IT Management  >   Systems Operations  >  

Active Security Solutions

RSS Feed   
Active Security Solutions Reports
 
Royal Holloway: The Computer Misuse Act and the characteristics of convicted hackers
sponsored by ComputerWeekly.com
RESEARCH CONTENT: In this Royal Holloway article, the authors go beyond the perpetuated stereotypes often found in media surrounding hackers by analysing the characteristics of real-life convicted hackers in the UK, who were charged under the Computer Misuse Act
Posted: 01 Apr 2021 | Published: 07 Apr 2021

ComputerWeekly.com

Why It’s Time for a Next-Gen Approach to BYOD Security, Privacy, and Productivity
sponsored by BlackBerry
DATA SHEET: As more remote employees use their own desktops, laptops and tablets, BYOD is gaining momentum. A next-generation approach to security can maximize user productivity and satisfaction, while cutting costs and allowing for better business continuity. Read the business brief to learn more.
Posted: 21 Apr 2021 | Published: 21 Apr 2021

TOPICS:  Security
BlackBerry

Secureworks: Connecting the Dots
sponsored by Dell SecureWorks
VIDEO: In this video, learn how you can use XDR to detect and respond to threats. It also explains how XDR can detect zero-day and malware-less attacks, and attackers using previously unknown tools.
Posted: 19 Mar 2021 | Premiered: 19 Mar 2021

TOPICS:  Security
Dell SecureWorks

How to speed up Splunk searches by 15x and eliminate dark data
sponsored by Sunlightio
WHITE PAPER: Enterprises are struggling to collect, manage and draw insight from their security data in reasonable timeframes and within a reasonable cost – leaving much of the data ‘dark’ or unprocessed. Learn how you can turn dark security data into real-time insight with Splunk on Sunlight.
Posted: 26 Mar 2021 | Published: 26 Mar 2021

TOPICS:  Security
Sunlightio

S7 E48 Cisco Business Critical Services For A Holistic Cisco SecureX Environment
sponsored by Cisco Systems, Inc.
PODCAST: Hear a discussion about Cisco SecureX – a unified security operations platform that automates workflows to save skilled security teams from hours of tedious manual work. You’ll also learn how supplementing SecureX with Cisco Business Critical Services can help organizations secure their workplaces and workforces in this era of increased attacks.
Posted: 26 Feb 2021 | Premiered: Dec 26, 2020

Cisco Systems, Inc.

Impacts of Cyberattacks on IoT Devices
sponsored by Palo Alto Networks
WHITE PAPER: Attack surfaces, threat vectors and vulnerabilities are 3 widely researched topics when it comes to the internet of things (IoT). However, there isn't nearly enough research on the impact successful cyberattacks have on IoT devices. Unit 42, the global threat intelligence team at Palo Alto Networks, took a closer look at this impact.
Posted: 01 Apr 2021 | Published: 01 Apr 2021

TOPICS:  Security
Palo Alto Networks

How to Become a Threat Hunter
sponsored by Cisco Systems Inc.
EGUIDE: Much of hunting is instinct, and when it comes to hunting cyberthreats, it’s no different. Threat hunters are good at what do because they aren’t as ‘by-the-book’ as other professionals. But they do have a set of learnable skills that make them successful. Download this e-guide featuring Gartner analyst John Collins to know what these skills are.
Posted: 14 Apr 2021 | Published: 07 Apr 2021

Cisco Systems Inc.

OPEN SOURCE SECURITY AND RISK ANALYSIS REPORT
sponsored by Synopsys
WHITE PAPER: Open-source security and risk analysis is crucial for every and any IT team. That’s why this report provides an in-depth snapshot of the current state of open-source security, compliance, licensing, and code quality risk in commercial software. Keep your software secure. Read the report here.
Posted: 19 Apr 2021 | Published: 19 Apr 2021

TOPICS:  Security

Servicenow Finds The Smarter Way To Segment Using Illumio
sponsored by Illumio
CASE STUDY: ServiceNow is a premier cloud platform for IT service management. When they identified the need to address a flat network and properly secure their domain controllers and core services, they knew it was time to refine their network segmentation strategy. Leverage this case study to see how Illumio’s Secure Cloud platform delivered value.
Posted: 05 Mar 2021 | Published: 05 Mar 2021

Illumio

Hitachi ID Bravura Discover
sponsored by Hitachi ID
DATA SHEET: Learn how Hitachi ID Bravura Discover delivers a powerful risk and threat assessment for both IAM and PAM solutions to help get your organization on the right track.
Posted: 12 Mar 2021 | Published: 12 Mar 2021

TOPICS:  Security
Hitachi ID
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences