IT Management  >   Systems Operations  >   Security  >  

Day Zero Threats

RSS Feed   
Day Zero Threats Reports
 
Successfully Operating A Security Operations Center
sponsored by Armor
WHITE PAPER: Organizations are realizing that the only way to protect their networks and data around the clock is with a Security Operations Center (SOC) that operates 24/7/365. Read this resource to learn about the costs, staff roles, and technology needed to operate a successful SOC.
Posted: 19 Nov 2018 | Published: 19 Nov 2018

Armor

How Security Solutions Enable Cloud Success
sponsored by Forcepoint
RESOURCE: Unsurprisingly, security concerns still rank as the number one reason for not using cloud services, according to IDC. To learn more, download this e-book for 5 key security considerations and best practices for safe cloud adoption.
Posted: 26 Oct 2018 | Published: 26 Oct 2018

Forcepoint

Closing the Cybersecurity Gap
sponsored by Splunk
RESEARCH CONTENT: Discover 3 steps to help you move towards a more intelligence-driven cybersecurity strategy that takes full advantage of your available resources and skills.
Posted: 21 Nov 2018 | Published: 21 Nov 2018

Splunk

Your Organization is Moving to Office 365. Now What?
sponsored by Symantec
RESOURCE: Download this security checklist to guide you through the multiple dimensions of your Office 365 migration.
Posted: 13 Nov 2018 | Published: 13 Nov 2018

Symantec

Building Daily Habits to Stay Ahead of Security Fires
sponsored by ThreatConnect
RESOURCE: Learn how to efficiently track your vulnerabilities and manage security incidents inside your organization.
Posted: 16 Oct 2018 | Published: 14 Jun 2018

ThreatConnect

DNS Security for Financial Services
sponsored by Nominet
WHITE PAPER: Nearly 92% of malware uses DNS to gain command and control, exfiltrate data or redirect traffic, according to a CISCO report. So, protection at the DNS layer is crucial. Read this white paper to find out how to detect and stop DNS threats.
Posted: 12 Nov 2018 | Published: 12 Nov 2018


Understanding Security Processes and the Need to Automate
sponsored by Skybox Security
RESEARCH CONTENT: Most organizations have room to grow in their understanding of key security and security automation processes. In this report, explore the results of an in-depth Osterman Research survey focused on understanding current security processes and how organizations are working to improve and automate them.
Posted: 13 Nov 2018 | Published: 13 Nov 2018

Skybox Security

Protect your Online Business from Credential Stuffing
sponsored by Akamai Technologies
WHITE PAPER: Explore what credential stuffing is and how it works. Understand this potential threat to your business. Find out how advanced bot management can help you stay ahead of credential stuffing so that you can protect your organization and its critical assets.
Posted: 15 Oct 2018 | Published: 31 Mar 2018

Akamai Technologies

Best Practices for Applying Threat Intelligence
sponsored by Recorded Future
WHITE PAPER: In this white paper, learn how threat data can be processed into information and (ultimately) intelligence. Plus, explore the 4 key areas your threat intelligence implementation must deliver.
Posted: 15 Nov 2018 | Published: 15 Nov 2018

Recorded Future

Unlock Opportunity with a New Security Approach
sponsored by Citrix
RESOURCE: Enable new ways of working with a new security framework that secures your apps and data across clouds, devices, and networks.
Posted: 24 Oct 2018 | Published: 24 Oct 2018

Citrix
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement