack methods are only growing more sophisticated. This report provides an overview of today’s top email security threats and offers defensive best practices for protecting your inboxes.
Posted: 12 Aug 2020 | Published: 31 Jul 2020

Barracuda

The Changing Face of Data Security: 2020 Thales Data Threat Report
sponsored by Thales
WHITE PAPER: Thales, in conjunction with IDC, provides a comprehensive Data Threat Report each year designed to analyze the key trends and challenges as they relate to data breaches and securing critical data. Download this year’s Data Threat Report to learn more about the effects of digital transformations, cloud environments, and more.
Posted: 13 Jul 2020 | Published: 31 Mar 2020

Thales

Improve Your Privacy Strategy
sponsored by HelpSystems
WHITE PAPER: Data privacy is critical to get right – but in the era of cloud, standalone data privacy tools, like Microsoft Azure Information Protection, may not be enough. Read this white paper to learn about some of the common pitfalls of Azure and how your organization can extend Azure’s data security capabilities to enhance your privacy strategy.
Posted: 09 Dec 2020 | Published: 09 Dec 2020

HelpSystems

The 2020 State Of Security Operations
sponsored by Palo Alto Networks
WHITE PAPER: A successful data breach can have devastating impacts – from loss of data to loss of customer trust and potential litigation. This Forrester report aims to identify and understand the challenges facing security operations (SecOps) teams as they work to manage the growing threat of sophisticated data breaches.
Posted: 01 Sep 2020 | Published: 30 Apr 2020

Palo Alto Networks
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences