IT Management  >   Systems Operations  >   Security  >  

Application Security Threats

RSS Feed   
Application Security Threats Reports
The Actionable Insights You Need to Detect and Prevent Security Threats
sponsored by Citrix
RESOURCE: Learn how to get the actionable insights you need to detect and prevent security threats from malicious users inside your organization.
Posted: 22 Oct 2018 | Published: 22 Oct 2018


Assault On Healthcare
sponsored by Cylance
WHITE PAPER: The expanded availability of patient data has fueled a meteoric rise in cyberattacks. In this white paper, learn more about why the healthcare environment is a perfect storm of vulnerabilities, and how putting AI in command of cybersecurity can better detect malware and prevent attacks.
Posted: 05 Oct 2018 | Published: 05 Oct 2018


Quarterly Threat Report
sponsored by Rapid7
RESEARCH CONTENT: In this 2018 Q2 review, get a clear picture of the threat landscape within your unique industry, how these threats have changed, and what to expect for the rest of the year.
Posted: 11 Sep 2018 | Published: 21 Aug 2018


Balancing Security and Digital Transformation
sponsored by British Telecommunications PLC
EBRIEF: This e-brief examines security across three domains—cloud, compliance, and cyber threats—and makes recommendations that can help CISOs and their companies make security integral to the business. Read on to learn more.
Posted: 18 Sep 2018 | Published: 18 Sep 2018

British Telecommunications PLC

Building Daily Habits to Stay Ahead of Security Fires
sponsored by ThreatConnect
RESOURCE: Learn how to efficiently track your vulnerabilities and manage security incidents inside your organization.
Posted: 16 Oct 2018 | Published: 14 Jun 2018


Five Endpoint Attacks Your Antivirus Won't Catch: A Guide to Endpoint Detection and Response
sponsored by AlienVault
RESOURCE: In this white paper, discover how to quickly evolve your threat detection strategy with 5 endpoint attacks your antivirus won't catch.
Posted: 08 Oct 2018 | Published: 08 Oct 2018


How to Protect Against Security Threats and Human Risk Factors
sponsored by MediaPRO
EBOOK: 70% of employees lack the awareness needed to prevent common cyber incidents, according to MediaPRO's last Security Awareness Report. Do your employees fall into this statistic? Download this buyer's guide for everything you need to know about implementing an employee security awareness program.
Posted: 24 Sep 2018 | Published: 24 Sep 2018


The Three Critical Elements of Effective Security of AWS
sponsored by Lacework
RESOURCE: Your ability to managing responsibility for AWS accounts does not have to be a massive undertaking. Read this guide for 3 critical areas to watch out for and become a master of your cloud environment.
Posted: 25 Sep 2018 | Published: 25 Sep 2018


Fraud: It's Not Just for Banks Anymore
sponsored by F5 Networks
RESOURCE: Download this resource to learn why using a web application firewall (WAF), with full-proxy capabilities, can be your best defense mechanism against fraudsters.
Posted: 21 Sep 2018 | Published: 31 Dec 2017

F5 Networks

DDoS is the New Spam: 3 Strategies to Turn Catastrophe into Annoyance
sponsored by F5 Networks
EBOOK: DDoS isn't going away anytime soon, and as attacks and motivations evolve, so must IT security defenses. Download this e-book for 3 strategies on how to up your DDoS game, today.
Posted: 21 Sep 2018 | Published: 31 Dec 2017

F5 Networks

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement