IT Management  >   Systems Operations  >   Security  >  

Application Security Threats

RSS Feed   
Application Security Threats Reports
 
What Makes Real Threat Intelligence
sponsored by Webroot
WHITE PAPER: This white paper will arm you with a set of criteria to gauge threat intelligence by its source, intended audience, and use cases to help narrow down the field to a few basic types. Read on to learn more.
Posted: 01 Aug 2019 | Published: 01 Aug 2019

Webroot

Security, Risk and Governance Breach Defense: Anatomy of a Breach
sponsored by Micro Focus
WEBCAST: The odds of experiencing a data breach are 1 in 4. And as seen from breaches including Equifax, Yahoo and Uber, the effects are costly. But how can organizations keep secure? There needs to be a plan. In this webcast, Rob MacDonald discusses how organizations can use the NIST Framework to strengthen their defenses against a breach.
Posted: 08 Aug 2019 | Premiered: Aug 8, 2019

Micro Focus

Supplementing the Limitations in Office 365
sponsored by Forcepoint
ANALYST REPORT: This Osterman Research report explores how you can use the native capabilities Office 365 provides as a starting point for your data protection strategy, and how you can implement a 3rd party service to help ensure all of your data is backed-up and recoverable.
Posted: 06 Aug 2019 | Published: 31 Mar 2018

Forcepoint

Getting a Handle on Data Exposure
sponsored by RackTop Systems
DATA SHEET: The following datasheet shares a solution that simplifies the process of sourcing your data and reporting on who has access to it on a continuous basis. Download now to learn how to use it to eliminate data redundancy and overexposure – a critical step in protecting data and reducing the footprint of security problems.
Posted: 09 Aug 2019 | Published: 09 Aug 2019

RackTop Systems

The Definitive Guide to Public Cloud Security
sponsored by Lacework
WHITE PAPER: In this security report, discover how Lacework compares security vendors for AWS, Azure, and GCP and dive deeper into common security challenges presented by the cloud.
Posted: 06 Aug 2019 | Published: 06 Aug 2019

Lacework

Machine Learning in Security
sponsored by Micro Focus
WEBCAST: In this webcast, Mario Daigle, VP of Product for Interset, a Micro Focus company, discusses 2 main categories of machine learning—supervised and unsupervised—and how they can be applied practically in the context of solving cybersecurity problems.
Posted: 08 Aug 2019 | Premiered: Aug 8, 2019

Micro Focus

CyberConverged Storage: An Overview
sponsored by RackTop Systems
DATA SHEET: Download this datasheet to discover a solution that integrates security and compliance, data management workflows, and high-performance storage to neutralize threats in every area of the infrastructure.
Posted: 09 Aug 2019 | Published: 09 Aug 2019

RackTop Systems

Magecart PCI Advisory on CSP
sponsored by Tala Security
RESOURCE: The Payment Card Industry Security Standard Council issued a set of recommendations and guidance to address the growing threat by magecart. They suggested using Content Security Policies (CSP) to restrict compliant browsers from executing JavaScript from source which have not been explicitly whitelisted. In this blog, learn more about CSP.
Posted: 06 Aug 2019 | Published: 02 Aug 2019

Tala Security

Preventing Ransomware in the cloud
sponsored by Lacework
WHITE PAPER: This white paper zeroes in on the various components of a cloud environment and offers best practices for creating a secure infrastructure. Read on for 11 ways to ensure strong security best practices in your organization.
Posted: 12 Aug 2019 | Published: 12 Aug 2019

Lacework

Micro Focus ArcSight: Protecting Security Analytics with an Audit Quality SIEM Platform
sponsored by Micro Focus
WHITE PAPER: In this white paper, discover how ArcSight is protecting security analytics with an audit quality SIEM solution.
Posted: 09 Aug 2019 | Published: 09 Aug 2019

Micro Focus
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement