Business of Information Technology  >   Business Management  >   Financial Management  >   Budgeting  >   IT Spending  >  

Information Security Spending

RSS Feed   
Information Security Spending Reports
 
Virtual Cloud Security Summit: Securing Your Network from the Cloud
sponsored by Cisco Umbrella
VIDEO: With organizations continuing to embrace cloud migration, a shift in security is also necessary to maintain the protection of cloud-native workloads. In this video, discover how Cisco Umbrella unifies security capabilities for cloud users to ensure safe adoption and access. Watch now to get started.
Posted: 04 May 2020 | Premiered: 02 Apr 2020

Cisco Umbrella

Getting More from Less
sponsored by VMware International Unlimited Company
WHITE PAPER: In order to address the growing volume of cyberattacks, organizations are adding new tools and systems to their stack. However, each addition also increases the intricacy of the environment, making management a complex process. Read on to learn why organizations are embracing a simplified cloud-delivered endpoint security approach.
Posted: 01 May 2020 | Published: 01 May 2020

VMware International Unlimited Company

Use Your Microsoft Certificate Authority for Passwordless Authentication
sponsored by Entrust, Inc.
PRODUCT OVERVIEW: As a result of the growing risks of weak passwords, organizations are looking beyond passwords towards passwordless authentication. In this solution brief, discover the key features of Entrust Datacard’s passwordless authentication offering, designed to ensure a seamless, secure user experience.
Posted: 11 May 2020 | Published: 11 May 2020

Entrust, Inc.

The Economics of Cybersecurity: Preparing for Ransomware
sponsored by BlueVoyant
EBOOK: One of the most recent evolutions of malware is ransomware, and it’s not going anywhere. In fact, it’s grown to the point where businesses need to consider it an inevitability and prepare accordingly. This e-book is designed to help you identify the cybersecurity costs needed for building a proactive defense strategy. Read on to learn more.
Posted: 12 May 2020 | Published: 12 May 2020

BlueVoyant

Protecting Against the 10 Most Critical Web Security Risks
sponsored by Progress Software Corporation Sitefinity
RESEARCH CONTENT: This infographic identifies the top 10 most critical security risks to web applications – as outlined by the Open Web Application Security Project (OWASP) – and explores tactics and advice for defending against each threat. Read on to get started.
Posted: 18 May 2020 | Published: 18 May 2020


Webinar: "I Love Agent-Based Security!" Said No One, Ever.
sponsored by Orca Security
VIDEO: As organizations continue to rely on cloud assets and environments, the efficacy of agent-based security wanes. In this webinar, join a panel of CSOs as they break down their budget and best practices for securing their environments, discuss the hidden risks plaguing your network, and more. Watch now to get started.
Posted: 08 May 2020 | Premiered: 10 Apr 2020

Orca Security

Punycode: Awareness and Protection
sponsored by Cisco Umbrella
VIDEO: The topic of this episode of A Cybersecurity Technical Mini Series: Punycode. But what is Punycode, how does it work & why is it important? To find out, join Chris Riviere, a security expert at Cisco as he further explores this malicious domain tactic.
Posted: 19 May 2020 | Premiered: 16 Dec 2019

Cisco Umbrella

Solving the Challenges of Modern Remote Access
sponsored by Barracuda
WHITE PAPER: The recent pandemic has brought about a dramatic movement towards enabling users to work remotely. Included are the results from a recent study conducted by Gartner to help security and risk management leaders solve the challenges of quickly scaling large scale modern remote access. Read on to discover their key findings.
Posted: 20 May 2020 | Published: 25 Mar 2020

Barracuda

How to Combat Island Hopping
sponsored by VMware International Unlimited Company
WHITE PAPER: Island hopping is a cyberattack strategy in which a hacker targets a smaller organization in order to leverage their affiliation with larger organizations as a point of entry for an attack. This white paper takes a closer look at island hopping tactics and methods for identifying and mitigating them. Read on to learn more.
Posted: 08 May 2020 | Published: 08 May 2020

VMware International Unlimited Company

Application Control and Critical Infrastructure Protection
sponsored by VMware International Unlimited Company
DATA SHEET: Reducing unscheduled downtime of critical systems as a result of a cyberattacks should be at the top of every organization’s security to-do list for this year. VMware Carbon Black wants to help. Read this data sheet to learn about their App Control offering, designed to eliminate unplanned downtime and protect critical systems at scale.
Posted: 18 May 2020 | Published: 27 Jan 2020

VMware International Unlimited Company
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info