IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Push Messaging

RSS Feed   
Push Messaging White Papers (View All Report Types)
 
Evaluating a Penetration Testing Company
sponsored by InteliSecure
WHITE PAPER: Regardless of your company’s reasons for requiring pen testing, a primary factor in your test’s success is picking a provider who is capable of meeting your company’s specific goals. So where do you start? Use this 3-step guide to define your selection process and narrow down your choices.
Posted: 08 Oct 2019 | Published: 08 Oct 2019

InteliSecure

2019 State of OT/ICS Cybersecurity Survey
sponsored by Nozomi Networks
WHITE PAPER: In this 2019 SANS OT/ICS cybersecurity survey, explore the challenges with design, operation and risk management of an industrial control system (ICS), its cyber assets and communication protocols, and supporting operations.
Posted: 18 Sep 2019 | Published: 12 Jun 2019

Nozomi Networks

How To Achieve And Maintain Compliance For Your Organization's Electronic Communications Data
sponsored by Smarsh
WHITE PAPER: When it comes to the rapid adoption of modern communication and collaboration tools, it's imperative organizations get ahead of capturing and archiving significant volumes of data. In this white paper, learn how to address common compliance challenges that are associated with electronic communications data.
Posted: 27 Sep 2019 | Published: 27 Sep 2019

Smarsh

Why It's Time for Your Organization to Explore Next-Generation Antivirus
sponsored by Blackberry Cylance
WHITE PAPER: BlackBerry Cylance is an AI platform that helps small businesses prevent, detect, and respond to threats. In this white paper, discover why it's time for your organization to explore next-generation antivirus.
Posted: 19 Sep 2019 | Published: 19 Sep 2019

Blackberry Cylance

Threat Intelligence: Far-Fetched Idea or Must-Have Security Tactic? How Every Ciso Can Make It a Priority
sponsored by Mimecast
WHITE PAPER: If threat intelligence isn't part of your cyber resilience strategy in some capacity, you have a massive gap on your hands. And you may be blindsided by a phishing attack, malware incident or worse. In this white paper, learn how CISOs can make threat intelligence a priority in their cyber resilience planning.
Posted: 24 Sep 2019 | Published: 24 Sep 2019

Mimecast

Cyber Insecurity: Managing Threats from Within
sponsored by Proofpoint
WHITE PAPER: Data breaches are having increasingly disastrous consequences for business. Explore the frequency and severity of people-centric data breaches in this Cyber Insecurity: Managing Threats from Within white paper.
Posted: 09 Oct 2019 | Published: 09 Oct 2019

Proofpoint

Cloud Security Gaps
sponsored by Aporeto
WHITE PAPER: In this white paper, learn about application segmentation that’s based on application identity, where you can effectively segment workloads and securely build and run applications in the Zero Trust landscape of the public cloud.
Posted: 18 Oct 2019 | Published: 18 Oct 2019

Aporeto

Architecting End User Computing Solutions
sponsored by Nutanix
WHITE PAPER: What are the possible infrastructures at your disposal that will streamline and simplify EUC project completion? Download this e-book to view several options for VDI and EUC environments, and to learn how to implement them in your organization, such as converged infrastructure, hyper-converged infrastructure, and more.
Posted: 18 Oct 2019 | Published: 18 Oct 2019

Nutanix

TPCRM 101: A Guide for Beginners
sponsored by CyberGRX
WHITE PAPER: As organizations increasingly rely on third parties, their ecosystems become more vulnerable to third-party cyber risk. Implementing an effective third-party cyber risk management (TPCRM) program is essential to securing your organization's cyber ecosystem. In this white paper, learn everything you need to know about a TPCRM program.
Posted: 12 Sep 2019 | Published: 12 Sep 2019

CyberGRX

Identity and Access Management for Healthcare
sponsored by Imprivata
WHITE PAPER: 10 years ago, most health system information technology leaders didn't have Identity and Access Management (IAM) at the top of their priority lists. So, what changed? In this white paper, explore the key areas of healthcare's digital identity lifecycle, important regulations, and top security issues that have led to greater investments in IAM.
Posted: 26 Sep 2019 | Published: 26 Sep 2019

Imprivata
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement