Business of Information Technology  >   Business Management  >   Financial Management  >   Budgeting  >   IT Spending  >  

Computer Security Spending

RSS Feed   
Computer Security Spending Reports
 
BlackBerry MITRE ATTACK APT29 Evaluation
sponsored by BlackBerry
WHITE PAPER: In conjunction with the framework, MITRE ATT&CK also conducts security evaluations without commentary or bias – the purpose is to provide objective information regarding how vendors fare against certain threat techniques. Download this report for BlackBerry’s analysis and interpretation of MITRE ATT&CK APT29 evaluation data.
Posted: 31 Jul 2020 | Published: 31 Jul 2020

BlackBerry

Phishing Factories and Economies: The Real Persistent Threat
sponsored by Akamai Technologies
VIDEO: A study conducted by Akamai indicates a recent uptick in Coronavirus-related phishing attacks. Pandemic aside – phishing threats continue to grow despite increasing investment into prevention methods. Watch this webinar to learn more about the evolving phishing landscape, emerging techniques, and more.
Posted: 03 Aug 2020 | Premiered: 03 Aug 2020

Akamai Technologies

Securing OT Systems in the Face of Rapid Threat Evolution
sponsored by Fortinet, Inc.
WHITE PAPER: Operational technology (OT) and IT used exist independent of one another, and each had their own security. But with the evolution of IoT, OT is beginning to merge with IT and connect to the internet, exposing OT to an increased number of security risks. Read this white paper on what CISOs need to know about the advanced threat landscape.
Posted: 06 Aug 2020 | Published: 15 Feb 2020

Fortinet, Inc.

Data Protection for Kubernetes on VMware
sponsored by Dell Technologies
WHITE PAPER: Containers were originally developed as a method to package, deploy and isolate applications from each other to improve density. But as cloud native applications have matured, so too has the orchestration capabilities of containers. Download this white paper to learn more about data protection for containerized apps.
Posted: 06 Aug 2020 | Published: 06 Aug 2020

Dell Technologies

Insights into attacker activity in compromised email accounts
sponsored by Barracuda
WHITE PAPER: Spear phishing and email account takeovers are proving to be a lucrative and accessible opportunity for cybercriminals – and attack methods are only growing more sophisticated. This report provides an overview of today’s top email security threats and offers defensive best practices for protecting your inboxes.
Posted: 12 Aug 2020 | Published: 31 Jul 2020

Barracuda

BitterAPT Revisited: The Untold Evolution of an Android Espionage Tool
sponsored by Bitdefender
WHITE PAPER: A malware threat group targeting Pakistani nationals, known as Bitter, became infamous in 2016. In 2019, their campaigns had expanded to other countries in South Asia, East Asia and the Middle East. So, how have their espionage and malware tactics changed over the years? Download this in-depth report to find out.
Posted: 28 Jul 2020 | Published: 28 Jul 2020

Bitdefender

Everyone as a Trusted Insider
sponsored by Dtex
PRODUCT OVERVIEW: Insider threats are on the rise, and traditional monitoring is too reactionary to handle today’s sophisticated attack methods. In this report, take a closer look at Dtex’s replacement to traditional employee monitoring – designed to promote employee privacy, proactive threat prevention, behavioral understanding of threats, and more.
Posted: 13 Aug 2020 | Published: 13 Aug 2020

Dtex

Empower Security Analysts Through Guided EDR Investigation
sponsored by McAfee
WHITE PAPER: Today’s EDR solutions are often better tailored to larger enterprises – leaving most security teams feeling overwhelmed and at risk. This Forrester report takes a closer look at an emerging EDR trend – guided investigation – which leverages automation to enable greater security, efficiency and scale. Read on to see what Forrester has to say.
Posted: 10 Aug 2020 | Published: 31 May 2019

McAfee

Financial Services Companies Own Your Share of Responsibility in Cloud Security
sponsored by Ionic Security
PRODUCT OVERVIEW: How can financial services companies embrace the benefits of the cloud while minimizing the impact of its risks? This guide offers insights that define the scope of your responsibilities in cloud security and best practices for wherever you are in your journey to the cloud.
Posted: 17 Jul 2020 | Published: 17 Jul 2020

Ionic Security

Dynamic Data Protection
sponsored by Forcepoint
PRODUCT OVERVIEW: The following solution brief provides an inside look into Forcepoint Dynamic Data Protection, which combines behavior analytics with data protection capabilities to enable your organization to prioritize high-risk activity and automate policies – ensuring security without sacrificing productivity. Read on for an overview of the key features.
Posted: 23 Jul 2020 | Published: 23 Jul 2020

Forcepoint
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info