IT Management  >   Systems Operations  >   Security  >  

Day Zero Threats

RSS Feed   
Day Zero Threats Reports
 
Winnti: More than just Windows and Gates
sponsored by Chronicle
WHITE PAPER: Winnti malware has been around since 2013 and has been the source of several significant data breaches. Chronical researchers recently conduct a technical analysis to unravel several campaigns where Winnti malware was leveraged. Download this report to uncover the results of their study.
Posted: 07 Feb 2020 | Published: 07 Feb 2020

Chronicle

Euromonitor
sponsored by Absolute Software Corporation
CASE STUDY: In this case study, discover how Euromonitor, a business intelligence and strategic analysis provider, partnered with Absolute to shift their security focus towards their proprietary market research and automate endpoint visibility to track (and potentially wipe) at-risk devices.
Posted: 18 Feb 2020 | Published: 09 May 2019

Absolute Software Corporation

Continuous Risk Monitoring for Vulnerabilities
sponsored by ServiceNow
PRODUCT DEMO: In this demo, take a closer look at ServiceNow’s continuous risk monitoring platform and discover how it can help your organization meet its GRC standards by identifying the risks of unpatched vulnerabilities and resolving them quickly. Continue to watch the complete presentation.
Posted: 05 Feb 2020 | Premiered: 04 Dec 2019

ServiceNow

Webinar: Proactively Protect Users with Email Incident Response
sponsored by PhishLabs
WEBCAST: Phishing attacks are growing in their frequency, and the damage caused by these campaigns is increasingly costly. It’s more critical than ever for security leaders to reconsider how they approach phishing detection. In this webinar, discover the key characteristics of an effective program and view a demo of PhishLabs’ Email Incident Response.
Posted: 18 Feb 2020 | Premiered: Feb 18, 2020

PhishLabs

The Root Of (Almost) All Security Issues
sponsored by Tala Security
WHITE PAPER: In order to establish adequate data protection, security teams need to ensure they address both technical (code and data) & non-technical (user behavior) risks. In this white paper, Sanjay Sawhney, VP of Engineering at Tala, highlights how these issues lead to significant disruptions and offers best practices for addressing them.
Posted: 17 Feb 2020 | Published: 17 Feb 2020

Tala Security

Bovis Homes
sponsored by Absolute Software Corporation
CASE STUDY: In this case study, follow the journey of Bovis Homes, a residential development company in the UK, as they partner with Absolute Software to establish visibility and control over their disparate mobile endpoints to ensure security and meet GDPR compliance.
Posted: 10 Feb 2020 | Published: 25 Jun 2019

Absolute Software Corporation

SLED - 3 Easy Ways to Secure Your K-12 School District
sponsored by Cisco Umbrella
RESOURCE: Deployed in 3 simple steps, Cisco Umbrella secures your entire school district in minutes. Easily protect students and staff against phishing attacks, filter content, and gain visibility into all activity, on or off-campus. Download this infographic to learn more.
Posted: 14 Feb 2020 | Published: 14 Feb 2020

Cisco Umbrella

Armorblox shields enterprises from email-based social engineering attempts
sponsored by Armorblox
PRODUCT OVERVIEW: Email-based social engineering attacks remain a top threat to organizations. These attacks target users as their entry point for a breach, which traditional methods struggle to detect. In this white paper, take a closer look into Armorblox’s approach to email-based security by highlighting its key capabilities, use cases, and a SWOT analysis.
Posted: 21 Feb 2020 | Published: 13 May 2019

Armorblox

Open and Dark Web Research: Tips and Techniques
sponsored by Authentic8, Inc.
WHITE PAPER: In this white paper, get an insider look into the Silo Researcher Toolbox, which provides investigators with the necessary capabilities to conduct secure research on the open and dark web without risking the exposure of your resources or your identity. Read on to learn more.
Posted: 18 Feb 2020 | Published: 29 Oct 2019

Authentic8, Inc.

Emergency Communications of Southern Oregon
sponsored by Absolute Software Corporation
CASE STUDY: In this case study, discover how Emergency Communications of Southern Oregon (ECSO), an emergency dispatch facility, was able to save lives through their partnership with Absolute by ensuring endpoint visibility and security to increase efficiency and meet CJIS compliance.
Posted: 21 Feb 2020 | Published: 26 Apr 2019

Absolute Software Corporation
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info