IT Management  >   Systems Operations  >   Security  >  

Cyber Security

RSS Feed   
Cyber Security Reports
 
CISO Guide to Ransomware Prevention in the Data Center
sponsored by ShieldX
WHITE PAPER: In the CISO Guide to Ransomware Prevention in the Data Center discover tips on crafting a ransomware defense strategy using microsegmentation.
Posted: 28 Jan 2020 | Published: 28 Jan 2020

ShieldX

How to Become Cyber Resilient: A Digital Enterprise Guide
sponsored by Malwarebytes
WHITE PAPER: Tap into this white paper to explore the current market influences that impact how an organization pursues cyber resilience, the key methods that should be adopted in becoming cyber resilient, and the reasons why cyber resilience can transform an organization into a digital enterprise highly focused on growth.
Posted: 24 Jan 2020 | Published: 24 Jan 2020

Malwarebytes

A Buyer’s Guide to Automating Personal Data Rights for CCPA and GDPR
sponsored by BigID
WHITE PAPER: With the arrival of data rights and privacy regulations, organizations face increasing pressure to maintain strategies that ensure data protection. The risks for failing to do so include financial, legal and reputational damage. Read this buyer’s guide to ensure your organization informed on the key aspects of data discovery.
Posted: 09 Jan 2020 | Published: 09 Jan 2020

BigID

ThreatQ for Healthcare
sponsored by ThreatQuotient
DATA SHEET: The personal health information that healthcare providers process and store make them enticing targets for hackers. The average cost of a data breach over the past 2 years is $2.2 million, and the number of attacks is increasing rapidly. Read this white paper to uncover key cybersecurity insights for the healthcare industry.
Posted: 17 Jan 2020 | Published: 17 Jan 2020

ThreatQuotient

Interview with Fraud Strategy Leader
sponsored by Mitek Systems, Inc.
WHITE PAPER: In this Q and A, the fraud strategy leader at a mobile-only banking app sits down with the customer success leader at Mitek to talk about why customer experience is critical to business success and the vital role it plays in identity verification.
Posted: 21 Jan 2020 | Published: 21 Jan 2020


Buyer’s Guide to Threat Intelligence Platforms
sponsored by ThreatQuotient
WHITE PAPER: As organizations begin to build their threat intelligence operations, they must consider how they will organize their data. Threat intelligence platforms (TIPs) give IT teams the visibility required to make the most of existing resources. Read this white paper to learn more about TIP, and how to go about making an informed buying decision.
Posted: 20 Jan 2020 | Published: 31 Mar 2018

ThreatQuotient

IDC Worldwide Cloud Security Market Shares, 2018: Protecting Workloads in Hybrid and Multicloud
sponsored by Trend Micro
WHITE PAPER: SDC workload security spans threat protection, vulnerability management, analytics, and data integrity to protect what runs on top of the SDC infrastructure. This research report offers advice for technology suppliers and highlights the global market share. Read on to uncover the results.
Posted: 24 Jan 2020 | Published: 30 Nov 2019

Trend Micro

How Does Security Innovation Power Digital Transformation?
sponsored by ZeroNorth
WHITE PAPER: Digital transformation is defined by its seeming-endless search for technological innovation. Unfortunately, security can sometimes be an afterthought for companies looking to stay ahead of the competition. In this white paper, discover how security innovation can augment digital transformation.
Posted: 24 Jan 2020 | Published: 31 Oct 2019

ZeroNorth

What is Tehama?
sponsored by Tehama
VIDEO: Today’s organizations need speed, security and access in order to stay competitive. In one SaaS platform, Tehama consolidates all capabilities and tools necessary to ensure secure access, continuous auditing and compliance enforcement. Continue to learn more about Tehama.
Posted: 20 Jan 2020 | Premiered: 20 Jan 2020

Tehama

A Modern Approach to Endpoint Remediation
sponsored by Malwarebytes
DATA SHEET: According to incident response teams, 68% of cases they investigate are caused by malware. The costs and manpower required to remediate these issues is rising, and organizations need a modern approach to protecting their endpoints. In this solution brief, dive deeper into Malwarebytes’ modern approach to endpoint protection and response.
Posted: 20 Jan 2020 | Published: 20 Jan 2020

Malwarebytes
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info