IT Management  >   Systems Operations  >   Security  >  

Day Zero Threats

RSS Feed   
Day Zero Threats Reports
 
Making MITRE ATT&CK Actionable
sponsored by ThreatQuotient
WEBCAST: In this webinar, join technical experts at ThreatQuotient as they outline merging MITRE ATT&CK with SIEM visibility and threat intelligence in the ThreatQ platform to unify threat detection efforts. Interested in seeing how this platform works? Watch the webinar to learn more.
Posted: 23 Jan 2020 | Premiered: Jan 23, 2020

ThreatQuotient

Beginners Guide to Open Source Intrusion Detection Tools
sponsored by AT&T Cybersecurity
RESOURCE: Intrusion detection systems (IDS) are a set of technologies that enable IT teams network visibility in order to identify and prevent suspicious activity from becoming a breach. Read this beginner’s guide to explore various IDS detection techniques to help you get started with network visibility and security.
Posted: 06 Jan 2020 | Published: 06 Jan 2020

AT&T Cybersecurity

Next-Generation Data Classification
sponsored by BigID
WHITE PAPER: Traditional approaches to data classification relied on manual entries, which fail to meet the scalability needs of today’s ever-expanding environments. In this white paper, discover BigID’s next-generation data classification approach, which builds on the success of its predecessors with sustainability and privacy at its core.
Posted: 06 Jan 2020 | Published: 06 Jan 2020

BigID

Mobile Phishing 2018: Myths and Facts Facing Every Modern Enterprise Today
sponsored by Lookout Inc.
WHITE PAPER: Mobile devices have opened a profitable new window of opportunity for criminals executing phishing attacks. This white paper explores the common myths and facts around mobile phishing to help your organization identify and remediate threats.
Posted: 09 Jan 2020 | Published: 20 Mar 2018

Lookout Inc.

Security with a Fluid Perimeter
sponsored by Somerville
ANALYST REPORT: While it’s true the perimeter has changed, it has not vanished. Instead, the perimeter has become fluid—changing daily to adapt to the needs of users and modern business, as opposed to the old way of locking down the enterprise. In this white paper, learn how your organization can begin to benefit from this fluid perimeter.
Posted: 17 Jan 2020 | Published: 31 Jan 2019

Somerville

Intelligent Security Starts at the Edge
sponsored by Akamai Technologies
DATA SHEET: In Gartner’s most recent Magic Quadrant installment for Web Application Firewalls (WAF), they named Akamai a Leader for the third year in a row. This white paper provides an overview of the benefits of WAF, and highlights Akamai’s approach to WAF. Read on to get started.
Posted: 23 Dec 2019 | Published: 23 Dec 2019

Akamai Technologies

6 Practical Approaches to Bridge the Cybersecurity Talent Shortage
sponsored by Alert Logic
WHITE PAPER: Many organizations are adopting new and emerging technologies faster than they can address related security issues. The situation is further exacerbated by the industry’s skills and resources gap. In this white paper, discover 6 practical approaches to bridge the cybersecurity skills and resource gap in your organization.
Posted: 17 Jan 2020 | Published: 17 Jan 2020

Alert Logic

Javascript vs Javascript: Performance Penalty of Api Hooking
sponsored by Tala Security
WHITE PAPER: While it’s intuitive that defending your code is an important practice, there are times when that defense comes at a high cost.In this white paper, get an overview of the performance penalties associated with hooking browser JavaScript APIs to defend against JavaScript based threats.
Posted: 14 Jan 2020 | Published: 14 Jan 2020

Tala Security

Beginner’s Guide to AWS Security Monitoring
sponsored by AT&T Cybersecurity
WHITE PAPER: In the Beginner’s Guide to AWS Security Monitoring, learn what the 3 biggest security concerns are and how you can get started with AWS security best practices.
Posted: 03 Jan 2020 | Published: 03 Jan 2020

AT&T Cybersecurity

Building supply company boosts endpoint security with Malwarebytes
sponsored by Malwarebytes
CASE STUDY: In this case study, a large US building supply company implemented Malwarebytes’ Endpoint Protection and Response services to establish endpoint resiliency and reduce their remediation time from several days down to minutes or hours.
Posted: 21 Jan 2020 | Published: 21 Jan 2020

Malwarebytes
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info