IT Management  >   Systems Operations  >   Security  >  

Cyber Security

RSS Feed   
Cyber Security Reports
 
Endpoint Sensor: Understand the source, impact, and spread of advanced threats with endpoint detection and response (EDR)
sponsored by Trend Micro, Inc.
RESOURCE: Malware can manifest itself in your enterprise networks, bypassing traditional security technology. Fortunately, Trend Micro's Endpoint Sensor gives insight to detections by allowing threat investigators to explore detections and hunt for new threats. In this resource, learn more key features of Endpoint Sensor.
Posted: 05 Mar 2019 | Published: 05 Mar 2019

Trend Micro, Inc.

Reduce Third-Party Risk Management Costs with CyberGRX
sponsored by CyberGRX
RESOURCE: Learn how your organization can utilize a program that streamlines and catalyzes the third-party risk process by sharing one dynamic assessment with many enterprises that can reduce both risk and cost.
Posted: 01 Mar 2019 | Published: 01 Mar 2019

CyberGRX

Market Guide for Application Shielding
sponsored by Arxan
RESEARCH CONTENT: Protecting applications that run within untrusted environments is crucial as mobile, IoT and modern web applications migrate software logic to the client side. Application shielding is well-suited to protect consumer mobile apps. Download this Gartner research report to learn more about application shielding.
Posted: 14 Feb 2019 | Published: 27 Jun 2018

Arxan

Cybersecurity for Connected Maintenance Apps
sponsored by Irdeto
EBOOK: In the age of Industry 4.0, connected maintenance apps play an important role in creating a thriving service & maintenance business. However, deploying mobile apps in a hostile environment where they can be easily reverse engineered may have quite the opposite effect. In this eBook, learn what a good application security strategy looks like.
Posted: 25 Feb 2019 | Published: 25 Feb 2019

Irdeto

Evolving Security Drivers in the UK Public Sector
sponsored by Kyocera Document Solutions UK
RESOURCE: There is an increased appetite for more secure print and document management processes. Even public sector organizations with a good grasp of the security challenges facing their print estates have a hard time knowing how secure each device is. In this article, learn how KYOCERA's Secure MFP can help mitigate the risks of threats and attacks.
Posted: 21 Mar 2019 | Published: 06 Apr 2018

Kyocera Document Solutions UK

4 Server Security Must-Haves
sponsored by Dell EMC and Intel®
WHITE PAPER: Analysts have pinpointed firmware attacks as one of today's greatest system threats. Uncover four security features that server architecture should have to ensure your data center's most critical pieces of hardware are cyber-resilient and gap-free.
Posted: 12 Feb 2019 | Published: 12 Feb 2019

Dell EMC and Intel®

Operationalizing Threat Intelligence Using Splunk® Enterprise Security
sponsored by Splunk Services UK Ltd
WHITE PAPER: Threat intelligence can provide critical security perspectives needed to inform an organization about current threats and to help develop a strategy against future threats. In this white paper, learn about the challenges and requirements of implementing high-coverage threat intelligence.
Posted: 19 Feb 2019 | Published: 19 Feb 2019

Splunk Services UK Ltd

Hacker-Powered Pen Tests and the Power of More
sponsored by HackerOne
WHITE PAPER: Like traditional penetration testing, a hacker-powered pen test like the HackerOne Challenge program runs for a fixed time period. But it also brings to bear the skills of up to thousands of hackers who probe your web applications for vulnerabilities. In this white paper, learn about the advantages of HackerOne Challenge.
Posted: 06 Mar 2019 | Published: 06 Mar 2019

HackerOne

Cryptojacking
sponsored by Symantec
WEBCAST: Cryptojacking can be a nuisance to your employees but, more importantly, these attacks can result in unexpected increases in your business costs. There are two types of cryptojacking attacks: file-based and browser-based attacks. In this webcast, walk through how a typical browser-based cryptojacking scenario might play out.
Posted: 06 Mar 2019 | Premiered: Mar 6, 2019

Symantec

G Suite Security and Trust
sponsored by Dito
EBOOK: In this e-book, learn how the robust security features in the G Suite are designed to protect your business from threats like major spear-phishing attacks. These features include cutting-edge cloud security, encryption, access and authentication and more.
Posted: 22 Mar 2019 | Published: 22 Mar 2019

Dito
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement