IT Management  >   Systems Operations  >   Security  >  

Day Zero Threats

RSS Feed   
Day Zero Threats Reports
 
The State of Detection Report 2019
sponsored by Fidelis
ANALYST REPORT: Cybersecurity hasn't gotten any easier. That should hardly be a revelation to security professionals in the field, who every year are seeing their cyber terrain grow larger and larger. In The State of Threat Detection Report 2019, explore Fidelis' findings from a survey of 300 cybersecurity professional on key cybersecurity challenges.
Posted: 24 Sep 2019 | Published: 24 Sep 2019

Fidelis

AntiVirus for Mobile vs. Managed Secure Access for Mobile and BYOD
sponsored by PortSys
RESOURCE: Antivirus is a great technology for helping to protect devices. But how does antivirus protection differ from say, managed secure access when it comes to mobile devices? Download and discover the answers in fewer than four minutes with this revealing blog post.
Posted: 11 Oct 2019 | Published: 11 Oct 2019

PortSys

Threat Hunting and Machine Learning
sponsored by Dell SecureWorks
EGUIDE: In this e-guide, Fidelis president and CEO Nick Lantuh explains why more organizations should embrace the threat hunting process as part of their cybersecurity strategy and shares threat hunting best practices. Lantuh also explains why machine learning has become an important component of the threat hunting process. Read on to learn more.
Posted: 25 Sep 2019 | Published: 25 Sep 2019

Dell SecureWorks

The Practical Executive's Guide to Data Loss Prevention
sponsored by Forcepoint
WHITE PAPER: As more and more companies are encouraging their employees to work from anywhere, on any device, data loss prevention (DLP) has evolved from an option to a requirement. Download this whitepaper for insightful guidance on implementing DLP.
Posted: 11 Oct 2019 | Published: 11 Oct 2019

Forcepoint

Securing Cloud-Native Kubernetes Applications
sponsored by Radware
WHITE PAPER: When businesses look to optimize and accelerate application development life cycles and deliver their applications in public clouds, security becomes a greater challenge. In this white paper, learn how to ensure the timely development and deployment of secure applications across hybrid computing environments.
Posted: 23 Oct 2019 | Published: 23 Oct 2019

Radware

IT Security is Broken Can Zero Trust Access Fix It?”
sponsored by PortSys
RESOURCE: Which well-known medical collection agency has filed for bankruptcy as a result of a security breach affecting 20 million consumers? Which popular hotel chain faced a $124 million fine for violating GDPR? Find out the top security challenges (and the painful costs) that are affecting so many companies today.
Posted: 11 Oct 2019 | Published: 11 Oct 2019

PortSys

Breaking the Resource Vortex: A Case for Rapid Threat Detection and Response
sponsored by CenturyLink
RESOURCE: In this blog post, learn about a threat management, detection and response (MDR) platform where a customer can set policies based on threat characteristics and then specify a set of actions to take.
Posted: 30 Sep 2019 | Published: 30 Sep 2019

CenturyLink

Securing Office 365 Against Data Loss and Advanced Threats
sponsored by Datto, Inc.
WEBCAST: Learn how to establish complete and comprehensive Office 365 data protection for your customers by tuning into this webcast. Topics covered include: Office 365 native protection vs. what falls under your jurisdiction, how to painlessly restore lost user data, and more.
Posted: 15 Oct 2019 | Premiered: Oct 15, 2019

Datto, Inc.

Synthetic Identity - A Rapidly Growing Global Issue
sponsored by RSA
WEBCAST: The RSA Conference eFraud Global Forum brings together anti-fraud leaders from across the world for a candid conversation about e-fraud challenges and solutions. In this webinar, hear from experts in the UK and US as they share the greatest e-fraud challenges they face—including synthetic identity—and how they fight back in this ongoing battle.
Posted: 21 Oct 2019 | Premiered: Oct 21, 2019

RSA

NWN Security
sponsored by NWN Corporation
DATA SHEET: In this solution brief, learn how NWN Security can help you combat the architectural and operational challenges of implementing and maintaining a secure environment.
Posted: 09 Oct 2019 | Published: 09 Oct 2019

NWN Corporation
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement