IT Management  >   Systems Operations  >   Security  >  

Cyber Security

RSS Feed   
Cyber Security Reports
The Path to GDPR Compliance
sponsored by Digital Shadows
WHITE PAPER: In May 2018, GDPR comes into full force. But what does this regulation bring, and how do you prepare? This white paper outlines the 4 key steps towards GDPR compliance and 8 key changes to be aware of under GDPR.
Posted: 07 Feb 2018 | Published: 07 Feb 2018

Digital Shadows

UEBA Use Case: Insider Attack Identification
sponsored by Hewlett Packard Enterprise
RESOURCE: Allow this resource to teach you how network monitoring through behavioral analytics or user and entity behavior analytics (UEBA) can help detect and prevent advanced attacks.
Posted: 13 Feb 2018 | Published: 13 Feb 2018

Hewlett Packard Enterprise

Moving from Vulnerability Management to Effective Vulnerability Response
sponsored by ServiceNow
WEBCAST: How does your team respond to new high-profile vulnerabilities? Explore this webinar to gain insight into the transition of vulnerability management to effective vulnerability response.
Posted: 31 Jan 2018 | Premiered: Jan 31, 2018


IAM for the Real World: Privileged Account Management
sponsored by One Identity
EBOOK: The world of IAM is one of constant change, shrinking deadlines and harsh regulations. This e-book dives into the most pressing IAM issues faced by organizations and offers actionable, affordable and sustainable approaches to combatting these challenges.
Posted: 13 Feb 2018 | Published: 13 Feb 2018

One Identity

Ransomware Defense for Dummies
sponsored by Cisco Umbrella
EBOOK: Based on statistics from Cisco's Talos threat intelligence group, on average, 2.9% of compromised victims in a ransomware attack will pay the ransom. Inside this for Dummies e-book, learn everything you need to know about ransomware attacks as well as best practices to reduce ransomware risks.
Posted: 26 Jan 2018 | Published: 26 Jan 2018

Cisco Umbrella

New Topics on the New Security+ SYO-501 Exam
sponsored by Global Knowledge
RESOURCE: It has been 3 years since the last revision of the CompTIA Security+ exam. In this resource, industry expert James Michael Stewart explains the updates to the exam and everything you need to know to prepare.
Posted: 30 Jan 2018 | Published: 30 Jan 2018

Global Knowledge

Real-Time Threat Prevention lets Managed IT Services Provider Vology Thrive
sponsored by Juniper Networks
CASE STUDY: An IT consulting company, Vology sought to protect corporate headquarters and branch offices from advanced threats in email messages and websites. In this case study, discover how Vology turned to an advanced threat protection tool that constantly analyzes email and web files to detect advanced persistent threats
Posted: 12 Feb 2018 | Published: 31 May 2017

Juniper Networks

Unlock Business Opportunity without Taking Security Risks
sponsored by Juniper Networks
WHITE PAPER: This white paper demonstrates how to successfully align your security and business goals to enable your digital transformation initiatives.
Posted: 15 Feb 2018 | Published: 15 Feb 2018

Juniper Networks

Reducing Cyber Exposure from Cloud to Containers
sponsored by Tenable, Inc.
EBOOK: This resource offers insight from 29 cybersecurity professionals regarding how they are beginning their cyber exposure journey to protect expanding attack surfaces.
Posted: 06 Feb 2018 | Published: 06 Feb 2018

Tenable, Inc.

Automate Firewall Change Management
sponsored by Skybox Security
WHITE PAPER: This white paper examines the current challenges in managing firewall changes, the typical firewall change management cycle and the concepts of an automate workflow system that addresses these challenges.
Posted: 07 Feb 2018 | Published: 07 Feb 2018

Skybox Security

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement