IT Management  >   Systems Operations  >   Security  >  

Application Security Threats

RSS Feed   
Application Security Threats Reports
 
Euromonitor
sponsored by Absolute Software Corporation
CASE STUDY: In this case study, discover how Euromonitor, a business intelligence and strategic analysis provider, partnered with Absolute to shift their security focus towards their proprietary market research and automate endpoint visibility to track (and potentially wipe) at-risk devices.
Posted: 18 Feb 2020 | Published: 09 May 2019

Absolute Software Corporation

Securing the Human Perimeter with Natural Language Understanding
sponsored by Armorblox
WHITE PAPER: The traditional notion of what constitutes a perimeter is disappearing, user behavior is evolving, and organizations are incorporating mobile workforces and remote devices. Applying adequate security today requires a change in mindset to focus on the human perimeter. Download this white paper to learn more.
Posted: 21 Feb 2020 | Published: 31 May 2019

Armorblox

The Root Of (Almost) All Security Issues
sponsored by Tala Security
WHITE PAPER: In order to establish adequate data protection, security teams need to ensure they address both technical (code and data) & non-technical (user behavior) risks. In this white paper, Sanjay Sawhney, VP of Engineering at Tala, highlights how these issues lead to significant disruptions and offers best practices for addressing them.
Posted: 17 Feb 2020 | Published: 17 Feb 2020

Tala Security

Ransomware Can’t Stop the Presses at La Sentinelle
sponsored by Malwarebytes
CASE STUDY: In this case study, La Sentinelle, a media group in Mauritius, sought to eliminate downtime associated with ransomware in the wake of a disruptive malware attack. Download this white paper to learn how they developed a program that would enable them to identify, mitigate, and prevent malware attacks.
Posted: 12 Feb 2020 | Published: 12 Feb 2020

Malwarebytes

Core - DNS - Threat Spotlight: Emotet
sponsored by Cisco Umbrella
WEBCAST: In this edition of ‘A Cybersecurity Technical Mini Series’, take a closer look at the history and evolution of Emotet malware. This webinar highlights Emotet’s infection chain and modules, how this malware can affect your organizations & best practices for avoiding an infection.
Posted: 11 Feb 2020 | Premiered: Oct 31, 2019

Cisco Umbrella

Bovis Homes
sponsored by Absolute Software Corporation
CASE STUDY: In this case study, follow the journey of Bovis Homes, a residential development company in the UK, as they partner with Absolute Software to establish visibility and control over their disparate mobile endpoints to ensure security and meet GDPR compliance.
Posted: 10 Feb 2020 | Published: 25 Jun 2019

Absolute Software Corporation

Collective Offense Calls for Collective Defense
sponsored by IronNet
WHITE PAPER: Advanced cybersecurity systems, such as AI and ML, are not preventing cyber incidents. Disparate efforts to thwart attacks are unlikely to remain sustainable as threats increase. Download this white paper and discover the collective defense platform: where security teams aggregate their threat intelligence to increase awareness and response time.
Posted: 07 Feb 2020 | Published: 07 Feb 2020

IronNet

Securing the Human Layer
sponsored by Armorblox
WHITE PAPER: While the advancement of technology has enabled organizations to enhance their productivity, it also exposes networks and users to security risks. This whitepaper highlights the flaws of modern security tactics and explores how incorporating AI is can safeguard the most crucial part of an organization – its people.
Posted: 20 Feb 2020 | Published: 20 Feb 2020

Armorblox

Securing Your Wherever Whenever Workforce
sponsored by Forcepoint
EBOOK: Currently, 87% of organizations rely on employee access to business apps from personal devices. While BYOD trend allows for unhindered agility and collaboration, it also invites additional security risks. In this e-book, uncover the truth about cloud security, and learn how to optimize your mobile-cloud security strategy.
Posted: 06 Feb 2020 | Published: 06 Feb 2020

Forcepoint

Implementing the NIST Cybersecurity Framework in Government
sponsored by Absolute Software Corporation
WHITE PAPER: Download this white paper to discover the 5 functions of the NIST cybersecurity framework and why CIOs and CISOs in the public sector should follow this framework in order to best optimize their security approach without exhausting their decreasing budgets.
Posted: 05 Feb 2020 | Published: 07 Dec 2018

Absolute Software Corporation
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info