Business of Information Technology  >   Business Management  >   Financial Management  >   Budgeting  >   IT Spending  >  

Cybersecurity Spending

RSS Feed   
Cybersecurity Spending Reports
 
Spear Phishing: Top Threats and Trends
sponsored by Barracuda
RESEARCH CONTENT: As their speedy exploitation of fears around the COVID-19 pandemic show, cybercriminals adapt quickly to current events and new tactics. This in-depth report takes a look at the evolving trends in spear-phishing and the new ways attackers are tricking their victims – read on unlock this exclusive insight.
Posted: 29 Dec 2020 | Published: 29 Dec 2020

Barracuda

Simplify Cloud Compliance For Banking & Financial Services
sponsored by WinMagic
CASE STUDY: Banks and financial services institutions are embracing cloud computing – but as industry-specific compliance grows increasingly complex, it becomes critical to ensure they meet data privacy and cloud compliance needs. Read this use case to learn how WinMagic is helping banks address cloud risks and compliance gaps.
Posted: 29 Dec 2020 | Published: 29 Dec 2020

WinMagic

5 Types of Insider Threats and How to Detect Them in Your ERP System
sponsored by Appsian
RESOURCE: Although insider threats are the leading cause of the majority (57%) of data breaches, organizations often overlook these threats and focus their efforts on defending against external attacks. Read this blog post and discover the 5 most common insider threats and how to detect them in your ERP system.
Posted: 06 Jan 2021 | Published: 06 Jan 2021

Appsian

Transforming the SOC
sponsored by Mimecast
WHITE PAPER: Each year, organizations explore new technological territories and hackers grow more complex. This is made more difficult by an ever-expanding cybersecurity skills gap. This resource captures the expertise of independent industry leaders dedicated to addressing this imbalance by helping organizations rethink security operations – download now.
Posted: 05 Jan 2021 | Published: 16 Jul 2020

Mimecast

Online Identity and the Digital Economy of Tomorrow
sponsored by Pipl
EGUIDE: Identity verification has evolved from traditional methods – which required the presence of government-issued documents – towards digital, multi-layered methods. Read this e-guide for an in-depth analysis of the challenges of today’s environments and explore the emerging trends shaping the future of identity verification.
Posted: 20 Jan 2021 | Published: 20 Jan 2021

Pipl

Leading private hospital boosts email security to protect user data
sponsored by Barracuda
CASE STUDY: Healthcare is one of the most frequently targeted verticals and patient data has grown in value to cybercriminals. This case study follows how Richard Andrews, Head of IT at King Edward VII’s hospital in London, was able to implement email security for his most vulnerable patients – including members of the Royal Family.
Posted: 21 Dec 2020 | Published: 21 Dec 2020

Barracuda

SASE & the Forces Shaping Digital Transformation
sponsored by Netskope
RESOURCE: With the rise of of digital transformation, SASE, and the continuing effects of the COVID-19 pandemic, there are key forces that security practitioners need to be aware of. This blog outlines and details how security leaders can adapt to these key forces in a digitally transforming, SASE-enabled world – read on to get started.
Posted: 12 Jan 2021 | Published: 05 Nov 2020

Netskope

How to Eliminate Your Company's Cloud Security Exposure Risks
sponsored by Atakama
RESOURCE: When it comes to the cloud, there are specific risks that CISOs need to be aware of and prepare for prior to their migration. Read this article to learn more about the top threats to cloud computing and discover best practices for combating them.
Posted: 11 Dec 2020 | Published: 27 Jul 2020

Atakama

Go Beyond the Limitations of Multi-Factor Authentication to Protect Your Data
sponsored by Atakama
RESOURCE: As network environments become more complex, layered approaches to checking user credential, like multi-factor authentication (MFA) become “bulky” and inconvenient. Read this article to see why organizations are transitioning away from MFA towards single sign-on (SSO) approaches to access management.
Posted: 10 Dec 2020 | Published: 25 Jun 2020

Atakama

SecureDoc Enterprise Endpoint Encryption | Device Control
sponsored by WinMagic
DATA SHEET: As passwords become less reliable, organizations turn to defense strategies based around endpoint encryption to protect their users, manage devices, prevent breaches and ensure regulatory compliance. Read this data sheet to learn more about SecureDoc Enterprise – designed to offer each of these capabilities under one unified console.
Posted: 22 Dec 2020 | Published: 22 Dec 2020

WinMagic
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info