Cybersecurity Reports

Your Guide to Combatting Ransomware's Domination of 2017
sponsored by CyberArk
EGUIDE: Learn how to boost your ransomware security awareness in this expert e-guide. Additionally, discover why ransomware continues to be a major threat and what ransomware prevention tools can help you win the battle.
Posted: 06 Jun 2017 | Published: 02 Jun 2017

CyberArk

7 Steps to Overcome SSL Security Issues and Vulnerabilities
sponsored by Fortinet, Inc.
EGUIDE: As SSL technology evolves and changes, new vulnerabilities begin to cause problems. Inside this guide, industry expert Rob Shapland explains how security professionals can overcome these SSL security issues with 7 key steps.
Posted: 02 Jun 2017 | Published: 25 May 2017

Fortinet, Inc.

Cloud access security brokers: Hard to tell what's real
sponsored by TechTarget Security
EZINE: In this issue of Information Security, we look at the momentum behind cloud access security brokers and find out how the uses and dangers stack up.
Posted: 01 Jun 2017 | Published: 01 Jun 2017

TechTarget Security

Doxware: New Ransomware Threat, or Just Extortionware Rebranded?
sponsored by Fortinet, Inc.
EGUIDE: Ransomware is on the rise, and businesses are starting to understand how they can combat it, but new threats appear every day. Inside this guide, learn whether or not doxware is a worrying new ransomware trend or a rebranding of extortionware.
Posted: 31 May 2017 | Published: 26 May 2017

Fortinet, Inc.

How to Build an Enterprise Cybersecurity Plan
sponsored by Fortinet, Inc.
EGUIDE: A cybersecurity action plan is a crucial part of achieving a state of cybersecurity readiness. Inside this guide, industry expert Peter Sullivan explains what goes into these plans and how to get one started.
Posted: 26 May 2017 | Published: 26 May 2017

Fortinet, Inc.

Cybersecurity Careers Soar
sponsored by TechTarget Security
EZINE: In the security field, certifications and degrees are nevera substitute for on-the-job experience. In this month's Information Security magazine, we look at cybersecurity careers. Should your company invest in first-time CISOs, threat hunters and more diversity?
Posted: 01 May 2017 | Published: 01 May 2017

TechTarget Security

The Current State of Blockchain Compliance
sponsored by BAE Systems Applied Intelligence
EGUIDE: In this expert e-guide, we examine blockchains and how they're affecting digital enterprise assets and cybersecurity. Discover how these distributed ledgers relate to Bitcoin and data security. Plus, learn how blockchain innovation and apps like smart contracts are affecting compliance.
Posted: 01 Mar 2017 | Published: 24 Feb 2017

All resources sponsored by BAE Systems Applied Intelligence

Artificial Intelligence and Machine Learning: Cybersecurity Advances
sponsored by TechTarget Security
EZINE: In this issue of Information Security magazine, we look at machine learning in security and how recent advances may bolster your defenses.
Posted: 01 Mar 2017 | Published: 01 Mar 2017

TechTarget Security

Security Rating Scores for Third-Party Vendors Catching On
sponsored by BitSight
EGUIDE: In this e-guide discover why implementing security rating scores for third-party vendors is catching on, and if their impact is showing to be an overall positive one for the industry.
Posted: 23 Feb 2017 | Published: 15 Feb 2017

BitSight

Getting Ahead of Cyber Threats in 2017
sponsored by TechTarget Security
EZINE: In this issue of Information Security magazine, we look at new ways that attackers may approach cybersecurity attacks and how to bolster your defenses.
Posted: 01 Feb 2017 | Published: 01 Feb 2017

TechTarget Security

When Cyberthieves Attack, Technologies Have Your Back
sponsored by TechTarget Health IT
EZINE: Access this issue of Pulse e-zine now to gain insight into cybersecurity technologies such as multifactor authentication, behavioral analytics and honeypot to help prevent cyberthieves from stealing patient data. Also in this issue, we explore five key reasons why healthcare is so vulnerable a target for ransomware attacks.
Posted: 24 Jan 2017 | Published: 24 Jan 2017

TechTarget Health IT

Businesses Eye VDI Security to Fight Cyberattacks
sponsored by Citrix
EGUIDE: The rise of data breaches puts security as a top priority in businesses, and VDI is a layer that can help IT minimize the number of vulnerable endpoints. Download our e-guide to learn how VDI security can bulk up your defenses against cyberattacks.
Posted: 20 Dec 2016 | Published: 15 Dec 2016

Citrix

Dedicated to Information Security: The High-Stakes Role of the CISO
sponsored by TechTarget Security
EZINE: Almost 20 years into its existence, the CISO job is still open to discussion. In this issue of Information Security, we look at the role's influence on broader security initiatives, plus challenges of the job and the changes ahead. Download now and you'll also get tips on implementing cyberthreat intelligence, a CISO Q&A, and more.
Posted: 01 Dec 2016 | Published: 01 Dec 2016

TechTarget Security

The Future of Security: Advanced Security Analytics
sponsored by LogRhythm, Inc.
EGUIDE: As security attacks have grown in numbers and complexity over the past few years, security efforts have evolved in the same measure. Advanced security analytics is the next step in cybersecurity. Learn how to shift from a reactive to a proactive approach and what the future of security holds.
Posted: 23 Nov 2016 | Published: 22 Nov 2016

LogRhythm, Inc.

