IT Management  >   Systems Operations  >  

Closed Loop Security

RSS Feed   
Closed Loop Security Reports
 
Biometrics in the enterprise: An opportunity or an ethical minefield?
sponsored by ComputerWeekly.com
EGUIDE: Is biometric technology ready for use in the enterprise to help improve IT security? IT leaders need to be aware of the concerns. In this e-guide we take a look at some of the potential – as well as the risks.
Posted: 17 Jan 2020 | Published: 17 Jan 2020

ComputerWeekly.com

How to be a SOAR Winner
sponsored by IBM
RESOURCE: As cyberattacks and malware threats grow increasing sophisticated, implementing an automated and orchestrated security environment is critical for detecting and defecting cyberthreats. Read on to learn about the eight most critical success factors in creating and sustaining an intelligently automated, orchestrated security team.
Posted: 20 Dec 2019 | Published: 20 Dec 2019

IBM

When the Cloud Rains Phish
sponsored by Area 1 Security
WHITE PAPER: When it comes to phishing attacks, every inbox is a prime target. Hackers are discovering more sophisticated methods for targeting employees that have adapted to overcome world-class defenses. Read this white paper to uncover the modern threats the users encounter and discover how to remedy them.
Posted: 08 Jan 2020 | Published: 08 Jan 2020

Area 1 Security

CISO’s Playbook to Cloud Security
sponsored by Lacework
WHITE PAPER: As organizations continue to implement cloud technologies and capabilities, they introduce additional security concerns that the CISO needs to consider. In this playbook, uncover the steps and strategies IT security leaders should consider in order to achieve these positive outcomes.
Posted: 27 Dec 2019 | Published: 27 Dec 2019

Lacework

A Buyer’s Guide to Privacy-Centric Data Discovery
sponsored by BigID
WHITE PAPER: Protecting customer data has never been easy. And with the introduction of regulations like GDPR and CCPA, organizations face heavy penalties for failing to address this issue. Use this buyer’s guide to stay informed on the key components to look for in data discovery partner.
Posted: 07 Jan 2020 | Published: 07 Jan 2020

BigID

Mobile Phishing Killchain
sponsored by Lookout Inc.
RESOURCE: To an attacker looking to execute a phishing attack, mobile devices are an easy target. Continue to this infographic, which follows the lifecycle of a mobile phishing attack from inception to data breach and discover the security measures that could’ve been taken.
Posted: 09 Jan 2020 | Published: 09 Jan 2020

Lookout Inc.

WhiteHat Sentinel Mobile: Datasheet
sponsored by WhiteHat Security
DATA SHEET: Which mobile device is more secure: Androids or iPhones? Well, neither – if you don’t prioritize mobile application security. Regardless of platform, vulnerabilities are present – unless you move proactively. In this datasheet, WhiteHat Security reviews the threats to mobile apps and the security solutions that help. Click here to get access.
Posted: 03 Jan 2020 | Published: 03 Jan 2020

TOPICS:  Security
WhiteHat Security

How to Conquer Phishing? Beat the Clock
sponsored by Ironscales
WHITE PAPER: Reducing the risk of phishing attacks is a race against time – defenders must respond before their own users are to open emails and click on malicious links. In fact, Aberdeen’s research show that defenders have a median of 134 seconds to respond. Continue to uncover the remaining key data points related to this phishing attacks research.
Posted: 13 Jan 2020 | Published: 30 Sep 2018

Ironscales

The Right Way to Combat Customer Journey Hijacking
sponsored by Tala Security
WHITE PAPER: Most IT security teams focus on protecting user data, with little focus on user experience. By implementing a strategy that provides front-end and back-end protection, you can safeguard the interactions customers have with you, prevent the financial and reputational impacts of customer journey hijacking. Read on to get started.
Posted: 15 Jan 2020 | Published: 15 Jan 2020

Tala Security

WhiteHat Sentinel Application Security Platform Solution Brief
sponsored by WhiteHat Security
RESOURCE: Security breaches are nothing new. Luckily, neither are SaaS security platforms. In this solution brief, WhiteHat overviews how the Sentinel platform identifies vulnerabilities and reduces the risk of security incidents with accuracy. Click here to see the details.
Posted: 03 Jan 2020 | Published: 03 Jan 2020

WhiteHat Security
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info