Software  >  

Blended Threats

RSS Feed   
Blended Threats Reports
 
The Impact of Unsecured Digital Identities
sponsored by Keyfactor
WHITE PAPER: In this report, uncover key research findings from a recent study conducted by the Ponemon Institute into the impact of unsecured digital identities. Download the full study to unlock the key insights from the research.
Posted: 12 Feb 2020 | Published: 12 Feb 2020

Keyfactor

Core - DNS - Punycode: Awareness and Protection
sponsored by Cisco Umbrella
WEBCAST: Have you ever come across a domain name that was almost identical to a familiar site, but instead was a malicious link? If so, you’ve likely come across a specific kind of attack known as Punycode. In this short webinar, explore Punycode: what it is, how it is commonly used, why it’s important & examples to keep an eye out for.
Posted: 04 Feb 2020 | Premiered: Dec 16, 2019

Cisco Umbrella

5 Reasons Why Virus Protection Software Isn't Enough
sponsored by Inky Technology
RESOURCE: Cyberattacks are troubling more and more business each year, and while most organizations opt for some sort of virus protection software, these platforms are unable to provide the security necessary to detect and thwart attacks. In this article, uncover the 5 reasons why virus protection software isn’t enough.
Posted: 11 Feb 2020 | Published: 11 Feb 2020

Inky Technology

Best Practices Award: Email Security Global
sponsored by Mimecast
WHITE PAPER: The trend towards cloud migration for email security adds new levels of complexity for organizations, and the increase in email-based threats means the need for secure email is critical to the protection of sensitive data. Read this research report to explore the top industry challenges and best practices as they relate to email security.
Posted: 12 Dec 2019 | Published: 12 Dec 2019

Mimecast

Product Overview
sponsored by Armorblox
PRODUCT OVERVIEW: In this product overview, take a closer look at the capabilities and features of Armorblox: A cloud-native email security platform that addresses the inbound and outbound security threats plaguing today’s email platforms. Read on to learn more.
Posted: 20 Feb 2020 | Published: 05 Feb 2020

Armorblox

Core - DNS - What attacks aren't you seeing?
sponsored by Cisco Umbrella
EBOOK: Networks are growing increasingly dispersed and hackers are adapting their attack methods to expose gaps amongst endpoints. In this e-book, discover how a complete network visibility strategy can help to identify risks and block potential threats before they have a chance to strike.
Posted: 06 Feb 2020 | Published: 06 Feb 2020

Cisco Umbrella

Creating a Secondary Perimeter to Detect Malware in Your Enterprise
sponsored by Asigra
ANALYST REPORT: Download the following DCIG report to learn how to recover with confidence from malware, with key discussions on 3 methodologies to detect malware in backups, malware’s primary sources of revenue, key attributes to ongoing malware detection/prevention, and more.
Posted: 28 Jan 2020 | Published: 28 Jan 2020

Asigra

How to Conquer Phishing? Beat the Clock
sponsored by Ironscales
WHITE PAPER: Reducing the risk of phishing attacks is a race against time – defenders must respond before their own users are to open emails and click on malicious links. In fact, Aberdeen’s research show that defenders have a median of 134 seconds to respond. Continue to uncover the remaining key data points related to this phishing attacks research.
Posted: 13 Jan 2020 | Published: 30 Sep 2018

Ironscales

Spear-phishing Analysis with ThreatQ Investigations
sponsored by ThreatQuotient
WEBCAST: Spear-phishing attacks are a growing security threat to organizations and their employees. These attacks target victims from a seemingly reliable source to lure them to a malware-ridden site. View this webinar to learn how to develop your spear-phishing investigation skills to spot an and attack before it becomes troublesome.
Posted: 23 Jan 2020 | Premiered: Jan 23, 2020

ThreatQuotient

Assess Secure Web Gateways to Suit Your Network Security Needs
sponsored by SearchSecurity.com
ESSENTIAL GUIDE: Secure web gateways are complex security controls that sit between the user and the internet to protect the organization from advanced web security threats. This buyer’s guide can help simplify the buying process by addressing the key considerations for evaluating a secure web gateway and the features and functionality these products offer.
Posted: 04 Dec 2019 | Published: 04 Dec 2019

SearchSecurity.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info