IT Management  >   Systems Operations  >   Security  >  

Computer Security Threats

RSS Feed   
Computer Security Threats Reports
 
Cisco Cybersecurity Series 2019: Threat Report
sponsored by Cisco Umbrella
WHITE PAPER: In this 2019 Threat Report, Cisco researchers looked at notable 2018 cybersecurity incidents with a fresh perspective: What do they reveal about future adversary tactics? Read on for an in-depth analysis, best practices, and trends to watch.
Posted: 30 Aug 2019 | Published: 30 Aug 2019

Cisco Umbrella

Euronext Safeguards Pan-European Trading with Cymulate Breach and Attack Simulation
sponsored by Cymulate
CASE STUDY: Euronext, a leading pan-European marketplace, sought a more cost-effective way to test their security posture to complement the cyberattack simulations they have been running to date. After reviewing different solutions, Euronext decided to deploy Cymulate's Breach & Attack Simulation. In this case study, explore the benefits that Euronext saw.
Posted: 16 Sep 2019 | Published: 16 Sep 2019

Cymulate

Gaining Visibility into Risk and the ROI of Your Security Program
sponsored by Verizon
ANALYST REPORT: To make informed decisions about risk tolerance and security spending, it is critical to gain insight into the effectiveness of your security architecture, the threat landscape, and vulnerabilities. Download this IDC research report to explore how organizations can evaluate their security programs in the broader context of business risk.
Posted: 29 Aug 2019 | Published: 31 Oct 2018

Verizon

The Cybersecurity Effectiveness Podcast: Mike Fabrico
sponsored by Verodin
PODCAST: Download this podcast to listen as Mike Fabrico, former specialist at NASDAQ and Senior Director at TrapX Security, breaks down deception as a strategy—not just a tool—to provide organizations with the ability to turn the tables on their opponents.
Posted: 09 Sep 2019 | Premiered: Sep 9, 2019

Verodin

Advanced Protection for Web Applications on AWS
sponsored by Amazon Web Services
WHITE PAPER: As companies migrate business-critical applications from their on-premises infrastructure to the cloud, they increase their exposure to known and unknown targeted attacks. In this white paper, learn how organizations can combat these threats by deploying a security solution designed specifically for internet-facing applications such as a WAF.
Posted: 04 Sep 2019 | Published: 21 Aug 2019

Amazon Web Services

6 Ways to Make Your Security Stack Work Harder
sponsored by Cisco Umbrella
WHITE PAPER: The average company uses more than 50 security vendors. And sometimes you still find your stack coming up short when it comes to securing users anywhere they access the internet. In this white paper, check out 6 ways to amplify and extend your stack with cloud security from Cisco Umbrella.
Posted: 10 Sep 2019 | Published: 10 Sep 2019

Cisco Umbrella

How a Leading Professional Services Firm Enhanced Collaboration with Cloud Security
sponsored by Cisco Umbrella
CASE STUDY: Global professional services firm, Arup, moved from Cisco Cloud Web Security to Cisco Umbrella. By implementing a secure internet gateway in conjunction with next-gen endpoint security, Arup secured access to the internet wherever users go and reduced its exposure to malware. Download this case study to learn more.
Posted: 11 Sep 2019 | Published: 11 Sep 2019

Cisco Umbrella

Starbucks Combats Credential Stuffing and Account Takeover
sponsored by Shape Security
VIDEO: Starbucks' Director of InfoSec, Mike Hughes, joins the CEO of Shape Security for a conversation regarding the challenges of credential stuffing and account takeover at Starbucks and the industry at large. Tune in to hear about Starbuck's success with Shape Security's Blackfish.
Posted: 27 Aug 2019 | Premiered: 27 Aug 2019

Shape Security

Do You Need a WAF, or Something Better than a WAF?
sponsored by Shape Security
RESOURCE: The security market is drifting away from the use of web application firewall (WAF) technology for a number of reasons. In this blog post, learn about Shape Security's new solution which is a distributed anti-automation service, fronted by machine learning and backed by specialist operators.
Posted: 27 Aug 2019 | Published: 01 May 2019

Shape Security

Protecting Point-of-Sale Systems
sponsored by Morphisec, Inc.
PRODUCT OVERVIEW: With their highly valuable payment card and personal sensitive information, Point-of-Sale systems present a ripe target for cybercrime. Modern POS environments are complicated systems with multiple entry points for attack. In this brief, learn about the anatomy of a POS attack and what organizations can do to prevent against these attacks.
Posted: 09 Sep 2019 | Published: 09 Sep 2019

Morphisec, Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement