IT Management  >   Systems Operations  >   Security  >  

Security Breaches

RSS Feed   
Security Breaches White Papers (View All Report Types)
 
Enhanced Security for AWS
sponsored by Lacework
WHITE PAPER: In this security solution brief, discover how Lacework uses threat detection, compliance, and automated security monitoring for workloads and accounts running in AWS and in multi-cloud environments.
Posted: 06 Aug 2019 | Published: 06 Aug 2019

Lacework

Utility Regulations Demand Robust Third-Party Risk Management
sponsored by BitSight
WHITE PAPER: In this white paper, learn how utilities organizations can comply with regulations and prevent cyberattacks, data breaches, and potential physical harm by using a robust third-party risk management program.
Posted: 18 Jul 2019 | Published: 18 Jul 2019

BitSight

The Practical Executive's Guide to Data Loss Prevention
sponsored by Forcepoint
WHITE PAPER: There has been much confusion in the marketplace regarding data loss prevention (DLP) controls. As a result, organizations that want to protect their confidential data and comply with laws and regulations are often unsure where to turn. In this white paper, explore a 9-step process for implementing and executing a data protection strategy.
Posted: 10 Jun 2019 | Published: 10 Jun 2019

Forcepoint

How to Address the Top Five Human Threats to Your Data
sponsored by ALTR
WHITE PAPER: Data security threats seem to be everywhere and growing. Even the most hardened, off-the-grid security experts acknowledge that it is impossible to be 100% secure. Addressing top threats to your data is the first step in building a layered, data-centric approach to data security and privacy. Read on to learn how you can get started.
Posted: 07 Jun 2019 | Published: 07 Jun 2019

ALTR

Stay Protected with a Layered Network Defense
sponsored by Trend Micro, Inc.
WHITE PAPER: Learn why standalone next-generation intrusion prevention systems (NGIPS) are still an enterprise requirement.
Posted: 10 Jul 2019 | Published: 10 Jul 2019

Trend Micro, Inc.

Preventing Ransomware in the cloud
sponsored by Lacework
WHITE PAPER: This white paper zeroes in on the various components of a cloud environment and offers best practices for creating a secure infrastructure. Read on for 11 ways to ensure strong security best practices in your organization.
Posted: 12 Aug 2019 | Published: 12 Aug 2019

Lacework

The SIEM Buyer's Guide for 2020
sponsored by Splunk
WHITE PAPER: The importance of a SIEM solution in today's enterprise is magnified by the growing sophistication of attacks and the use of cloud services which only increases the attack surface. In this buyer's guide, learn everything you need to know about a SIEM including what it is, its evolution and how to determine if it is right for your organization.
Posted: 19 Aug 2019 | Published: 19 Aug 2019

Splunk

Email Security Risk Assessment
sponsored by Mimecast
WHITE PAPER: Many organizations think their current email security systems are up to the task of protecting them from phishing. Unfortunately, many of them fall short and don't keep their organizations safe. In this report, uncover research from Mimecast's study on the amount of unwanted and dangerous emails missed by incumbent email security systems.
Posted: 25 Jun 2019 | Published: 25 Jun 2019

Mimecast

Understand How SSO and MFA Improve Security
sponsored by OneLogin
WHITE PAPER: IT departments are in a tough spot when it comes to security. The most common attacks are aimed at obtaining user credentials, with the password being the critical element. In this white paper, learn why secure SSO and risk-aware MFA are the golden keys to protecting your organization's sensitive information.
Posted: 26 Jul 2019 | Published: 26 Jul 2019

OneLogin

Acalvio Deception and the MITRE ATT&CK Framework
sponsored by Acalvio
WHITE PAPER: The Cyber Kill Chain has long been used to describe the stages of an attack commonly used to compromise sensitive assets. Unfortunately, too much emphasis has been placed on the initial exploitation stages, and not enough on the later stages. To overcome this problem, MITRE has developed ATT&CK. Read on to learn about the framework today.
Posted: 26 Jun 2019 | Published: 26 Jun 2019

Acalvio
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement