IT Management  >   Systems Operations  >   Security  >  

Cyber Security

RSS Feed   
Cyber Security Reports
 
Enterprise Email Security, Q2 2019: The 12 Providers That Matter Most And How They Stack Up
sponsored by Trend Micro, Inc.
RESEARCH CONTENT: Email is a critical business function deeply embedded in business processes. Its ubiquity makes email a platform for credential phishing attempts, malware, spam, and business email compromise. This research report suggests 3 key considerations to look for when choosing an email content security provider.
Posted: 21 May 2019 | Published: 16 May 2019

Trend Micro, Inc.

Cybersecurity Heroes Aren't Born... They're Made
sponsored by Proofpoint
WEBCAST: As organizations have become more open to delivering security awareness training, phishing has become a primary focus. But, email is just one of many mediums at cybercriminals' disposal. In this webcast, Gretel Egan discussed best practices and actionable tips for improving the effectiveness of your security awareness training activities.
Posted: 30 May 2019 | Premiered: May 31, 2018

Proofpoint

Phishing in the Age of SaaS
sponsored by SonicWall
WHITE PAPER: Phishing attacks have become the primary hacking method used against organizations. While the roots of the attack trace back to the beginning of email adoption, the proliferation of SaaS has led to a resurgence in this hacking method. In this white paper, learn how SonicWall Cloud App Security can help you defend against SaaS phishing attacks.
Posted: 11 Jun 2019 | Published: 11 Jun 2019

SonicWall

Introducing The F5 Advanced WAF
sponsored by F5 Networks
WEBCAST: The F5 Advanced Web Application Firewall (WAF) provides a set of security features that can help keep your Web Applications safe from attack. In this webcast, John Wagnon, Senior Solution Developer at DevCentral, outlines many of the key features offered in the F5 Advanced WAF.
Posted: 08 May 2019 | Premiered: Apr 30, 2018

F5 Networks

Swinburne University of Technology Meets Its Essential 8 Mandate
sponsored by Ivanti ANZ
CASE STUDY: Following a risk assessment, Swinburne University determined that following the ASD Essential 8 recommended cybersecurity mitigation strategies would help ensure the strongest form of defense against a cyberattack. In this case study, learn how Swinburne was able to implement the ASD Essential 8 by implementing Ivanti's security portfolio.
Posted: 30 May 2019 | Published: 30 May 2019

Ivanti ANZ

Episode 1: Good Jan, Bad Jan
sponsored by Proofpoint
WEBCAST: This security skit uses humor and real-world situations to inform end users about the risks related to the social engineering techniques and risky behaviors that can lead to successful business email compromise (BEC) attacks. Download the video to further explore the risks associated with unlocked PCs and poor password security.
Posted: 07 Jun 2019 | Premiered: Jun 7, 2019

Proofpoint

Crowdstrike Falcon Complete:How To Achieve Instant Cybersecurity Maturity For Organizations Of All Sizes
sponsored by CrowdStrike
WHITE PAPER: The shortage of cybersecurity resources and expertise can lead organizations to struggle with implementing the security technology they acquire. In this white paper, learn how CrowdStrike Falcon Complete can solve these challenges by combining Falcon endpoint protection platform with a dedicated team of security professionals.
Posted: 04 Jun 2019 | Published: 04 Jun 2019

CrowdStrike

The ASD Essential 8 and Ivanti
sponsored by Ivanti ANZ
WHITE PAPER: Implementing the ASD Essential 8 effectively helps you achieve a baseline for your cybersecurity strategy. While this sounds straightforward, many companies still struggle to achieve this level of security today. In this white paper, learn about the importance of each control that makes up the Essential 8.
Posted: 30 May 2019 | Published: 30 May 2019

Ivanti ANZ

9 Common Security Mistakes Your Organization Might Be Making
sponsored by Involta
WHITE PAPER: Without cybersecurity practices in place, a company could risk up to $4.43 million in breach costs, according to the Ponemon/IBM 2018 Cost of a Data Breach Study. Most companies should be very concerned about their security practices. In this white paper, explore 9 security mistakes that are commonly made over and over again.
Posted: 21 May 2019 | Published: 21 May 2019

Involta

The Critical Role of Endpoint Detection and Response
sponsored by Trend Micro, Inc.
RESEARCH CONTENT: Conventional security solutions are useful and provide some level of protection. However, surveys find that the current level of protection is simply not adequate. In this Osterman Research report, explore why many organizations are deploying endpoint detection and response technologies as a supplement to their existing security defenses.
Posted: 24 May 2019 | Published: 30 Apr 2019

Trend Micro, Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement