IT Management  >   Systems Operations  >   Security  >  

Computer Security Threats

RSS Feed   
Computer Security Threats Reports
 
The CISO'S Guide to Machine Learning & User and Entity Behavioral Analytics
sponsored by Hewlett Packard Enterprise
EBOOK: Utilize this 40-page CISO's guide to machine learning to learn how combining all of a user's data along with machine learning insights, UBEA becomes a powerful approach to detecting threats inside an organization and empowers analysts with new threat hunting capabilities.
Posted: 15 Feb 2018 | Published: 15 Feb 2018

Hewlett Packard Enterprise

Reducing Cybersecurity Costs & Risk through Automation Technologies
sponsored by Juniper Networks
ANALYST REPORT: In this 32-page Ponemon Institute report, learn how organizations are deploying security technologies that augment or replace human intervention, along with the benefits of automation and their cost effectiveness.
Posted: 12 Feb 2018 | Published: 30 Nov 2017

Juniper Networks

Market Guide for Mobile Threat Defense Solutions
sponsored by Lookout
WHITE PAPER: Download this market guide for mobile threat defense solutions to discover how they can protect your organization at the device, network and application level and compare vendors in the space.
Posted: 16 Jan 2018 | Published: 22 Aug 2017

Lookout

The Business Case for Mobile Security
sponsored by Lookout
EBOOK: Mobility is the way of the future, so you need to protect your mobile devices. This e-book chapter presents the case for mobile security and how you can convince the different decision-makers that mobile threats are real and worth the investment to defend against.
Posted: 12 Jan 2018 | Published: 12 Jan 2018

Lookout

State of Software Security
sponsored by Veracode, Inc.
WHITE PAPER: According to this report the top 10 list of most common vulnerability categories in 2017 is strikingly similar to 2016. Information leakage was again the most prevalent, present in 66% of apps on initial scan. Inside this report, State of Software Security, uncover trends over time, benchmark performance, and identify best practices.
Posted: 12 Jan 2018 | Published: 28 Dec 2017

Veracode, Inc.

Lessons Learned from a Decade of Data Breaches
sponsored by F5 Networks
RESEARCH CONTENT: As cybercrime grows, how can you better protect your business? The answer is to start understanding how these criminals target their victims, and how they get in. In this research report, find out what aspect of your IT environment is being targeted by criminals, how criminals choose their victims, and more.
Posted: 23 Jan 2018 | Published: 30 Nov 2017

F5 Networks

The Rebirth of Endpoint Protection
sponsored by NSS Labs
WHITE PAPER: Advanced endpoint protection shows significant promise for protecting endpoint devices. However, this emerging market is rapidly growing and in a constant state of flux. Inside this resource from NSS Labs uncover key factors to consider when evaluating AEP.
Posted: 09 Feb 2018 | Published: 31 Dec 2017

NSS Labs

Data Management Platforms for GDPR: Buyer's Checklist
sponsored by Delphix
RESOURCE: Get ready for the coming changes to compliance and data privacy being ushered in by GDPR, and use this handy checklist to help ensure your data management tools and techniques will be ready for the new regulations.
Posted: 12 Dec 2017 | Published: 31 Oct 2017

Delphix

Deception Matters: Slowing Down the Adversary
sponsored by Illusive Networks
WHITE PAPER: Access this SANS review to learn about the key benefits of deception technology and how to successfully deploy it in your network security strategy.
Posted: 12 Feb 2018 | Published: 31 May 2017

Illusive Networks

How SMBs are Changing their Security Tactics
sponsored by Booz Allen Hamilton
EGUIDE: Security has changed dramatically over the decades. In this e-guide, learn why firms look to security analytics to keep pace with cyber threats and how closer collaboration between departments, such as business continuity and information security, could help raise staff awareness.
Posted: 03 Jan 2018 | Published: 03 Jan 2018

Booz Allen Hamilton
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement