Software  >  

Blended Threats

RSS Feed   
Blended Threats Reports
 
To Pay Or Not To Pay: It’s About The Provider
sponsored by Radware
RESOURCE: Should a ransomware attack strike, would your organization pay the ransom fee or not? How do you calculate if it’s worth it to pay the fee or not? This Radware article breaks down the most critical factors that go into answering these questions – read on to see if you should pay.
Posted: 23 Nov 2020 | Published: 29 Oct 2020

Radware

Success Patterns for Supply Chain Security
sponsored by Panorays
WHITE PAPER: Threats targeting supply chains are on the rise, impacting businesses across all 3 elements of the confidentiality, integrity and availability (CIA) triad. The following SANS whitepaper further explores these challenges and highlights the key components of an effective supply chain security program – read on to get started.
Posted: 24 Nov 2020 | Published: 24 Nov 2020

Panorays

Beyond the Perimeter- The Need for Pervasive Email Security
sponsored by Mimecast
ANALYST REPORT: Organizations are having a hard time protecting against modern email threats, especially since the move to cloud-delivered email systems. In this ESG Showcase, learn about Mimecast’s Email Security 3.0 Strategy that protects at the perimeter, inside the network and the organization, and beyond the perimeter.
Posted: 21 Oct 2020 | Published: 29 Feb 2020

Mimecast

Hacking Active Directory – From A Pen Tester
sponsored by Quest
WHITE PAPER: Active Directories (AD) provides authentication and protects credentials, information systems and intellectual property from unauthorized access – protecting your organization from financial and reputational harm. However, cybercriminals have found ways to exploit ADs – read this white paper to see the 8 most common AD-specific threats.
Posted: 26 Oct 2020 | Published: 26 Oct 2020

Quest

The Ultimate Balancing Act: Enabling Emerging Technologies. Ensuring Security
sponsored by Frontier Communications
RESOURCE: In order to defend against today’s fast-evolving threats, cybersecurity experts are recommending a multi-layered approach to network security that doesn’t prevent innovation. Read on to learn more about achieving this balancing act.
Posted: 16 Sep 2020 | Published: 16 Sep 2020

Frontier Communications

DDoS Response Guide
sponsored by Radware
WHITE PAPER: DDoS attacks can flood your network with malicious traffic, bringing applications down and preventing legitimate users from accessing your services. The good news, however, is that there is plenty to be done about it. In this white paper, explore 3 steps that will allow you to minimize the impact of a DDoS attack.
Posted: 24 Nov 2020 | Published: 24 Nov 2020

Radware

Phishing Attacks Advanced Techniques That Evade Detection
sponsored by Vade Secure
WHITE PAPER: The advancement of the phishing attack has left organizations looking for ways to identify the growing number of unique phishing URLs sent to their email servers. From spoofing addresses to exploiting credentials, these attacks grow more complex yearly. Don’t get left behind – read this comprehensive guide on phishing.
Posted: 22 Sep 2020 | Published: 22 Sep 2020


What Is Phishing
sponsored by Claranet
EGUIDE: More than a decade after its first appearance, phishing remains the most common and pervasive type of cyberattack – but what is phishing? Who is at risk? And what kinds of attack variants are there? For answers to these, and more, read this Phishing Educational Guide.
Posted: 09 Nov 2020 | Published: 09 Nov 2020

Claranet

Exploiting a Pandemic: Coronavirus Stimulus Package Economic Impact Payments
sponsored by Inky Technology
WHITE PAPER: COVID-19 has introduced a flurry of phishing scams related to the virus, and millions of people have become victims as a result. But perhaps the most convincing of these attacks are the ones purporting to be from the US Federal Reserve offering to provide financial assistance. Read this white paper to see examples of these convincing emails.
Posted: 07 Oct 2020 | Published: 07 Oct 2020

Inky Technology

CipherTrust Data Security Platform
sponsored by Thales
DATA SHEET: Security pros tasked with ensuring data protection are facing challenges on 3 fronts: looming cyberthreats, growing compliance requirements, and expanding environments. Read this data sheet for a closer look at the key features and capabilities of Thales’ CipherTrust Data Security Platform – which looks to alleviate these pain points.
Posted: 26 Oct 2020 | Published: 26 Oct 2020

Thales
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info