IT Management  >   Systems Operations  >   Security  >  

Day Zero Threats

RSS Feed   
Day Zero Threats Reports
 
Reactive Security Leaves You In The Dark
sponsored by Gigamon
WHITE PAPER: Download this white paper for ways to transform your security efforts advancing from a tactical approach of reacting to threats to a strategic approach that increases the efficiency and effectiveness of your cybersecurity defense.
Posted: 27 Aug 2019 | Published: 27 Aug 2019

Gigamon

Ransom(Every)Ware
sponsored by Neustar
WHITE PAPER: In what would become a troubling theme, WannaCry, and subsequent strains of ransomware, could have been prevented from becoming a public nuisance had proper maintenance and diligence been employed. In this white paper, learn how to prevent a ransomware attack at your organization.
Posted: 22 Aug 2019 | Published: 22 May 2019

Neustar

Beyond The Phish: 2019 Report
sponsored by Proofpoint
ANALYST REPORT: In Proofpoint's 2019 Beyond the Phish report, explore user knowledge of a broad range of best practices for cyberhygiene, security and compliance. The report analyses millions of responses gathered from their Security Education Platform.
Posted: 27 Aug 2019 | Published: 27 Aug 2019

Proofpoint

The Cybersecurity Effectiveness Podcast: MacKenzie Brown
sponsored by Verodin
PODCAST: In this podcast, listen as Microsoft Detection and Response Team (DART) consultant MacKenzie Brown describes how her love of theatre led her to her current work with incident response (IR) and becoming co-founder of the Ms. Greyhat Organization.
Posted: 09 Sep 2019 | Premiered: Sep 9, 2019

Verodin

Proofpoint Information Protection Research Team
sponsored by Proofpoint
RESOURCE: Check out this blog to learn why your organization could benefit from a layered, intelligent security measure, such as user education to combat evolving threats that are increasingly successful in compromising user cloud accounts.
Posted: 22 Aug 2019 | Published: 22 Aug 2019

Proofpoint

Oklahoma Municipal Power Authority Energizes Team's Secure Remote Access with TAC
sponsored by PortSys
CASE STUDY: Technology inventions are being integrated across the energy sector with legacy hardware and software systems. However, the patches on these legacy systems can't keep up with today's threats. In this case study, learn how these challenges led to Oklahoma Municipal Power Authority deploying Total Access Control to help provide secure remote access.
Posted: 12 Sep 2019 | Published: 12 Sep 2019

PortSys

Cybersecurity Effectiveness Podcast: IJay Palansky
sponsored by Verodin
PODCAST: While appealing new gadgets and innovative products continue to hit the market, legal firms caution organizations about the risks of IoT devices. In this podcast, technology-focused trial litigator IJay Palansky forecasts the impending boom of cyber litigation in the coming years and provides recommendations for avoiding an attack.
Posted: 28 Aug 2019 | Premiered: Aug 28, 2019

Verodin

How a Leading Professional Services Firm Enhanced Collaboration with Cloud Security
sponsored by Cisco Umbrella
CASE STUDY: Global professional services firm, Arup, moved from Cisco Cloud Web Security to Cisco Umbrella. By implementing a secure internet gateway in conjunction with next-gen endpoint security, Arup secured access to the internet wherever users go and reduced its exposure to malware. Download this case study to learn more.
Posted: 11 Sep 2019 | Published: 11 Sep 2019

Cisco Umbrella

2019 Financial Consumer Cybersecurity Threat Index
sponsored by Morphisec, Inc.
ANALYST REPORT: As Morphisec continues to assist financial providers with improving defenses and protecting consumer financial data and funds, they decided to examine how the increasing amount of financial cyberattacks are impacting the mindset of consumers. Download Morphisec's 2019 U.S. Consumer Financial Cybersecurity Threat Index to see what they found.
Posted: 10 Sep 2019 | Published: 10 Sep 2019

Morphisec, Inc.

Succeeding at the Intersection of Security and Privacy
sponsored by Virtru
WHITE PAPER: This white paper covers the intersection of the security and privacy industries, incorporating how privacy laws, cybersecurity challenges and increased attention have affected the crossover of these spaces. Read on to learn more.
Posted: 03 Sep 2019 | Published: 03 Sep 2019

Virtru
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement