IT Management  >   Systems Operations  >   Security  >  

Cyber Security

RSS Feed   
Cyber Security Reports
 
Has O365 closed the door to data leaks?
sponsored by Zivver
WHITE PAPER: Many Office 365 users, along with Gartner, have recognized that extra security measures need to be taken in order to realize the full benefits of O365 adoption. Read this white paper to learn more about the security challenges, major gaps observed by O365 users.
Posted: 31 Mar 2021 | Published: 31 Mar 2021

TOPICS:  Cybersecurity
Zivver

A Zero-trust Access Strategy Has 3 Needs
sponsored by Fortinet, Inc.
WHITE PAPER: In an effort to reduce the risk of compromised devices, organizations are implementing Zero-trust Access (ZTA) strategies. Read this white paper to learn more about ZTA and discover the 3 pillars required for an effective ZTA strategy.
Posted: 06 Apr 2021 | Published: 06 Apr 2021

TOPICS:  Cybersecurity
Fortinet, Inc.

Five Steps To A Modern Cyber Risk Management Team In 2020
sponsored by Security Scorecard
EBOOK: According to a recent Deloitte survey, 95% of respondents experienced a wide range of cyberattacks – over half of which occurred within the last 2 years. This e-book highlights 5 steps your organization can take to transition from traditional, siloed risk management approaches towards a more collaborative effort – read on to get started.
Posted: 30 Mar 2021 | Published: 30 Mar 2021

TOPICS:  Cybersecurity
Security Scorecard

The Complete Guide To Building Your Third-party Risk Management Program In 2020
sponsored by Security Scorecard
EBOOK: Vendor risk management (VRM) programs, when done effectively, can improve an organization’s ability to identify and manage third-party risks. Read this e-book to unlock a comprehensive, 8-step process to take your VRM practices to a mature state.
Posted: 31 Mar 2021 | Published: 31 Mar 2021

TOPICS:  Cybersecurity
Security Scorecard

Days From “Concept” To “Production-Ready”
sponsored by Onfido
CASE STUDY: Yallo was looking to challenge legacy telecom practices that were cumbersome and clunky, especially on the user end. Read this case study to see how they addressed existing challenges and worked with Onfido to put the power back in the hands of their customers.
Posted: 30 Mar 2021 | Published: 30 Mar 2021

TOPICS:  Cybersecurity
Onfido

Work From Home: Secure And Scalable Connectivity Strategies
sponsored by McAfee
WHITE PAPER: VPNs and other remote work strategies were vastly underprepared when the COVID-19 pandemic forced nearly every employee to work from home. Read this white paper to unlock some expert work from home (WFH) strategies to ensure your remote workforce has secure and scalable access.
Posted: 06 Apr 2021 | Published: 06 Apr 2021

TOPICS:  Cybersecurity
McAfee

Top 50 Security Threats
sponsored by Splunk
EBOOK: Like you, cybercriminals are on their own digital transformation journey. So, even if you strive daily to protect your data and keep the cybercriminals at bay, you might need a little help. This book aims to do just that by identifying 50 cybersecurity threats you should care about. Download your complimentary copy of “Top 50 Security Threats”.
Posted: 12 Apr 2021 | Published: 12 Apr 2021

TOPICS:  Cybersecurity
Splunk

Your guide to choosing the right IAM tool
sponsored by Beta Systems
EGUIDE: With more and more organizations opting for remote and hybrid workforce models, it’s become more critical than ever to rethink how to manage and secure access. In this e-guide take a closer look at modern identity and access management (IAM) capabilities, requirements and offerings – read on to get started.
Posted: 08 Apr 2021 | Published: 05 Apr 2021

TOPICS:  Cybersecurity
Beta Systems

Implementing Dynamic SAP Data Masking in ECC & S/4HANA Using Appsian
sponsored by Appsian
WHITE PAPER: SAP data protection can be tricky to master – out-of-the-box options are often underwhelming, and large-scale projects can be complicated and expensive. Read this white paper to learn about Appsian’s alternative, designed to provide a centralized ruleset to help define and mask data across the entire application.
Posted: 16 Apr 2021 | Published: 16 Apr 2021

TOPICS:  Cybersecurity
Appsian

Is Sensitive Data Safe in the Cloud?
sponsored by PKWare
EBOOK: Whether you’re pondering a move to the cloud, already in the cloud or expending to a multi-cloud environment, this e-book provides you with the insight and guidance needed to assess your risk and manage sensitive data in the cloud – read on to get started.
Posted: 16 Apr 2021 | Published: 16 Apr 2021

TOPICS:  Cybersecurity
PKWare
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences