IT Management  >   Systems Operations  >   Security  >  

Day Zero Threats

RSS Feed   
Day Zero Threats Reports
CloudSOC and Email for Microsoft Office 365
sponsored by Symantec
RESOURCE: With email as the #1 attack vector, learn how you can keep your Office 365 safe from end-to-end and how you can protect confidential data, today.
Posted: 13 Nov 2018 | Published: 13 Nov 2018


Identity Architect Ground Rules: Ten IAM Design Principles
sponsored by WSO2, Inc.
WHITE PAPER: Download this white paper for 10 design principles an IAM architect should consider when building an IAM infrastructure from the ground-up.
Posted: 08 Nov 2018 | Published: 31 Dec 2017

WSO2, Inc.

Definitive Guide to Software-Defined Perimeter Security
sponsored by Cyxtera
WHITE PAPER: Find out how to take an identity-centric approach to the software-defined network perimeter and explore two use cases for how this approach can help secure AWS resources and dramatically reduce the attack surface.
Posted: 03 Dec 2018 | Published: 31 Dec 2017


Containers at Risk: A Review of 21,000 Cloud Environments
sponsored by Lacework
WHITE PAPER: This report describes the risks and threats that can be created by deploying workload in the public cloud without proper security. Read on to learn about platforms discovered such as Kubernetes, Docker Swarm, Redhat Openshift, and more.
Posted: 18 Oct 2018 | Published: 18 Oct 2018


Insider Threat to Financial Services
sponsored by Recorded Future
WHITE PAPER: Research from leading analysts at Forrester revealed that insiders accounted for 39% of data breaches through accidental and malicious misuse of data. In this white paper, explore current security technologies that are aimed at preventing and detecting insider threats, and learn about the 3 categories to understand the risks they pose.
Posted: 13 Nov 2018 | Published: 13 Nov 2018

Recorded Future

Increase Visibility into SSL Encryption to Boost Security
sponsored by F5 Networks
WHITE PAPER: Regaining visibility into encrypted traffic is one of the most important steps you can take to protect your apps, your data, and your business. Find out how SSL/TLS orchestration can help you get that visibility and deliver high-performance decryption and encryption of outbound TLS traffic—without slowing your traffic down.
Posted: 30 Nov 2018 | Published: 30 Nov 2018

F5 Networks

Critical Watch Report: The State of Threat Detection 2018
sponsored by Alert Logic
RESEARCH CONTENT: High-profile data breaches continue to make headlines, but the real news is the dramatic increase in volume and the intensity of cyberattacks it now affecting organizations of all sizes and types. Learn how your organization can keep up with the fast-moving threat landscape with 5 key security insights.
Posted: 29 Nov 2018 | Published: 29 Nov 2018

Alert Logic

The DevOps Roadmap for Security
sponsored by Signal Sciences
WHITE PAPER: Download this e-book to learn how to extend the benefits of DevOps to security and how to embrace and implement modern DevSecOps principles, practices, and tooling.
Posted: 15 Oct 2018 | Published: 15 Oct 2018

Signal Sciences

Your Organization is Moving to Office 365. Now What?
sponsored by Symantec
RESOURCE: Download this security checklist to guide you through the multiple dimensions of your Office 365 migration.
Posted: 13 Nov 2018 | Published: 13 Nov 2018


How Security Solutions Enable Cloud Success
sponsored by Forcepoint
RESOURCE: Unsurprisingly, security concerns still rank as the number one reason for not using cloud services, according to IDC. To learn more, download this e-book for 5 key security considerations and best practices for safe cloud adoption.
Posted: 26 Oct 2018 | Published: 26 Oct 2018


About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement