IT Management  >   Systems Operations  >   Security  >  

Day Zero Threats

RSS Feed   
Day Zero Threats Reports
 
The Essential Guide to Machine Data
sponsored by Splunk
EBOOK: The challenge in leveraging big data comes in the form of a dizzying array of unpredictable formats. Traditional monitoring and analysis tools just weren't designed for this variety, velocity, volume or variability. Download this e-book now for insight into making sense (and profit) from all this new data.
Posted: 22 Jan 2019 | Published: 31 Dec 2017

TOPICS: 
Splunk

2018 Incident Response Insights Report
sponsored by Dell SecureWorks
RESEARCH CONTENT: In Secureworks 2018 Security Leaders Survey, 43% of respondents said that regular threat hunting activities were part of their incident response program. Access this 29-page research report to uncover best practices and valuable lessons learned over the past year from real-world incidents.
Posted: 08 Feb 2019 | Published: 08 Feb 2019

TOPICS: 
Dell SecureWorks

3 Keys to Managing Vendor Risk in Financial Services
sponsored by ServiceNow
WHITE PAPER: With near-daily security breaches, every business should have risk management at the top of its to-do list. Many financial institutions don't recognize the need to look beyond their own systems. The solution to this is a vendor risk management process that allows organizations to prioritize each vendor based on the risk they pose to the business.
Posted: 12 Feb 2019 | Published: 12 Feb 2019

TOPICS: 
ServiceNow

Cloud Based Asset Management
sponsored by Axonius
RESOURCE: When companies move to cloud instances like Amazon ECS/EKS/EC2, and Microsoft Azure, they are often faced with a compromise. They realize the reliability, flexibility, and cost savings of the cloud often sacrifice the security and visibility they have invested in for on-premise assets. In this infographic, learn how Axonius can help.
Posted: 13 Feb 2019 | Published: 13 Feb 2019

TOPICS: 
Axonius

The IT Security Confidant Vanishing Perimeter Pickup
sponsored by Symantec
VIDEO: See the benefits of Symantec Web Security Services today.
Posted: 31 Jan 2019 | Premiered: 31 Jan 2019

TOPICS: 
Symantec

How to Reach Cybersecurity Maturity in 5 Critical Steps
sponsored by Dell SecureWorks
WHITE PAPER: Security is often stuck in a defensive and preventive state that leaves organizations unable to detect and respond appropriately to cyberattacks and incidents. In this white paper, find out how you can adjust your organizations security maturity level with just 5 key steps and change the state of your security.
Posted: 07 Feb 2019 | Published: 07 Feb 2019

TOPICS: 
Dell SecureWorks

There Are Two Types Of Companies Today: Those that Have Had Security Breaches, And Those That Don't Know they Have.
sponsored by Lenovo & Microsoft
RESOURCE: The number of cyberattacks is rising every day and criminals are constantly developing more sophisticated and creative ways to expose vulnerabilities. Every device is at risk, and companies must rely on technology providers to "out-innovate" the bad guys. In this infographic and Q&A, explore Lenovo's end-to-end security offerings.
Posted: 07 Feb 2019 | Published: 07 Feb 2019

TOPICS: 
Lenovo & Microsoft

Market Guide for Data Masking
sponsored by Micro Focus
WHITE PAPER: Security and risk management leaders should use data masking to desensitize or protect sensitive data. Privacy regulations, such as the GDPR, in particular, continue to drive strong interest in this technology market. In this white paper, discover key findings from Gartner's research and review recommendations for all organizations.
Posted: 06 Feb 2019 | Published: 20 Jul 2018

TOPICS: 
Micro Focus

Endpoint Sensor: Understand the source, impact, and spread of advanced threats with endpoint detection and response (EDR)
sponsored by Trend Micro, Inc.
RESOURCE: Malware can manifest itself in your enterprise networks, bypassing traditional security technology. Fortunately, Trend Micro's Endpoint Sensor gives insight to detections by allowing threat investigators to explore detections and hunt for new threats. In this resource, learn more key features of Endpoint Sensor.
Posted: 06 Feb 2019 | Published: 06 Feb 2019

TOPICS: 
Trend Micro, Inc.

PandaLabs Annual Report 2018
sponsored by Panda Security
RESEARCH CONTENT: As technology continues to advance, cybercriminals are leveraging new capabilities into more sophisticated cyberattacks. PandaLabs, Panda Security's anti-malware laboratory, tracks threat data in real time and has compiled it into a report. Download the report for highlights of 2018's cybersecurity trends, as well as emerging threats for 2019.
Posted: 29 Jan 2019 | Published: 30 Nov 2018

TOPICS: 
Panda Security
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement