IT Management  >   Systems Operations  >   Security  >  

Computer Security Threats

RSS Feed   
Computer Security Threats Reports
 
Case Study: Lee Company
sponsored by Clearedin
CASE STUDY: In this case study, discover how Lee Company, a construction and building services firm, was able to improve their email, cloud and collaboration security capabilities through a partnership with CleardIn – which equipped them to better identify and prevent email-based threats. Read on for the full story.
Posted: 04 Jan 2021 | Published: 04 Jan 2021

Clearedin

Insurance Fraud Prevention & Detection
sponsored by Actico
WHITE PAPER: For insurance providers, automation and machine learning provide the ability to process claims at unmatched speed, detect and prevent insurance fraud, and more. Read this white paper to learn more about ACTICO, an insurance claims platform that embraces automation and machine learning capabilities.
Posted: 22 Dec 2020 | Published: 22 Dec 2020

Actico

Dealing with VUCA
sponsored by InteliSecure
EGUIDE: Today’s IT and security leaders are responsible for dealing with VUCA – volatility, uncertainty, complexity, and ambiguity – and address data security risks in an ever-changing landscape. Read this InteliSecure e-guide to address the elements of VUCA and build agile data protection.
Posted: 30 Dec 2020 | Published: 30 Dec 2020

InteliSecure

Endpoint Security Buyers Guide
sponsored by Sophos
EGUIDE: The endpoint security market has become overpopulated with a wide variety of solutions, too many of which offer indefensible market claims about how secure they are. Read this Endpoint Security Buyers Guide to help clear up the confusion and understand what it takes to make an informed choice.
Posted: 11 Jan 2021 | Published: 11 Jan 2021

Sophos

How to Help Prevent Increasingly Rampant Brand Exploitation
sponsored by Mimecast
WHITE PAPER: A company's reputation and trustworthiness is critical to their livelihood – which is why brand exploitation attacks present such a dangerous prospect. Download this white paper to enhance your organization's preparedness and awareness of these lures, which provides an overview of key brand exploitation challenges and solutions.
Posted: 05 Jan 2021 | Published: 20 Jul 2020

Mimecast

ClearedIn for Slack
sponsored by Clearedin
PRODUCT OVERVIEW: The shift towards remote work has led to a rise in the use of cloud collaboration tools, like Slack. This solution brief highlights how ClearedIn can enhance security and compliance capabilities to keep your Slack users safe and productive – read on to get started.
Posted: 04 Jan 2021 | Published: 04 Jan 2021

Clearedin

6 Factors To Consider In Building Resilience Now
sponsored by Microsoft
RESOURCE: COVID-19 serves as a reminder of the importance of building digital resilience – and while most organizations agree on its importance, there remains confusion on where to invest, how to invest, and how to set goals as they relate to digital resilience. Read this article and discover 6 factors to consider for building digital resilience.
Posted: 17 Dec 2020 | Published: 17 Dec 2020

Microsoft

5 Steps to Secure Home Devices & Improve Productivity for Remote Work
sponsored by Barracuda
WHITE PAPER: Due to the pandemic, remote work became an essential part of a modern enterprise. But for remote work and employees to thrive, they need fast and secure access to data. Read on to discover 5 steps organizations can take to further secure their remote workers, without sacrificing productivity.
Posted: 21 Dec 2020 | Published: 21 Dec 2020

Barracuda

Security and Compliance Automation for Financial Services
sponsored by Red Hat and Intel
WHITE PAPER: A SANS Institute survey showed that unauthorized access is the No. 1 concern around cloud environments. This is especially true for businesses in financial services, who must maintain constant compliance amidst grueling regulations. By downloading this white paper, learn how automation can help these businesses remain both secure and compliant.
Posted: 14 Jan 2021 | Published: 14 Jan 2021

Red Hat and Intel

SIEM, SOAR or both? Our security experts weigh in
sponsored by ComputerWeekly.com
EGUIDE: In this E-Guide we turn to the Computer Weekly Security Think Tank, a hand-picked panel of cyber security insiders, experts, analysts, and advocates with over a century's worth of collective experience between them, to explore the topic of Security Information and Event Management (SIEM), and Security Orchestration, Automation and Response, (SOAR).
Posted: 21 Dec 2020 | Published: 21 Dec 2020

ComputerWeekly.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info