IT Management  >   Systems Operations  >   Security  >  

Cyber Security

RSS Feed   
Cyber Security Reports
 
Endpoint Protection Best Practices to Block Ransomware
sponsored by Sophos
WHITE PAPER: Ransomware attacks are on the rise – both in terms of frequency and average cost per attack. This white paper provides a comprehensive look into how ransomware attacks work, how they can be stopped, and best practices for configuring your endpoints for the strongest protection possible – read on to get started.
Posted: 11 Jan 2021 | Published: 31 Jul 2020

Sophos

Driving Real Behavior Change
sponsored by Proofpoint
EBOOK: Because today’s cyberattacks often target an organization’s users, a people-centric approach gives your security team the best chance at identifying and preventing potential threats. Read this e-book to discover how to build an effective security awareness training program.
Posted: 14 Dec 2020 | Published: 14 Dec 2020

Proofpoint

See More, Know More, Do More With Cloud Security Posture Management
sponsored by AWS & CrowdStrike
VIDEO: Cloud security isn’t where it needs to be in terms of safeguarding critical data against today’s attackers. In this webinar, explore the shortcomings of today’s cloud security strategies and learn more about CrowdStrike’s approach to securing the cloud by increasing visibility – watch now to get started.
Posted: 18 Dec 2020 | Premiered: 18 Dec 2020

AWS & CrowdStrike

Leading private hospital boosts email security to protect user data
sponsored by Barracuda
CASE STUDY: Healthcare is one of the most frequently targeted verticals and patient data has grown in value to cybercriminals. This case study follows how Richard Andrews, Head of IT at King Edward VII’s hospital in London, was able to implement email security for his most vulnerable patients – including members of the Royal Family.
Posted: 21 Dec 2020 | Published: 21 Dec 2020

Barracuda

Enabling Partners With Simple, Private Application Access
sponsored by Axis Security
WHITE PAPER: Securing and managing third-party access to critical applications is a growing concern for IT teams. This whitepaper offers a closer look at the Axis Security Application Access Cloud, designed to simplify, accelerate and secure third-party application enablement & management – read on to get started.
Posted: 08 Jan 2021 | Published: 08 Jan 2021

Axis Security

Case Study: Ledn
sponsored by Clearedin
CASE STUDY: In this case study, discover how Ledn, a cryptocurrency company, was able to achieve better email security and industry-specific compliance requirements through a partnership with CleardIn – which equipped them to better identify and prevent email-based threats. Read on for the full story.
Posted: 05 Jan 2021 | Published: 05 Jan 2021

Clearedin

Microsoft Teams: Top 10 Security Threats
sponsored by McAfee
WHITE PAPER: The rapid move towards cloud capabilities and remote worker enablement has led to a massive increase in cloud collaboration tools, like Microsoft Teams. Read this white paper and discover the top 10 Microsoft Teams security threats.
Posted: 10 Dec 2020 | Published: 10 Dec 2020

McAfee

Microsoft Cloud Accelerator Workshop
sponsored by Insight
VIDEO: In order to realize the full benefits of Microsoft 365, Microsoft offers a number of workshops designed to be a deep dive into a specific functionality or capability. Watch this short video for an overview of what’s covered in the cloud, remote work, compliance and security workshops.
Posted: 08 Jan 2021 | Premiered: 08 Jan 2021

Insight

5 Steps to Secure Home Devices & Improve Productivity for Remote Work
sponsored by Barracuda
WHITE PAPER: Due to the pandemic, remote work became an essential part of a modern enterprise. But for remote work and employees to thrive, they need fast and secure access to data. Read on to discover 5 steps organizations can take to further secure their remote workers, without sacrificing productivity.
Posted: 21 Dec 2020 | Published: 21 Dec 2020

Barracuda

Cyberattack Survival Kit
sponsored by Zerto
EGUIDE: Given the inevitability of ransomware attacks, organizations can no longer rely on cybersecurity measures to prevent attacks – modern approaches need to account for this eventuality and focus efforts on recovery, remediation and resilience. Read this Cyberattack Survival Guide to unlock a 6-step ransomware recovery strategy.
Posted: 11 Dec 2020 | Published: 11 Dec 2020

Zerto
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info