IT Management  >   Systems Operations  >   Security  >  

Cyber Security

RSS Feed   
Cyber Security Reports
Rethinking Threat Intel Management feat. Dark Reading
sponsored by Palo Alto Networks
VIDEO: According to SANS, 88% of SOCs use cyber threat intelligence for threat detection, and nearly half of organizations with SOCs have a dedicated threat intel team. To learn more about the challenges, opportunities and trends of today’s threat intelligence approaches, watch this webinar.
Posted: 07 Jul 2021 | Premiered: 07 Jul 2021

TOPICS:  Cybersecurity
Palo Alto Networks

A Computer Weekly buyer's guide to SIEM and SOAR
sponsored by
EGUIDE: The question of how to use data has big implications on a company's performance. In this 16-page buyer's guide, Computer Weekly looks at how SIEM and SOAR tools assist IT teams, why security tools require strong internal security processes to work effectively and what role they have in a rapidly changing cyber threat landscape.
Posted: 09 Sep 2021 | Published: 09 Sep 2021

Cloudcheckr Holds The Key To Compliance
sponsored by Cloudcheckr
CASE STUDY: Access this case study to learn about how CloudCheckr helped CloudChomp, a cloud migration tools company, bring total compliance and cloud security to their Amazon Web Services (AWS) infrastructure.
Posted: 02 Jun 2021 | Published: 02 Jun 2021

TOPICS:  Cybersecurity

Hype Cycle for Security Operations, 2021
sponsored by Cycognito
ANALYST REPORT: Security operations technologies and services defend IT systems from attack by identifying threats and exposure to vulnerability — enabling effective response and remediation. This Gartner Hype Cycle for Security Operations report highlights some of the most exciting and important technology trends of 2021.
Posted: 20 Oct 2021 | Published: 23 Jul 2021

TOPICS:  Cybersecurity

A Guide To Frictionless Zero Trust For Modern Enterprises
sponsored by CrowdStrike
EGUIDE: In this informative e-guide, take a closer look at the advantages of frictionless Zero Trust, unlock the key pillars of the NIST Zero Trust framework, and discover if your organization is ready to undertake the CrowdStrike Zero Trust journey – read on to unlock this exclusive e-guide.
Posted: 07 Jun 2021 | Published: 07 Jun 2021

TOPICS:  Cybersecurity

Computer Weekly - 26 October 2021: Managing cyber risk by integrating supply chains
sponsored by
EZINE: In this week's Computer Weekly, our new Buyer's Guide examines the security and IT integration challenges of modern supply chains – we also talk to the CEO of SolarWinds about how the company overcame its huge supply chain attack. And we look at how a small town in Lancashire was chosen to host the UK's National Cyber Force. Read the issue now.
Posted: 22 Oct 2021 | Published: 26 Oct 2021

CW APAC – July 2021: Trend Watch: Supply Chain Security
sponsored by
EZINE: In this handbook, Computer Weekly looks at rise of supply chain attacks, the challenges that come with zero-trust security and attacks on the Covid-19 vaccine supply chain
Posted: 09 Jul 2021 | Published: 09 Jul 2021

United HealthCare
sponsored by PKWare
CASE STUDY: Across healthcare facilities, protecting safeguarding Protected Health Information (PHI) is a massive yet crucial responsibility – but how can you protect data if you don’t know where it resides? Read this case study to discover how United HealthCare boosted their data discover and protection capabilities thanks to a partnership with PKWare.
Posted: 29 Sep 2021 | Published: 29 Sep 2021

TOPICS:  Cybersecurity

Computer Weekly - 21 December 2021: What is Log4Shell - and why the panic?
sponsored by
EZINE: In this week's Computer Weekly, we assess the risks from Log4Shell, a new web software vulnerability described as "catastrophic". We look at SASE – secure access service edge – which is set to be one of the networking priorities for 2022. And some victims of the Post Office IT scandal are still waiting for proper compensation. Read the issue now.
Posted: 20 Dec 2021 | Published: 21 Dec 2021

Tip & Soar: Creating Increased Capability For Less Mature Teams
sponsored by ThreatConnect
BLOG: Threat intelligence platforms (TIPs) with security orchestration, automation and response (SOAR) capabilities are the dynamic duo of today’s cybersecurity programs. Read this article to learn more about the core functions and potential benefits of TIP and SOAR.
Posted: 12 Jul 2021 | Published: 02 Jul 2021

TOPICS:  Cybersecurity

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.


All Rights Reserved, Copyright 2000 - 2022, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences