IT Management  >   Systems Operations  >   Security  >  

Application Security Threats

RSS Feed   
Application Security Threats Reports
 
BotRx ProTx Mobile Application Security
sponsored by BotRX
DATA SHEET: Mobile applications have emerged as one of the most lucrative threat vectors for a cybercriminal interested in orchestrating a malicious bot attack. In order to protect your organization’s mobile app and subsequent data, security tactics need to be dynamic. Read this data sheet to learn how BotRx protects web and mobile apps against bot attacks.
Posted: 28 Sep 2020 | Published: 28 Sep 2020

BotRX

Exploiting a Pandemic: White House COVID-19 Phishing Scams
sponsored by Inky Technology
EBOOK: It is important to understand that we are living in a time of extreme vulnerability, and this is no less apparent than to those who are working in security. Increased internet use has led to an increase in phishing scams of all kinds. View this e-book to understand what it looks like when a phisher imitates the White House and the President.
Posted: 29 Sep 2020 | Published: 29 Sep 2020

Inky Technology

Email Security vs. Email Privacy: What You Need to Know
sponsored by Inky Technology
RESOURCE: Since it was first introduced, email has blown up into a business-critical communication tool. However, its popularity has led to an innumerable amount of cyberattacks over the years. In this blog post, explore the differences between email security and email privacy – and discover how to achieve both.
Posted: 30 Sep 2020 | Published: 30 Sep 2020

Inky Technology

Learn How to Detect a Phishing Email
sponsored by Vade Secure
RESOURCE: We’ve all come across a poor phishing attempt that was immediately obvious, but cybercriminals are crafty – some phishing emails are nearly indistinguishable from an authentic email. So, where should you look to spot a phishing attack? The following resource provides 7 key areas to look at – check it out.
Posted: 17 Sep 2020 | Published: 17 Sep 2020


G2 2020 Summer Report - Endpoint Management Software
sponsored by Absolute Software Corporation
ANALYST REPORT: This year, Absolute was named a Leader in Endpoint Management Software. Tap into the G2 2020 Summer Report to see how they compare to other vendors in the space.
Posted: 28 Sep 2020 | Published: 28 Sep 2020

Absolute Software Corporation

The Importance of Identity in Securing Your Business
sponsored by Okta
VIDEO: Identity management plays a critical role in an organization’s ability to secure an increasingly distributed workforce. This video underlines the importance of identity management for securing your business – particularly as it relates to the current pandemic and getting adjusted to the ‘new normal’.
Posted: 17 Sep 2020 | Premiered: 17 Sep 2020

Okta

Beyond COVID-19 Webinar
sponsored by Hyperproof
WEBCAST: COVID-19 has both introduced new risks and amplified existing ones. Business continuity, security, crisis management and customer acquisition have all been put to the test, and all the while, the economy has become totally unpredictable. Watch this webinar to learn how to manage new risks and stay compliant throughout COVID-19 and beyond.
Posted: 14 Sep 2020 | Premiered: Sep 14, 2020

Hyperproof

How to Respond Rapidly to Emerging Cyberthreats
sponsored by ThreatQuotient
PRODUCT DEMO: Since the COVID-19 pandemic began, organization’s have had to deal with a growing volume of cyberthreats that look to take advantage of uncertainty and commotion as an entry point for their attacks. Watch this video demo to see how the ThreatQ platform handles these kinds of threats.
Posted: 21 Sep 2020 | Premiered: 21 Sep 2020

ThreatQuotient

Enhancing Orchestration Using Threat Intelligence
sponsored by ThreatQuotient
VIDEO: Managing modern risk requires dedicated threat intelligence platforms that equip organizations with the information and guidance needed to identity and thwart potential cyberattacks. Watch this webinar to learn about how threat intelligence can (and should) be used to enhance security orchestration initiatives.
Posted: 21 Sep 2020 | Premiered: 21 Sep 2020

ThreatQuotient

Update Your Disaster Collaboration Plan Now
sponsored by AVI-SPL
WHITE PAPER: Remote work capabilities were put to the test in a hurry thanks to COVID-19. If your systems were less-than-prepared to handle a sudden work-from-home environment, help is here. Read AVI-SPL's tips to upgrade your disaster collaboration plan and be better prepared for the next global event. Read the article now.
Posted: 14 Sep 2020 | Published: 14 Sep 2020

AVI-SPL
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info