Business of Information Technology  >   Business Management  >   Financial Management  >   Budgeting  >   IT Spending  >  

Computer Security Spending

RSS Feed   
Computer Security Spending Reports
 
Identifying the Timeline Activities of a Cyber Breach
sponsored by Farsight Security
CASE STUDY: In this case study discover how the use of DNSDB in mapping malicious and benign infrastructure revealed the timeline and activity of a breach of the Anthem Healthcare System.
Posted: 05 May 2017 | Published: 05 May 2017

Farsight Security

The Business Guide to Ransomware
sponsored by Datto, Inc.
EBOOK: Download this e-book for several tactics to protect, avoid, and recover both you and your customers from ransomware attacks, as well as an examination of how today’s ransomware operates and 10 common strains to watch out for.
Posted: 15 Oct 2019 | Published: 15 Oct 2019

Datto, Inc.

Ransomware Made MSPeasy: The MSP’s Guide to Saving the Day
sponsored by Datto, Inc.
EBOOK: Download this e-book for an up-to-date look at the current state of ransomware and today’s ransomware strains, as well as guidance on educating your customers about ransomware and adding security tools to your services portfolio.
Posted: 14 Oct 2019 | Published: 14 Oct 2019

Datto, Inc.

The Rise of Email Threats
sponsored by Barracuda
ANALYST REPORT: The following report digs into the current state of email security, evaluating the evolution of email threats and identifying common concerns. Download now to view these takeaways and to learn how to equip your organization with the necessary defenses to fend off email attacks.
Posted: 11 Oct 2019 | Published: 11 Oct 2019

Barracuda

Security Analytics
sponsored by ComputerWeekly.com
EGUIDE: This e-guide focuses on how businesses are turning to emerging technologies to improve their capability to detect and respond to previously-unknow cyber-attacks, and security analytics is among the most popular choices.
Posted: 09 Oct 2017 | Published: 09 Oct 2017

ComputerWeekly.com

Jargon Buster Guide to Post Quantum Cryptography
sponsored by ComputerWeekly.com
EGUIDE: This Jargon Buster will help you to understand the key concepts of quantum computing and why businesses should be acting now to ensure they are able to encrypt sensitive data in a secure way in a post-quantum era.
Posted: 02 Oct 2018 | Published: 02 Oct 2018

ComputerWeekly.com

BYOD: Keeping the Benefits While Staying Secure
sponsored by IBM
EGUIDE: In this e-guide, learn not only to maximize the benefits of BYOD for your enterprise, but also discover the how to mitigate the downsides and secure the traffic coming out of all these devices connecting to your network.
Posted: 29 Jul 2016 | Published: 28 Jul 2016

IBM

The Business Value of Integrated Anti-Virus Management
sponsored by IBM
WHITE PAPER: This white paper features an integrated anti-malware protection solution that not only improves identification and remediation across all endpoints, but also offers benefits to your bottom line.
Posted: 13 May 2014 | Published: 31 Jan 2014

IBM

How To Limit Privileged Accounts And Boost Security
sponsored by Devolutions
EGUIDE: Too many privileged accounts can result in access abuse in enterprises.This expert e-guide details which account privileges should be limited to reduce security incidents, how pervasive the risk is, and the challenges associated with privileged accounts.
Posted: 20 Mar 2017 | Published: 15 Mar 2017

Devolutions

IT Security Trends to Know
sponsored by Cisco Umbrella
EGUIDE: The 2017 TechTarget IT Priorities Survey reports a number of key IT security trends about where enterprises and infosec professionals place their time and resources. In this expert e-guide, get the results from this survey and see how 971 IT pros plan to focus their cybersecurity efforts.
Posted: 06 Sep 2017 | Published: 29 Aug 2017

Cisco Umbrella
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement