Software  >   Systems Software  >  

Auditing Software (Security)

RSS Feed   
Auditing Software (Security) Reports
 
Cybersecurity Compliance Guide
sponsored by Arctic Wolf Networks, Inc.
EGUIDE: Consumer data protection has become so heavily regulated that compliance is now a key part of any cybersecurity program. In order to better understand the various regulations and their implications, Arctic Wolf created this Cybersecurity Compliance Guide, which explores relevant regulations across industries and geography.
Posted: 01 Sep 2020 | Published: 01 Sep 2020

Arctic Wolf Networks, Inc.

Secure Your Network and Stop Cybercriminals from Capitalizing on a Crisis
sponsored by Comcast Business
DATA SHEET: Threat actors have long been taking advantage of increased network vulnerabilities up to this point, but in order to fight the good fight, you must be up to speed on security architectures and technologies that are disrupting both hackers and the security industry. View this data sheet to learn to securely navigate the pandemic.
Posted: 04 Sep 2020 | Published: 04 Sep 2020

Comcast Business

How Okta's IT + Workplace Teams Are Getting Ready for Dynamic Work
sponsored by Okta
VIDEO: Before the COVID-19 outbreak, few government employees (federal, state and local) had the ability and authorization to work from home. Watch this webinar to learn what the new normal looks like for government agencies, the challenges that have surfaced and best practices for addressing them.
Posted: 28 Sep 2020 | Premiered: 28 Sep 2020

Okta

Securing the Remote Revolution
sponsored by AWS & CrowdStrike
EBOOK: Protecting modern remote workforces requires security capabilities that go beyond traditional approaches. This e-book provides an overview of the emerging adversary tactics targeting remote workforces and highlights new and effective cybersecurity strategies for a fully remote world – read on to get started.
Posted: 21 Sep 2020 | Published: 21 Sep 2020

AWS & CrowdStrike

Incident Response Tools: How, When & Why to Use Them
sponsored by Claranet
EGUIDE: Incident response tools are growing in popularity as an effective method for proactively analyzing and addressing the vulnerabilities within your network. This e-guide was written to help readers through the vetting process as well as understand how, when and why to use them – read on to get started.
Posted: 21 Sep 2020 | Published: 17 Sep 2020

Claranet

Why You Should Consider Endpoint Detection & Response
sponsored by Claranet
EGUIDE: Endpoint security has become an especially hot topic over the past few months. Organizations need to put clamps on hackers who attempt to breach their infrastructure. As such, traditional legacy endpoint security systems may not be able to stand up to modern threats. Read this expert guide to learn about endpoint detection & response.
Posted: 10 Sep 2020 | Published: 10 Sep 2020

Claranet

Apex One solution brief
sponsored by Trend Micro
PRODUCT OVERVIEW: The modern organization consists of distributed endpoints and mobile devices – as such, these new environments require threat detection capabilities that go beyond the scope of traditional threat management. Read this solution brief to learn more about Trend Micro’s Apex One, a modern endpoint threat detection & management offering.
Posted: 03 Sep 2020 | Published: 03 Sep 2020

Trend Micro

Measuring the ROI of an Incident Response Platform
sponsored by Palo Alto Networks
WHITE PAPER: A Forrester survey found that 80% of businesses had been attacked last year, and only 50% felt they had the right resources to proactively hunt for threats. Organizations tend to place incident response on the backburner, but it’s clear they wish they’d been better prepared for ‘what ifs’. In this guide, learn how to stay ahead of threats.
Posted: 03 Sep 2020 | Published: 03 Sep 2020

Palo Alto Networks

KVC Health Systems Eliminates Email Security Incidents with Vade Secure
sponsored by Vade Secure
CASE STUDY: In this case study, discover how KVC was able to address the growing concerns around phishing-related attacks and explore how their partnership with Vade Secure enabled them to protect the sensitive healthcare data of their staff and patients.
Posted: 17 Sep 2020 | Published: 17 Sep 2020


5 Steps to Making Better Security Decisions
sponsored by ThreatQuotient
WHITE PAPER: The goal of any cybersecurity program is to make better decisions faster. However, IT and security teams are often overwhelmed with the number of alerts requiring their attention. In this report, discover a 5-step process for making better security decisions and achieving a more effective response.
Posted: 18 Sep 2020 | Published: 18 Sep 2020

ThreatQuotient
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info