Software  >  

Blended Threats

RSS Feed   
Blended Threats Reports
 
Payroll Fraud: When Direct Deposits Go Rogue
sponsored by Armorblox
WHITE PAPER: One thing all employees can agree on the sense of accomplishment that comes on salary day. Imagine the feeling of disappointment upon realizing that a cybercriminal diverted your wages to their own account. Payroll fraud is a growing problem. In this white paper, take a closer look at what defines payroll fraud and what makes it successful.
Posted: 13 Apr 2020 | Published: 13 Apr 2020

Armorblox

Definitive Guide to Internet Isolation
sponsored by Menlo Security
EBOOK: In this e-book, learn about Internet isolation which delivers a Zero Trust Internet by separating an enterprise network from the public web, while still allowing users to access the Internet seamlessly.
Posted: 20 Mar 2020 | Published: 20 Mar 2020

Menlo Security

Five Stages to Create A Closed-Loop Security Process with MITRE ATT&CK
sponsored by Cybereason
WHITE PAPER: Prior to MITRE ATT&CK, a security framework that allowed for realistic testing and provided a basis for improvement of security operations process and technology didn’t fully exist. In this white paper, discover the key components of the MITRE ATT&CK framework and 5 stages for creating a closed-loop security process.
Posted: 21 Apr 2020 | Published: 21 Apr 2020

Cybereason

SailPoint Identity is Security
sponsored by SailPoint Technologies
VIDEO: Each year, we face worse and more frequent data breaches than the last. Security methods that have worked for years are becoming ineffective against modern attacks. Watch this video and discover how identity management may be able to help address modern threats targeting people.
Posted: 16 Mar 2020 | Premiered: 16 Mar 2020

SailPoint Technologies

Cybersecurity in Healthcare
sponsored by Egress Software Technologies Inc
WEBCAST: Healthcare is one the most highly targeted industries by cybercriminals. In this Osterman Research webinar, hear about various different types of breaches in the healthcare industry, what the hackers’ incentive was, and how organizations can implement protections.
Posted: 08 Apr 2020 | Premiered: Apr 8, 2020

Egress Software Technologies Inc

MITRE ATT&CK Workbook
sponsored by VMware International Unlimited Company
WHITE PAPER: The MITRE ATT&CK framework has had a clear objective since its inception: develop a knowledge base around known cyberthreats and tactics to help organizations stay prepared. This workbook is designed as a starting point for organizations interested in leveraging the MITRE ATT&CK framework to improve their security posture.
Posted: 06 May 2020 | Published: 14 Feb 2020

VMware International Unlimited Company

Endpoint Detection and Response (EDR) for Hybrid Deployments
sponsored by VMware International Unlimited Company
PRODUCT OVERVIEW: In this datasheet, explore the key features and capabilities of VMware Carbon Black Endpoint Detection and Response (EDR), designed to provide faster end-to-end response and remediation through accelerated threat hunting with continuous endpoint visibility.
Posted: 29 Apr 2020 | Published: 29 Apr 2020

VMware International Unlimited Company

Successfully Scaling Cybersecurity for Remote Work: Keep the Cloud Your Safe Place
sponsored by Crosskey Cyber Security
RESOURCE: As organizations work to enable and secure remote workers, it’s critical to keep in mind that having people work remotely can mean an increase in security threats. So, how can IT and security teams protect users and data without hurting productivity or morale? Read this article to find out.
Posted: 03 Jun 2020 | Published: 03 Jun 2020

Crosskey Cyber Security

The Top 5 Mistakes That Everyone in Vulnerability Remediation is Making
sponsored by Vulcan
WHITE PAPER: Cyberattackers are growing cleverer with each passing year, exposing new vulnerabilities and exploiting old ones to cause costly and disruptive breaches. Its time for organizations to fight back. In this white paper take a closer look at the top five most common mistakes in vulnerability management and how to avoid them.
Posted: 14 May 2020 | Published: 14 May 2020

Vulcan

The CyberConverged Difference
sponsored by RackTop Systems
DATA SHEET: CyberConverged Data Security combines data storage, compliance, and security into an easy to use, integrated solution designed to meet cyber threats and complex data compliance needs head-on. Check out this data sheet to discover the top 5 advantages of CyberConverged Data Security.
Posted: 02 Jun 2020 | Published: 02 Jun 2020

RackTop Systems
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info