Malware Analysis: How Some Strains 'Adapt' to Virtual Machines
sponsored by Kaspersky
EGUIDE: Server-oriented malware is actually more likely to infect a virtual system than a physical one in many organizations. Now what? This expert e-guide provides the real story of how malware is adapting to virtual environments, so you can ensure protection going forward.
Posted: 01 Nov 2016 | Published: 27 Oct 2016

Kaspersky

Straddling the Security Divide Between On-Premises and Cloud
sponsored by TechTarget Security
EZINE: Legacy security tools designed for data centers don't work well in cloud infrastructures. We help you conquer the divide between on-premises and cloud security in this issue of Information Security.
Posted: 01 Nov 2016 | Published: 01 Nov 2016

TechTarget Security

DNS Co-Founder Discusses the Need for a More Secure DNS
sponsored by Dyn
EGUIDE: This expert e-guide features a Q&A with Paul Mockapetris, inventor of the Domain Name System, where he discusses the immediate need for a more secure DNS and Internet. Additionally, learn what security risks IoT will bring to DNS.
Posted: 24 Oct 2016 | Published: 20 Oct 2016

Dyn

Explore the Evolving DDoS Threat Landscape
sponsored by Radware
EGUIDE: Delve into the evolution of DDoS threats: learn how to deliver clean network traffic to your customers and mitigate the threat DDoS presents. Additionally, discover how to formulate a DDoS-resistant cloud by taking advantage of content delivery networks, reducing publicly exposed environments, and more.
Posted: 20 Oct 2016 | Published: 18 Oct 2016

Radware

Healthcare Ransomware Attacks: The Critical Role of Backup and 5 Steps for Response
sponsored by Xerox
EGUIDE: In early 2016 alone, healthcare organizations saw a 300% increase in daily ransomware attacks from 2015. That's why Harun Rashid, CIO of Children's Hospital of Pittsburgh, has provided 6 pointers for the prevention of a ransomware attack. And in the event that attacks still get through, read through Reda Chouffani's 5 steps for effective response.
Posted: 20 Oct 2016 | Published: 19 Oct 2016

Xerox

DDoS Prevention For Attacks That Bypass DNS Rerouting
sponsored by Radware
EGUIDE: In this e-guide, you'll uncover ways organizations can stay protected when using cloud-based DDoS prevention services. Read on to learn expert strategies from emerging business and technology director Ed Moyle.
Posted: 19 Oct 2016 | Published: 18 Oct 2016

Radware

Using DNS Monitoring to Detect Network Breaches
sponsored by Dyn
EGUIDE: Numerous DNS monitoring methods exist, but 3 stand above the rest. Access this e-guide for our IT security expert's take on DNS monitoring to detect network breaches.
Posted: 18 Oct 2016 | Published: 17 Oct 2016

Dyn

The Truth After the Hype: Improve Mobile Data Security
sponsored by vmware airwatch
EGUIDE: In this expert guide, learn how to strengthen your defenses against mobile security breaches with encryption, containerization and more. Discover the new, common vulnerabilities mobile devices and data face and best practices to manage them moving forward.
Posted: 11 Oct 2016 | Published: 10 Oct 2016

vmware airwatch

Data Governance: Expert Q&A and Picking The Right DG Tool
sponsored by Globanet Veritas
EGUIDE: This e-guide features a Q&A with the VP of product development for IBM Analytics about the changing world of data governance (DG), how the DG plan will play out in the cloud and the role of big data analytics in helping companies achieve stronger insights and leverage security. And learn how to buy a DG tool.
Posted: 30 Sep 2016 | Published: 28 Sep 2016

Globanet Veritas

Information Security Asean July 2016
sponsored by TechTarget Security
EZINE: In April, the Philippines suffered its worst-ever government data breach, when personal information, including fingerprint data and passport information, belonging to around 70 million people, were compromised.
Posted: 05 Jul 2016 | Published: 04 Jul 2016

TechTarget Security

Information Security ANZ July 2016
sponsored by TechTarget Security
EZINE: Australia's $230m security strategy serves as a wake-up call to enterprises about the need to take the issue much more seriously.
Posted: 05 Jul 2016 | Published: 04 Jul 2016

TechTarget Security