IT Management  >   Systems Operations  >   Security  >  

Security Breaches

RSS Feed   
Security Breaches White Papers (View All Report Types)
 
5 Web Application Security Threats You Should Care About
sponsored by Oracle Dyn
WHITE PAPER: Today, threat actors can spread malicious content and execute attacks all over the world, crossing borders—and industries—in a matter of seconds. How can you protect your web applications? In this e-book learn how you can navigate the threat landscape as well as execute an intelligent approach to web application security.
Posted: 22 Mar 2019 | Published: 21 Mar 2019

Oracle Dyn

The ROI of Security Orchestration and Automation
sponsored by Rapid7
WHITE PAPER: Security operations are often slowed down by manual processes that would be better left to machines. As a result, security orchestration and automation is becoming an increasingly vital aspect of many organizations' security strategies. In this white paper, explore the benefits and value of security orchestration and automation.
Posted: 08 Apr 2019 | Published: 08 Apr 2019

Rapid7

Business Case for Web Isolation
sponsored by Menlo Security
WHITE PAPER: As cyberattacks increase in frequency and sophistication, customers feel forced to deploy an array of solutions in the hope that a best-of-breed mindset will protect their network. In this white paper, learn how Menlo Security's Isolation Platform can help companies reduce the financial risk of cyberattacks.
Posted: 05 Apr 2019 | Published: 05 Apr 2019

Menlo Security

The Evolution of Mobile Security
sponsored by Symantec
WHITE PAPER: Given that emails containing sensitive information are routinely opened on a mobile device, implementing robust security controls on these devices should be a top priority. In this white paper, learn how to break down the barriers that separate mobile security from traditional security to ensure your organization has a seamless security ecosystem.
Posted: 08 May 2019 | Published: 08 May 2019

Symantec

The Convergence Of Physical And Logical Access: What It Really Means For An Organization's Security
sponsored by HID Global
WHITE PAPER: For many security professionals, recent high-profile data breaches have shifted attention to external cyberthreats. In this white paper, learn how by addressing both physical and logical access in a more unified approach, organizations can reduce their risk for a costly breach while also improving user experience and operational efficiency.
Posted: 10 Apr 2019 | Published: 10 Apr 2019

HID Global

Making the Move to a Cloud Native WAF
sponsored by Oracle Dyn
WHITE PAPER: While many companies rely on appliance-based WAF solutions, the market requirements for web application security are shifting toward an edge security platform approach that combines a variety of protections suited to distributed cloud environments. Read this e-book and discover 5 reasons to consider a cloud-native web application firewall (WAF).
Posted: 21 Mar 2019 | Published: 21 Mar 2019

Oracle Dyn

Maturing a Threat Intelligence Program
sponsored by ThreatConnect
WHITE PAPER: In order to fully harness the power of threat intelligence, your organization must make the case for an intelligence-driven security approach and identify the right people to staff the program. In this white paper, explore how ThreatConnect's Threat Intelligence Maturity Model can help you better apply threat intelligence at your organization.
Posted: 01 May 2019 | Published: 01 May 2019

ThreatConnect

Using Indicators to Deal with Security Attacks
sponsored by ManageEngine
WHITE PAPER: Download this white paper to understand the unique capabilities of these indicators, the differences between them, and the steps to configure a SIEM platform to detect indicators of compromise (IoCs) and indicators of attack (IoAs).
Posted: 09 May 2019 | Published: 09 May 2019

ManageEngine

What is SOAR, Exactly?
sponsored by D3 Security
WHITE PAPER: A SOAR platform incorporates many different functions and activities. These functions including orchestration, automation incident management and report. In this white paper, learn about main requirements for each function in a SOAR. Also, explore how SOAR tools can help organizations to meet their goals.
Posted: 03 Apr 2019 | Published: 03 Apr 2019

D3 Security

2018 Threat Report
sponsored by CenturyLink
WHITE PAPER: As cyberthreats proliferate, organizations often seek to find the silver bullet for cybersecurity issues. With so many differing viewpoints of the threat landscape, identifying actionable intelligence is difficult. In this threat report, explore key insights on what the CenturyLink Threat Research Labs sees across the CenturyLink global backbone.
Posted: 01 May 2019 | Published: 01 May 2019

CenturyLink
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement