Protecting Data in The Cloud 2019 Thales Cloud Security Study
sponsored by Thales
WHITE PAPER:
During 2019, research was conducted to better understand the trends in cloud security practices across organizations in order to uncover emerging trends, encryption practices, IAM features to consider & why some organizations fail to protect sensitive data. Download the executive summary to discover the key findings of the research.
Posted: 11 Nov 2019 | Published: 31 Oct 2019
|
|
|
Enabling Effective Data Protection
sponsored by InteliSecure
WHITE PAPER:
Today, every company faces the potential for data loss. Threats are numerous and are coming from both internal and external actors. The need to quickly enable an effective data protection program has never been greater. In this white paper, learn how to shift your data protection approach to prioritize critical data asset protection.
Posted: 25 Sep 2019 | Published: 25 Sep 2019
|
|
|
Fortinet 2019 Operational Technology Security Trends Report
sponsored by Fortinet, Inc.
ANALYST REPORT:
Fortinet's 2019 OT Security Trends Report analyzes data from FortiGuard Labs to glean insights about the state of security for supervisory control and data acquisition (SCADA) and other industrial control systems (ICS). Download the report to discover key findings.
Posted: 14 Aug 2019 | Published: 08 May 2019
|
|
|
IT Security is Broken
sponsored by VMware
RESOURCE:
Only 25% of EMEA business leaders are confident in their cybersecurity. In this infographic, learn how you can fix IT security by building intrinsic security into everything, encouraging a collaborative culture of cybersecurity awareness, and more.
Posted: 16 Sep 2019 | Published: 16 Sep 2019
|
|
|
The Titus Times: The CEO & CTO
sponsored by TITUS
RESOURCE:
In this e-magazine, learn about the roles of the CEO and the CTO and delve into how their concerns around data protection overlap – as well as where they diverge. Also, learn how to overcome discrepancies to build a strong data protection strategy.
Posted: 11 Sep 2019 | Published: 11 Sep 2019
|
|
|
User Lifecycle Management Proves Costly to IT
sponsored by Okta
WHITE PAPER:
An IDG survey reveals that manual processes drain productivity and increase security risks. Read on to learn more about the differences between manual versus automated lifecycle management.
Posted: 09 Dec 2019 | Published: 09 Dec 2019
|
|
|
Modernizing Data Protection
sponsored by Forcepoint
WEBCAST:
Navigating your data protection journey can be complex. It requires you to keep up with the latest regulations and protect intellectual property – all while adapting to evolving IT environments. In this webcast, Angelica Torres-Corral discusses how to gain visibility and control of your data, optimize a DLP solution, and more.
Posted: 10 Oct 2019 | Premiered: Oct 10, 2019
|
|
|
Ransomware Attacks: How to Get the Upper Hand
sponsored by Cisco Umbrella
EGUIDE:
The rock group Radiohead is celebrated for its unconventional approach to recording and releasing music. Lately, the band is also turning heads for how it handled a hacker trying to sell its unreleased work. In this e-guide learn what security experts think of Radiohead’s strategy for dealing with the ransomware threat.
Posted: 26 Nov 2019 | Published: 21 Nov 2019
|
|
|
State of the Web Report 2019
sponsored by Tala Security
ANALYST REPORT:
The website is a primary connection point between companies and their customers. Unfortunately, their architecture introduces critical vulnerabilities that enable client-side website attacks. In this research report, discover the risks associated with web and web app security and learn how to better protect your organization against attacks.
Posted: 11 Sep 2019 | Published: 11 Sep 2019
|
|
|
Considerations for CuttingEdge Threat Intelligence & Incident Response
sponsored by Farsight Security
EGUIDE:
The use of a cyberthreat intelligence team can greatly help organizations. Learn the best practices for team location and selection from expert Robert M. Lee.
Posted: 10 Sep 2019 | Published: 10 Sep 2019
|
|
|
|
|