IT Management  >   Systems Operations  >   Security  >  

Network Threats

RSS Feed   
Network Threats White Papers (View All Report Types)
 
The Role of Kubernetes in Cloud Security
sponsored by Lacework
WHITE PAPER: Adoption of Kubernetes has skyrocketed in the last few years, but knowledge of the platform is still lacking. Download this white paper to learn about the role of Kubernetes in cloud security and how the landscape of security and DevOps is rapidly changing.
Posted: 07 Aug 2019 | Published: 07 Aug 2019

Lacework

Enabling Effective Data Protection
sponsored by InteliSecure
WHITE PAPER: Today, every company faces the potential for data loss. Threats are numerous and are coming from both internal and external actors. The need to quickly enable an effective data protection program has never been greater. In this white paper, learn how to shift your data protection approach to prioritize critical data asset protection.
Posted: 25 Sep 2019 | Published: 25 Sep 2019

InteliSecure

Privileged Access Management in the Modern Threatscape
sponsored by Centrify Corporation
WHITE PAPER: Privileged access remains the preferred vector for attackers, and most organizations aren't taking the very basic steps to secure it. Dive into this 2019 Centrify Privileged Access Management Survey to learn about their findings for securing the modern threatscape with zero trust privilege.
Posted: 04 Sep 2019 | Published: 19 Feb 2019

Centrify Corporation

Securing Cloud-Native Kubernetes Applications
sponsored by Radware
WHITE PAPER: When businesses look to optimize and accelerate application development life cycles and deliver their applications in public clouds, security becomes a greater challenge. In this white paper, learn how to ensure the timely development and deployment of secure applications across hybrid computing environments.
Posted: 23 Oct 2019 | Published: 23 Oct 2019

Radware

Using MITRE ATT&CK in Threat Hunting and Detection
sponsored by LogRhythm, Inc.
WHITE PAPER: ATT&CK can be used in many different ways to improve cybersecurity efforts. This white paper focuses on how you can use ATT&CK to enhance, analyze and test your threat detection efforts. Download this white paper to learn how you can ensure comprehensive, up-to-date, and verifiable threat detection.
Posted: 10 Sep 2019 | Published: 10 Sep 2019

LogRhythm, Inc.

Threat Hunting 101: 8 Threat Hunts You Can Do with Available Resources
sponsored by LogRhythm, Inc.
WHITE PAPER: In this white paper, explore the 8 types of threat hunts that you can use to spot suspicious abnormalities that might be a leading or active indicator of threat activity.
Posted: 27 Aug 2019 | Published: 27 Aug 2019

LogRhythm, Inc.

Managing Risk in the Digital Era
sponsored by Cyber-Ark Software
WHITE PAPER: It’s no secret that businesses must embed cybersecurity into their digital transformation programs to help mitigate threats and manage risk. In this white paper, CISOs reveal their digital transformation secrets to success when managing risk in the digital era.
Posted: 08 Nov 2019 | Published: 08 Nov 2019

Cyber-Ark Software

Exposing PeopleSoft Self-Service Applications to the Internet
sponsored by Appsian
WHITE PAPER: Despite the benefits of opening applications like PeopleSoft for remote access, security ramifications are a major concern. So how do organizations maintain secure when access to PeopleSoft is available outside a secure corporate network? In this white paper, learn how you can achieve a secure remote access environment for PeopleSoft.
Posted: 12 Aug 2019 | Published: 12 Aug 2019

Appsian

The 5 New Rules to Secure Dynamic Data Center and Clouds
sponsored by Illumio
WHITE PAPER: In this white paper, learn about a different approach to security—one that is adaptive, protects from the inside out, and decouples security from the underlying infrastructure.
Posted: 10 Sep 2019 | Published: 10 Sep 2019

Illumio

Keeping Fraud Detection Software Aligned With the Latest Threats
sponsored by SAS
WHITE PAPER: Fraud and financial crimes weren't considered serious issues until the 1980s. Since then, they have become commonplace. As fraud changes and evolves, organizations must keep anti-fraud software current to detect new and emerging threats. In this white paper, learn how SAS Visual Investigator can help organizations do this.
Posted: 07 Aug 2019 | Published: 07 Aug 2019

SAS
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement