IT Management  >   Systems Operations  >   Security  >  

Day Zero Threats

RSS Feed   
Day Zero Threats Reports
 
IAM Leaders’ Guide to Privileged Access Management
sponsored by Centrify Corporation
RESOURCE: While traditional identity and access management (IAM) tools offer control of standard user access, they fail to manage shared use of privileged accounts or administrator privilege elevation. This Gartner report provides a comprehensive analysis of privileged access management, designed to be the next step in IAM.
Posted: 20 May 2020 | Published: 22 Jul 2019

Centrify Corporation

OWASP Top 10: The Most Critical Risks Facing Web Applications
sponsored by F5 Networks
WEBCAST: Today’s organization uses an average of 983 different applications. As such, ensuring the protection of these web applications is critical for avoiding disruptive breaches and maintaining operational efficiency. In this webinar, explore the top 10 most critical risks facing today’s web applications and the steps you can take to mitigate them.
Posted: 28 May 2020 | Premiered: May 28, 2020

F5 Networks

Ensuring Remote Workers Remain Protected
sponsored by HP Inc
WHITE PAPER: As our world is increasingly changed by the ongoing pandemic, IT departments have seen an ever-increasing amount of cyber attacks and other digital threats. Avoiding these attacks requires a careful combination of the right hardware and the appropriate best practices. Read on to learn some of these techniques from HP.
Posted: 27 May 2020 | Published: 27 May 2020

HP Inc

The Synack Value
sponsored by Synack
DATA SHEET: As business environments become more complex, traditional penetration testing becomes unable to protect against today’s threats. To address this issue, Synack developed a ‘smart’ penetration testing platform, which combines crowdsourced human talent with AI. Download this data sheet to learn more and see how it compares to traditional pen testing.
Posted: 22 May 2020 | Published: 22 May 2020

Synack

7 Web Application Security Best Practices
sponsored by Acunetix
RESOURCE: Protecting your sensitive data and critical web applications requires more than just buying security products; it requires a carefully thought-out, cohesive security strategy. The following article highlights 7 key elements that should be considered essential for an effective web application security strategy.
Posted: 01 Jun 2020 | Published: 14 Nov 2019

Acunetix

Essential Elements of a Penetration Test
sponsored by Synack
WHITE PAPER: A recent study from the White House indicated that cyberattacks cost the economy between $57 and $109 billion. In order to avoid the financial, legal and reputational damage of an attack, organizations are looking to penetration tests. In this white paper, discover why penetration tests are so critical and the emergence of crowdsource testing.
Posted: 27 May 2020 | Published: 27 May 2020

Synack

Introduction to Cloud Security Blueprint 2.0
sponsored by Checkpoint Software Technologies
WHITE PAPER: According to a Gartner study, cloud security remains a top concern for users, and the shared environment of public cloud invites a unique set of vulnerabilities. This white paper defines key cloud security concepts and explores architectural principles in order to help you get started with protecting your cloud environment. Read on to get started.
Posted: 14 May 2020 | Published: 14 May 2020

Checkpoint Software Technologies

Okta ASA Netskope Private Access demo
sponsored by Okta + Netspoke
VIDEO: In this video demo, join a Solutions Architect at Okta as they provide a quick walkthrough of how Okta Advanced Server Access & Netskope Private Access can work together to enhance user experience.
Posted: 18 May 2020 | Premiered: 12 Mar 2020

Okta + Netspoke

Absolute for K-12 Education
sponsored by Absolute Software Corporation
DATA SHEET: While school districts around the world are teaching and working remotely, cybercriminals are doing the same. Learn how Absolute Software enables K-12 IT leaders to remotely monitor and manage their entire fleet, ensuring the effectiveness and safety of remote learning programs.
Posted: 21 May 2020 | Published: 21 May 2020

Absolute Software Corporation

7 Ways to Take Cybersecurity to New Levels
sponsored by Cisco Umbrella
WHITE PAPER: Contrary to popular belief, more security tools don’t always mean better security. As business environments grow more complex, it’s critical for security to have a holistic, unified approach. Read this white paper to discover 7 ways organizations can enhance their security stack with cloud security, without sacrificing customization and control.
Posted: 21 May 2020 | Published: 21 May 2020

Cisco Umbrella
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info