IT Management  >   Systems Operations  >   Security  >  

Computer Security Threats

RSS Feed   
Computer Security Threats Reports
 
Shake the Box: How to Get Encrypted Traffic Insights Without Decryption
sponsored by Corelight
WHITE PAPER: The most advanced security teams rely on network traffic as a fundamental data source for security investigations, but encryption has made that increasingly difficult. In this white paper, learn how the open-source Zeek framework (formerly called 'Bro') was purpose-built for network security monitoring.
Posted: 21 May 2019 | Published: 21 May 2019

Corelight

8 Essential Elements of a Comprehensive IT Security Strategy
sponsored by Involta
WHITE PAPER: IT security measures should be at the forefront of every business owner's mind. Improving cybersecurity to prevent data loss and protect critical business and financial data is essential. In this white paper, explore 8 elements that play an important role in developing and maintaining secure IT environments.
Posted: 21 May 2019 | Published: 21 May 2019

Involta

Apply the ASD Top 4 and Mitigate up to 85% of Endpoint Attacks
sponsored by Ivanti ANZ
DATA SHEET: As cybersecurity breaches proliferate, targeting the user and the endpoint, the pressure on InfoSec and IT teams to protect their organization grows. In this data sheet, learn how Ivanti's Security portfolio provides InfoSec and IT teams with capabilities essential for ransomware and other malware prevention.
Posted: 29 May 2019 | Published: 31 Dec 2017

Ivanti ANZ

Security Maturity: Mapping the Road to Resilience in Europe
sponsored by Dell SecureWorks
WHITE PAPER: The road to cybersecurity maturity can be tricky. This is because there isn't one universal standard by which management can determine how well the risk is being managed. For European organizations, reviewing the highlights in this white paper can provide clues for comparing their own cybersecurity maturity to that of other EMEA organizations.
Posted: 23 May 2019 | Published: 23 May 2019

Dell SecureWorks

Who needs malware? How Adversaries use Fireless Attacks to Evade your Security
sponsored by CrowdStrike
WHITE PAPER: According to CrowdStrike, 8 out of 10 attack vectors that resulted in a successful breach used fileless attack techniques. Access this white paper to learn how fileless attacks work and why traditional techniques fail to protect your organization.
Posted: 04 Jun 2019 | Published: 04 Jun 2019

CrowdStrike

Proofpoint Helps Largest Nordic Building Association OBOS Construct Superior Email Security
sponsored by Proofpoint
CASE STUDY: From its beginnings, OBOS has become the largest Nordic cooperative building association. However, as OBOS began to grow they needed to expand their email security protection. In this case study, learn why OBOS decided to deploy Proofpoint's Enterprise Protection and Targeted Attack Protection.
Posted: 10 Jun 2019 | Published: 10 Jun 2019

Proofpoint

Cyber Intrusion Services
sponsored by CrowdStrike
WHITE PAPER: In this report, discover how the CrowdStrike Falcon can deliver the visibility and operational expertise necessary to stop breaches before adversaries can take control of your entire network, as well as stories from the front lines of incident response in 2018 and insights that matter for 2019.
Posted: 04 Jun 2019 | Published: 04 Jun 2019

CrowdStrike

Interview: The People Factor: Fight Back Against Phishing
sponsored by Proofpoint
WEBCAST: Phishing remains the top attack vector used by cybercriminals and every end user is a potential target. But with the right security awareness training, these same people can be a key component in your anti-phishing defense. In this webcast, Kurt Wescoe, Chief Architect at Wombat Security shares his insights on preventing phishing attacks.
Posted: 30 May 2019 | Premiered: Jun 30, 2018

Proofpoint

Crowdstrike Falcon Complete:How To Achieve Instant Cybersecurity Maturity For Organizations Of All Sizes
sponsored by CrowdStrike
WHITE PAPER: The shortage of cybersecurity resources and expertise can lead organizations to struggle with implementing the security technology they acquire. In this white paper, learn how CrowdStrike Falcon Complete can solve these challenges by combining Falcon endpoint protection platform with a dedicated team of security professionals.
Posted: 04 Jun 2019 | Published: 04 Jun 2019

CrowdStrike

How to Strengthen Your Vendor Risk Management Strategy Through Automation
sponsored by BitSight
RESOURCE: To reduce third-party cyber-risk organizations need processes and solutions that leverage automation. In this resource, Stephen Boyer, CTO of BitSight, explains how organizations can incorporate automation to develop more mature vendor risk management programs.
Posted: 23 May 2019 | Published: 23 May 2019

BitSight
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement