IT Management  >   Systems Operations  >   Security  >  

Threat Mitigation

RSS Feed   
Threat Mitigation White Papers (View All Report Types)
 
The Practical Executive's Guide to Data Loss Prevention
sponsored by Forcepoint
WHITE PAPER: As more and more companies are encouraging their employees to work from anywhere, on any device, data loss prevention (DLP) has evolved from an option to a requirement. Download this whitepaper for insightful guidance on implementing DLP.
Posted: 11 Oct 2019 | Published: 11 Oct 2019

Forcepoint

Detecting and Preventing Cybercrime and Fraud
sponsored by Concur Technologies
WHITE PAPER: In this white paper, explore what CFOs from some of Australia's leading businesses have to say about their cybercrime and fraud experiences and the risks facing their businesses today. Also, explore advice for businesses looking to tackle fraud.
Posted: 18 Sep 2019 | Published: 18 Sep 2019

Concur Technologies

Winning the Battle Over Passwords
sponsored by OneLogin
WHITE PAPER: Companies worldwide are in a war against cybercriminals. It's ongoing with no end in sight, and every company is at risk. Access credentials, particularly passwords, are at the heart of the battle because hackers are trying to obtain them. In this white paper, explore the dangers of poor passwords and learn how companies can secure them now.
Posted: 29 Jul 2019 | Published: 29 Jul 2019

OneLogin

Solving the Cyber Skills Crunch: A New Model for Cybersecurity
sponsored by Cyberfort
WHITE PAPER: Organizations are continuing to struggle to attract cybersecurity staff with the right level of experience and knowledge at the right price. An external cyber partner can help organizations to bypass this ongoing cyber skills shortage. In this white paper, learn how partnering with experienced cybersecurity experts can help your businesses.
Posted: 23 Sep 2019 | Published: 23 Sep 2019

Cyberfort

Evaluation Criteria for Choosing an ICS Cybersecurity Monitoring System
sponsored by Claroty
WHITE PAPER: A rapidly changing threat landscape, combined with convergence between traditional IT and industrial control networks is having a dramatic impact on the risk to industrial control systems. In this white paper, explore key criteria leading organizations are using to evaluate and select an appropriate monitoring system for industrial networks.
Posted: 27 Sep 2019 | Published: 27 Sep 2019

Claroty

Cisco Cybersecurity Series 2019: Hunting for Hidden Threats
sponsored by Cisco Umbrella
WHITE PAPER: In the latest Cisco Umbrella Cybersecurity Report, explore the ins and outs of threat hunting and a how-to guide for creating a threat hunting team at your organization.
Posted: 01 Oct 2019 | Published: 01 Oct 2019

Cisco Umbrella

What Makes Real Threat Intelligence
sponsored by Webroot
WHITE PAPER: This white paper will arm you with a set of criteria to gauge threat intelligence by its source, intended audience, and use cases to help narrow down the field to a few basic types. Read on to learn more.
Posted: 01 Aug 2019 | Published: 01 Aug 2019

Webroot

Succeeding at the Intersection of Security and Privacy
sponsored by Virtru
WHITE PAPER: This white paper covers the intersection of the security and privacy industries, incorporating how privacy laws, cybersecurity challenges and increased attention have affected the crossover of these spaces. Read on to learn more.
Posted: 03 Sep 2019 | Published: 03 Sep 2019

Virtru

Top 5 Reasons Why Savvy MSPs Are Adopting Managed Security Services
sponsored by Avast Software
WHITE PAPER: Small and medium-sized businesses (SMBs) are under attack by a variety of cyberthreats, but these organizations either do not realize how vulnerable they are or do not have the necessary time, resources, or skills to address the issues. This white paper introduces managed security services as a key strategy for evolving your business.
Posted: 11 Oct 2019 | Published: 31 May 2019

Avast Software

Rethinking Cyber Operations: Creating Clarity Out of Complexity
sponsored by Optiv
WHITE PAPER: Rethinking and evolving cyber operations is key to reducing complexity and achieving a cybersecurity model aligned to organizational risk. Download this white paper for insights into the innovation landscape, key symptoms of lagging cyber operations and a roadmap that organizations can follow to achieve a new cyber operations paradigm.
Posted: 06 Aug 2019 | Published: 06 Aug 2019

Optiv
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement