IT Management  >   Systems Operations  >  

Active Security Solutions

RSS Feed   
Active Security Solutions Reports
Black Hat 2018 Hacker Survey Report
sponsored by Thycotic
RESEARCH CONTENT: Discover the hacker perspective on vulnerabilities and attack vectors they find easiest to exploit and better understand how to protect your organization.
Posted: 27 Sep 2018 | Published: 27 Sep 2018


How to Protect Privileged Accounts with an Incident Response Plan
sponsored by Thycotic
RESOURCE: Today, cybercriminals can create a blueprint of the entire network and operations. Discover the telltale indicators you're under attack and the plans you need to have in place to protect your privileged accounts.
Posted: 28 Sep 2018 | Published: 28 Sep 2018


Closing the Communication Gap Around Security & Digital Transformation
sponsored by Rackspace
EBOOK: Despite cybersecurity being front of mind for board members, many admit they do not have a strategy to tackle the 'how, what, where and why' questions related to data protection. Read on for an in-depth explanation of why the board and ITDMs need to close the communication gap around security and digital transformation, today.
Posted: 04 Oct 2018 | Published: 04 Oct 2018


Trends in the Cost of Web Application & Denial of Service Attacks
sponsored by Akamai Technologies
ANALYST REPORT: Based on the research from the Ponemon Institute, organizations can face millions of dollars in revenue loss from web application attacks and denial-of-service (DoS) attacks. Read on to learn some of the key findings and trends of these attacks.
Posted: 15 Oct 2018 | Published: 30 Sep 2017

Akamai Technologies

PCI Compliance: Employee Awareness is Key
sponsored by MediaPRO
WHITE PAPER: Learn how to arm your employees with the knowledge they need to keep your customers' data secure, while mastering the PCI-DSS standards.
Posted: 28 Sep 2018 | Published: 28 Sep 2018


Respond to Business Risks in Real-Time with Integrated Risk Management
sponsored by ServiceNow
EBRIEF: Learn how to transform your GRC processes to increase performance across your organization and respond to business risks in real-time.
Posted: 04 Oct 2018 | Published: 04 Oct 2018


The Need for an Integrated Security Strategy
sponsored by Fortinet, Inc.
ANALYST REPORT: CISOs are seeking ways to leverage existing security investments to bridge the divide between largely siloed security systems. An integrated security strategy can help. Download this report for some Q&A on the advantages of implementing an integrated security strategy in your organization.
Posted: 11 Oct 2018 | Published: 30 Jun 2018

Fortinet, Inc.

Is Your Software Simple? Assess How Well the PAM Software You Choose Supports Your Goals
sponsored by Thycotic
RESOURCE: Is the Privileged Access Management (PAM) software you chose right for your business? Take this simple test to find out.
Posted: 05 Oct 2018 | Published: 05 Oct 2018


Just the TIP of the Iceberg: Categorizing the Evolving Threat Intelligence Platform
sponsored by ThreatConnect
WHITE PAPER: Discover why ThreatConnect was determined to create a platform that had flexibility, extensibility, utility and process automation to help security teams effectively detect threats.
Posted: 09 Oct 2018 | Published: 27 Apr 2018


SIEM + Threat Intelligence: Quickly Identify the Threats that Matter to You
sponsored by ThreatConnect
WHITE PAPER: SIEMs are a powerful tool for collecting and correlating event data and have a well-deserved place within your security infrastructure. But, to truly shine they need to be supported by a cybersecurity platform. Read on to find out how your organization can enhance its SIEM with a cybersecurity platform, today.
Posted: 03 Oct 2018 | Published: 03 Oct 2018


About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement