IT Management  >   Systems Operations  >   Security  >  

Software Security Threats

RSS Feed   
Software Security Threats White Papers (View All Report Types)
IDC Workbook: Best Practices for Cloud Security
sponsored by ExtraHop
WHITE PAPER: As public cloud adoption grows in popularity, the cyberthreats that pose serious risk become more complex and occur more frequently. To help security leaders navigate today’s cloud security landscape, IDC wrote the following workbook, which overviews common threats, security best practices and an outline of the shared responsibility model.
Posted: 18 Jun 2020 | Published: 18 Jun 2020


An Introduction to Ranking a Vulnerability’s Priority Based on its Network Context
sponsored by Delve
WHITE PAPER: To help organizations quantify their vulnerabilities, they need to understand its context within their network. Download this white paper for an introductory look at contextual prioritization, an approach to vulnerability risk scoring that works to understand context and uses that information to identify potential risk areas.
Posted: 07 Jul 2020 | Published: 07 Jul 2020


Benefits of AI and Machine Learning to Detect and Remediate Data Leaks
sponsored by CybelAngel
WHITE PAPER: During a time where cyberattacks are more common than ever before, enterprises are now being tasked with securing data that is often stored outside an organization’s IT infrastructure. Read on to learn how AI and machine learning can be used to augment your security and ensure your company can deal with critical issues as soon as they happen.
Posted: 22 Jun 2020 | Published: 22 Jun 2020


COVID­19: Address the Next Black Swan in Your BCP
sponsored by IANS Research
WHITE PAPER: The rapid shift towards remote work exposed glaring gaps in business continuity plans (BCPs) across the globe, leading to organizations reconsidering what should be incorporated in their BCP. This Ask-An-Expert white paper from IANS Research provides best practices for building a pandemic BCP. Read on to get started.
Posted: 16 Jun 2020 | Published: 06 Apr 2020

IANS Research

Improve Your Privacy Strategy
sponsored by TITUS
WHITE PAPER: As data privacy concerns and regulatory compliance requirements grow more complex and stringent, IT and security teams are tasked with the increasingly difficult task of improving their organization’s privacy strategy. This white paper highlights how Titus’ Accelerator for Privacy tool can help enhance current capabilities. Read on to learn more.
Posted: 22 Jun 2020 | Published: 22 Jun 2020


Why IDS is Ineffective for Linux Production Environments
sponsored by Capsule8
WHITE PAPER: While intrusion detection systems (IDS) may have been a core component in traditional security strategies, they lack the scalability, agility and visibility to keep up with today’s fast-paced cyberattacks. Download this white paper to discover 9 ways IDS in no longer a viable security option and how to detect threats in modern environments.
Posted: 08 Jun 2020 | Published: 08 Jun 2020

Enhance the Safety and Security of Your People, Assets and Operations
sponsored by Dell Technologies and Intel
WHITE PAPER: For organizations looking to keep pace with today’s dynamic world, the addition of each new IoT device requires storage, security, and performance considerations. In this white paper, take a closer look at today’s IoT challenges and discover how Dell is working to address them. Learn more about Dell solutions powered by Intel®
Posted: 01 Jun 2020 | Published: 01 Jun 2020

Dell Technologies and Intel

2020 SANS Network Visibility and Threat Detection Survey
sponsored by ExtraHop
WHITE PAPER: Today’s networks – which embrace cloud, encryption, IoT and third-party vendor access – are becoming more complex, making visibility and security difficult. The following SANS report provides an in-depth look at the results from a recent network visibility and threat detection survey. Read on to view current trends and challenges.
Posted: 18 Jun 2020 | Published: 18 Jun 2020


Ensuring Remote Workers Remain Protected
sponsored by HP Inc
WHITE PAPER: As our world is increasingly changed by the ongoing pandemic, IT departments have seen an ever-increasing amount of cyber attacks and other digital threats. Avoiding these attacks requires a careful combination of the right hardware and the appropriate best practices. Read on to learn some of these techniques from HP.
Posted: 27 May 2020 | Published: 27 May 2020

HP Inc

Better Protection. Less Tools. 7 Benefits of Security Consolidation.
sponsored by Koncise
WHITE PAPER: Security architecture is difficult to nail down. With a myriad of companies specializing in various technologies, creating a good posture can be a time-consuming task.What you may not know is that reliance on one vendor alone can provide benefits not noticed until they are closely examined. This whitepaper gives an overview of vendor consolidation.
Posted: 06 Jul 2020 | Published: 06 Jul 2020


About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.


All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info