IT Management  >   Systems Operations  >   Security  >  

Day Zero Threats

RSS Feed   
Day Zero Threats Reports
 
Securing the Critical Industrial Infrastructure
sponsored by Splunk Services UK Ltd
WHITE PAPER: Awareness of the impact of a breach in the ICS (Industrial Control Systems) and OT (operational technology) environment has risen considerably. Threats to ICS could have severe impacts on the business and reputation of an organization. In this white paper, learn how cyberattacks are affecting both IT and OT networks, including the risks involved.
Posted: 22 Mar 2019 | Published: 22 Mar 2019

Splunk Services UK Ltd

No Time to Lose: How to Help Ensure Your ICS Infrastructure Complies with the EU's NIS Directive
sponsored by ForeScout
EBOOK: This e-book explains the NIS Directive and its implications for essential service providers that depend on ICS networks to operate effectively. It also defines how essential service providers should assess solutions designed to support NIS compliance.
Posted: 21 Mar 2019 | Published: 21 Mar 2019

ForeScout

The Modality of Mortality in Domain Names
sponsored by Farsight Security
RESEARCH CONTENT: In this study, Farsight Security monitored an ongoing data feed of newly observed domains (NODs) to generate a cohort data set, and periodically probed those names to determine what happens to them. Learn more about NODs to help your organization create a more secure DNS policy and improve its security posture.
Posted: 15 Mar 2019 | Published: 31 Oct 2018

Farsight Security

The Power of Trust between Businesses and Consumers
sponsored by Micro Focus
WHITE PAPER: From logging in to logging out and everything in between, modern authentication enables a positive customer interaction with your digital systems. In this white paper, learn how you can leverage today's technologies, such as multifactor authentication, to strike a balance between security, convenience, and long-term opportunities.
Posted: 04 Mar 2019 | Published: 31 Jul 2018

Micro Focus

Protect Against a Perfect Storm of Cyber Threats
sponsored by Symantec
RESEARCH CONTENT: Fresh digital security threats are continually emerging from new and unexpected sources. Cyber criminals adapt to your defenses by designing new malware variants to evade network and endpoint security. In this report, discover the enormous number of malware variants that Symantec detects daily.
Posted: 01 Mar 2019 | Published: 01 Mar 2019

Symantec

DreamWorks Animation Applies HP Inc.'s Expertise and Experience to Reinforce Print and Document Security
sponsored by HP
CASE STUDY: In this case study, learn how a large film production studio, DreamWorks Animation, partnered with HP Inc. to address its print security needs. The case study also provides recommendations for addressing your organization's printer security needs.
Posted: 13 Mar 2019 | Published: 31 Mar 2018

HP

Why Corelight Is Your Best Next Move in Enterprise Security
sponsored by Corelight
WHITE PAPER: The most sophisticated enterprises continue to be breached, attacked, and compromised. Most large organizations have deployed endpoint security solutions, but often times are still not enough. As a result, many companies are adding network-wide visibility for protection. In this white paper, learn about the benefits of Corelight Sensors.
Posted: 27 Feb 2019 | Published: 27 Feb 2019

Corelight

How Artificial Intelligence, Machine Learning and Internet of Things is Creating a New Generation of Incident Response Strategies
sponsored by Vitria Technology, Inc.
RESOURCE: Organizations are shifting the focus of incident response lifecycle management to place greater emphasis on monitoring and improving the customer experience. In this Q&A, Chris Menier, Vice President of Vitra, offers insight into the strategic investments and the industry requirements for next-generation incident response strategies.
Posted: 21 Feb 2019 | Published: 21 Feb 2019

Vitria Technology, Inc.

Crowdstrike Falcon Complete:How To Achieve Instant Cybersecurity Maturity For Organizations Of All Sizes
sponsored by CrowdStrike
WHITE PAPER: The shortage of cybersecurity resources and expertise can lead organizations to struggle with implementing the security technology they acquire. In this white paper, learn how CrowdStrike Falcon Complete can solve these challenges by combining Falcon endpoint protection platform with a dedicated team of security professionals.
Posted: 06 Mar 2019 | Published: 06 Mar 2019

CrowdStrike

Revitalizing Privacy and Trust in a Data-Driven World
sponsored by Micro Focus & PwC
RESEARCH CONTENT: Many organizations worldwide are not doing all they can to protect privacy. Privacy risk management needs reinvigoration and stronger integration with cybersecurity.This report draws on key findings from the 2018 Global State of Information Security Survey to offer 9 tips on revitalizing privacy and trust in a data-driven world.
Posted: 11 Mar 2019 | Published: 11 Mar 2019

Micro Focus & PwC
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement