IT Management  >   Systems Operations  >   Security  >  

Application Security Threats

RSS Feed   
Application Security Threats Reports
 
Financial Services: Managing Digital Risk and Compliance
sponsored by Proofpoint, Inc.
WHITE PAPER: Open this white paper to uncover the best approaches financial institutions can take to protect against domain risks, mobile app risks, digital compliance and much more.
Posted: 03 Dec 2018 | Published: 03 Dec 2018

Proofpoint, Inc.

Armor Anywhere: Technical Solution Brief
sponsored by Armor
RESOURCE: Learn how your organization can adopt a managed security service that fortifies and unifies your on-premise, cloud and hybrid IT security defenses to enable you to prevent, detect and respond to cyberthreats in real-time.
Posted: 28 Nov 2018 | Published: 28 Nov 2018

Armor

The Public Sector Guide to Text Messaging Policy and Retention
sponsored by Smarsh
WHITE PAPER: Sending text messages between mobile devices is now public business, and by law, the records need to be preserved. This white paper contains steps that will help public sector organizations develop a text message policy and retention strategy to protect against the risk involved with use of this popular, universal form of communication.
Posted: 18 Dec 2018 | Published: 18 Dec 2018

Smarsh

Data Breach: Security Investigation, Detection and Rapid Response
sponsored by Splunk
WHITE PAPER: Discover the specific items to investigate when there is a security incident alert, what your analysts need to determine during a breach to mitigate further damage, the 6 most common steps in determining the impact of the breach, and the most appropriate course of action.
Posted: 17 Dec 2018 | Published: 01 May 2017

Splunk

SOC-as-a-Service versus DIY SOC
sponsored by Arctic Wolf
WHITE PAPER: Security operation centers are very useful in monitoring, detecting and responding to cyberthreats. However, they can be very expensive to build and extremely difficult to manage. Download this Frost and Sullivan report to evaluate the costs and features of SOC-as-a-service and DIY SOC to make an informed decision for your organization.
Posted: 10 Dec 2018 | Published: 31 Dec 2018

Arctic Wolf

Busting Threat Intelligence Myths: A Guide for Security Pros
sponsored by Recorded Future
WHITE PAPER: There are many misconceptions about what threat intelligence is, leading many security pros to believe that threat intelligence doesn't have an advantage to bring into their particular role. Explore how threat intelligence can be operationalized in a variety of roles, demonstrating the central part it can play in a proactive security strategy.
Posted: 13 Nov 2018 | Published: 13 Nov 2018

Recorded Future

Definitive Guide to Software-Defined Perimeter Security
sponsored by Cyxtera
WHITE PAPER: Find out how to take an identity-centric approach to the software-defined network perimeter and explore two use cases for how this approach can help secure AWS resources and dramatically reduce the attack surface.
Posted: 03 Dec 2018 | Published: 31 Dec 2017

Cyxtera

Unlock Opportunity with a New Security Approach
sponsored by Citrix
RESOURCE: Enable new ways of working with a new security framework that secures your apps and data across clouds, devices, and networks.
Posted: 24 Oct 2018 | Published: 24 Oct 2018

Citrix

Security Orchestration, Automation and Response (SOAR) Buyer's Guide
sponsored by Swimlane
WHITE PAPER: In today's complex computing environments, it can be hard to determine what actual security coverage is in place. Finding skilled security analysts is an increasingly difficult task. Each year as threats grow, CISOs must do more with less. A SOAR solution can help simplify, automate and document the incident response process.
Posted: 18 Dec 2018 | Published: 18 Dec 2018

Swimlane

Understanding Security Processes and the Need to Automate
sponsored by Skybox Security
RESEARCH CONTENT: Most organizations have room to grow in their understanding of key security and security automation processes. In this report, explore the results of an in-depth Osterman Research survey focused on understanding current security processes and how organizations are working to improve and automate them.
Posted: 13 Nov 2018 | Published: 13 Nov 2018

Skybox Security
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement