Software  >  

Blended Threats

RSS Feed   
Blended Threats Reports
Cyberespionage Campaign Hits Energy Companies
sponsored by SecurityMatters
WHITE PAPER: What will your company do if the next Dragonfly-type attack targets you? Discover why the implementation of a defense-in-depth strategy is key to successfully mitigate cyberthreats like Dragonfly.
Posted: 09 Feb 2018 | Published: 31 Dec 2017


Threat Landscape Report
sponsored by Fortinet, Inc.
RESOURCE: According to the Fortinet Threat Landscape Report, in Q3 of 2017 alone, there were 14,904 unique variants of malware. Explore this 28-page Threat Landscape Report to uncover staggering statistics regarding exploits, malware, and botnets and how you can use the current trends to improve your threat management security posture.
Posted: 11 Dec 2017 | Published: 11 Dec 2017

Fortinet, Inc.

PCI DSS & Your Call Center: The Do's & Don'ts of Compliance
sponsored by Semafone
WEBCAST: According to the Ponemon Institute, on average security breaches cost $4 million annually. To prevent breaches and the large costs that come along with it, complying with policy regulations is important. This webinar provides insight into the importance of the PCI DSS regulation and offers approaches for becoming compliant.
Posted: 09 Jan 2018 | Premiered: Jan 9, 2018


Your Report on the State of Ransomware for MSPs
sponsored by Datto, Inc.
RESEARCH CONTENT: Inside, hear what more than 1,700 service providers found to be major trends, targets, and impacts of ransomware attacks through early 2017, to help you better inform your backup and DR policies going forward.
Posted: 04 Oct 2017 | Published: 04 Oct 2017

Datto, Inc.

Ransomware Survival Guide
sponsored by Proofpoint, Inc.
RESEARCH CONTENT: According to a Ponemon Institute report, nearly 60% of companies believe a ransomware attack would have serious financial consequences for their business. Take a look at this guide to uncover how to survive ransomware attacks and strategies for preventing them from occurring entirely.
Posted: 26 Feb 2018 | Published: 26 Feb 2018

Proofpoint, Inc.

Security Trends: Data Theft and Ransomware Plague Healthcare Organizations
sponsored by IBM
WHITE PAPER: According the Cost of a Data Breach Study, the healthcare industry's data breach cost, $355 per record, is more than twice the mean across all industries of $158 per record. Inside this resource uncover how to protect your healthcare organization while reducing cost and complexity and proactively hunt and respond to threats.
Posted: 02 Mar 2018 | Published: 31 Dec 2016


Rethink Enterprise Endpoint Security in the Cloud Computing Era
sponsored by Google Cloud
RESEARCH CONTENT: According to this Forrester report, 48% of respondents stated their top priority in endpoint security is to improve threat detection capabilities. Explore this report to uncover how the cloud computing era is affecting how enterprises think and deal with endpoint security.
Posted: 26 Feb 2018 | Published: 26 Feb 2018

Google Cloud

Defense-In-Depth Security: Key to Keeping IT Safe
sponsored by
EBOOK: The enterprise perimeter's demise is in part due to BYOD. Leverage this expert handbook to uncover an effective approach to constructing your IT security "fortress" and replacing the outdated idea of a security perimeter.
Posted: 19 Jan 2018 | Published: 19 Jan 2018

Frequently Asked Questions: Spectre & Meltdown
sponsored by enSilo
RESOURCE: How is your enterprise protecting your servers, devices, and cloud against malware and vulnerabilities? Explore this Q&A resource to gain insight into the vulnerabilities of Meltdown and Spectre and how to defend against them.
Posted: 02 Mar 2018 | Published: 02 Mar 2018

The Evolving Risk Landscape
sponsored by F5 Networks
WHITE PAPER: There was nearly a 22% increase in attacks on web applications from 2016 to 2017. While apps have increased productivity, they have also opened the door to unprecedented threats, expanding the risk landscape and putting corporate data at risk. This e-book offers a guide to protecting against web fraud, credential stuffing, ransomware, and phishing.
Posted: 20 Nov 2017 | Published: 20 Nov 2017

F5 Networks

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement