Software  >  

Blended Threats

RSS Feed   
Blended Threats Reports
 
How Italy's Largest Service Provider Leverages Security
sponsored by Cisco Umbrella
CASE STUDY: In this case study, find out how Telecom Italia (TIM) was able to keep more than half a million business customers safe, while having a competitive advantage and an incremental revenue opportunity in the process.
Posted: 30 Aug 2018 | Published: 30 Aug 2018

Cisco Umbrella

Malicious Cryptominers are Eyeing Your Resources.
sponsored by Cisco Umbrella
WHITE PAPER: Malicious cryptominers tap into an organization's computing power in order to create cryptocurrencies and generate profit for themselves. If your organization is protected, it can cost you in many ways. In this white paper, learn how to protect your organization using Cisco Umbrella as your first line of defense.
Posted: 02 May 2019 | Published: 02 May 2019

Cisco Umbrella

Assessing the Cyberthreat Landscape: Today's Reality, Tomorrow's Risks
sponsored by Neustar
RESEARCH CONTENT: The ever-changing cyberthreat landscape requires constant assessment. IT leaders must not only prioritize the many cyberthreats they face, but also use those insights to formulate and implement an appropriate mitigation strategy. Download this report sponsored by IDG to learn more about the cyberthreat landscape.
Posted: 17 Jan 2019 | Published: 17 Jan 2019

Neustar

Anatomy of a Cyber Attack
sponsored by Oracle Corporation
WHITE PAPER: Security is everyone's job today, from consumers, to system administrators, to executives. Explore this resource to gain insight into the anatomy of a cyberattack, the lifecycle of a security breach and how to augment your current approach to protect your sensitive data.
Posted: 04 Apr 2019 | Published: 31 Dec 2017

Oracle Corporation

2019 Global Threat Report
sponsored by CrowdStrike
RESEARCH CONTENT: Nation-state adversaries were continuously active throughout 2018. Looking forward, there is ample evidence that adversaries will be forced to adapt and deploy stealthier tactics in order to continue their profitable operations. In this white paper, explore CrowdStrike's recommendations to maintain a strong defense.
Posted: 06 Mar 2019 | Published: 06 Mar 2019

CrowdStrike

How a Global Automotive Product Leader Secured Its Enterprise Cloud Migration
sponsored by Cisco Umbrella
CASE STUDY: This case study uncovers how BorgWarner, a global automotive product leader, protected its growing network, without adding latency, resource requirements, or hardware.
Posted: 09 Feb 2018 | Published: 09 Feb 2018

Cisco Umbrella

The 6 Business and Security Benefits of Zero Trust
sponsored by Akamai Technologies
WHITE PAPER: Providing security for a new breed of anytime, anywhere workers and cloud-based applications requires a novel approach: a zero trust security model. Find out how your enterprise can benefit from zero trust, today.
Posted: 06 Aug 2018 | Published: 30 Jun 2018

Akamai Technologies

Tape as an Airgap Against Ransomware
sponsored by Fujifilm Recording Media USA, Inc.
WEBCAST: Join this webcast as Lead Analyst at Storage Switzerland George Crump and Security Strategist at Carbon Black David Balcar share ransomware defense tactics and examine the importance of airgapping infrastructure components. You'll also learn how to use tape as an airgap between ransomware attacks and your data.
Posted: 04 Apr 2019 | Premiered: Apr 4, 2019

Fujifilm Recording Media USA, Inc.

Why Enterprise Anti-Virus Isn't Working
sponsored by Ziften
RESOURCE: The name itself, anti-virus, betrays the inadequacy of the enterprise AV threat model. In this blog, learn more a new and improved next generation anti-virus (NGAV) which generally incorporates behavior analytics, cloud-based delivery, machine learning and artificial intelligence, and more automated response.
Posted: 15 Apr 2019 | Published: 09 Apr 2019

Ziften

How to Prevent Cloud Cryptojacking Attacks on your Enterprise
sponsored by Cisco Umbrella
EGUIDE: Cloud cryptojacking attacks are a newer threat targeting enterprises. Cybersecurity expert Rob Shapland – an ethical hacker who specializes in simulating advanced cyberattacks against corporate networks – explains what safeguards you should have in place to prevent these attacks.
Posted: 24 Aug 2018 | Published: 31 May 2018

Cisco Umbrella
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement