IT Management  >   Systems Operations  >   Security  >  

Security Administration

RSS Feed   
Security Administration White Papers (View All Report Types)
Threat Report: TeamTNT: The First Cryptojacking Worm to Steal AWS Credentials
sponsored by Cysiv
WHITE PAPER: Because most online services now run in the cloud (AWS, Azure, Google Cloud, etc.), these cloud service providers have become an important new target for cybercriminals to install cryptojacking malware and to mine cryptocurrency. The Cysiv threat research team has analyzed this malware – read their report to learn what they discovered.
Posted: 27 Oct 2020 | Published: 19 Oct 2020


Akamai Moves into Web Browser Security with Page Integrity Manager
sponsored by Akamai Technologies
WHITE PAPER: Malicious script activity has emerged as a new way for cybercriminals to conduct credit card skimming and other types of attacks. This 451 Research report provides a comprehensive overview of the Akamai Page Identity Manager, designed to combat this growing threat.
Posted: 12 Oct 2020 | Published: 22 May 2020

Akamai Technologies

Tips for Preparing an RFP for SOC-as-a-Service & Evaluation Criteria
sponsored by Cysiv
WHITE PAPER: A 24/7 SOC identifies, investigates and resolves threats that target infrastructure, sensitive data, and ongoing business operations. But building a SOC can be time-consuming, complex and expensive, which is why organizations are turning to SOC-as-a-Service (SOCaaS). Read this guide to learn tips for preparing an RFP for a SOCaaS provider.
Posted: 28 Oct 2020 | Published: 28 Oct 2020


Mapping the Ransomware Landscape
sponsored by Claranet
WHITE PAPER: By 2021, ransomware is expected to have a global impact of $20 billion – these threats are growing in their severity, frequency and complexity. This guide from Claranet explores changes in the threat landscape, highlights emerging variants and offers best practices for your organization to implement – read on to get started.
Posted: 09 Nov 2020 | Published: 09 Nov 2020


Isolation Best Practices for Financial Services Institutions
sponsored by Menlo Security
WHITE PAPER: Phishing and ransomware attacks, while not necessarily new, are becoming increasingly sophisticated, hard to detect, and dangerous. Read these isolation best practices for yourself to learn how smart financial service institutions are applying this relatively simple concept to stop dangerous attacks before they can reach vulnerable users.
Posted: 02 Nov 2020 | Published: 02 Nov 2020

Menlo Security

Next Generation Endpoint Protection
sponsored by Claranet
WHITE PAPER: Traditional cybersecurity is no match for today’s endpoint security threats – so does that mean antivirus (AV) is dead? This buyer’s guide provides an overview of why traditional tactics – like AV – aren’t working, a new approach to endpoint security, and an evaluation of next-generation endpoint protection vendors – read on to get started.
Posted: 23 Nov 2020 | Published: 23 Nov 2020


Small Business Security: 4 Steps to Success
sponsored by Claranet
WHITE PAPER: Small businesses are popular targets for today’s hackers. However, by investing in right cybersecurity tools, these small businesses can significantly reduce their risk and facilitate good business growth. The following white paper provides 4 steps for small business cybersecurity success – read on to get started.
Posted: 09 Nov 2020 | Published: 09 Nov 2020


Turning Over a New Leaf in Your Identity and Access Management Strategy
sponsored by Ivanti
WHITE PAPER: The transition from traditional role-centric identity and access management (IAM) to an effective technology-enabled, policy-driven strategy is a challenge. But a policy-driven path that looks more holistically at identity will be more dynamic and deliver more power and flexibility to IT. Take a look at this white paper to learn more.
Posted: 25 Nov 2020 | Published: 25 Nov 2020


Upgrading Existing Security Systems to Agile Quantum-Safe With Thales Luna HSMs And Thales High-Speed Encryptors
sponsored by Thales
WHITE PAPER: The impending arrival of quantum computing is powerful enough to pose a threat to today’s encryption. View this brief to learn about Thales Luna Hardware Security Modules, Thales High Speed Encryptors, and ISARA’s quantum-safe solutions, which aim to provide quantum-safe security while maintaining backward compatibility with existing systems.
Posted: 02 Nov 2020 | Published: 28 Feb 2020


Success Patterns for Supply Chain Security
sponsored by Panorays
WHITE PAPER: Threats targeting supply chains are on the rise, impacting businesses across all 3 elements of the confidentiality, integrity and availability (CIA) triad. The following SANS whitepaper further explores these challenges and highlights the key components of an effective supply chain security program – read on to get started.
Posted: 24 Nov 2020 | Published: 24 Nov 2020


About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.


All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info