IT Management  >   Systems Operations  >   Security  >  

Information Security Threats

RSS Feed   
Information Security Threats Reports
 
Protecting APIs and Securing Applications So Business Can Thrive
sponsored by Radware
RESEARCH CONTENT: Nearly every organization relies on applications to connect with customers, business partners, suppliers and staff. As a result, the application and API threat landscape has evolved dramatically. Read this research report for a closer look at the state of application and API security, including top threats, best practices and more.
Posted: 26 Jan 2021 | Published: 26 Jan 2021

Radware

Application Security Stats Flash
sponsored by WhiteHat Security
ANALYST REPORT: API-based applications are more at risk than ever before. As such, there is a critical need for a frequent and periodic analysis of the state of application security. Use this report, AppSec Stats Flash by WhiteHat security, to explore biggest windows of exposure by industry, the most prominent security vulnerabilities and average time-to-fix.
Posted: 26 Jan 2021 | Published: 26 Jan 2021

WhiteHat Security

How do you solve a problem like security training?
sponsored by ComputerWeekly.com
EGUIDE: In this E-Guide, we will the tricky topic of security awareness training. Firstly, we try to answer the burning question of how to get employees to pay attention to training and take it seriously. Then, we take a look at some security awareness best practices that you can use to craft training your users will actually benefit from.
Posted: 17 May 2021 | Published: 17 May 2021

ComputerWeekly.com

Data Management: Assess, Don’t Guess.
sponsored by 1Touch.io
RESOURCE: Disparate endpoints make data management a challenge. Edge computing has not yet seen widespread adoption, so discovering, mapping and tracking your sensitive data in real-time (all while maintaining regulatory compliance) sounds real impossible. Jump into this resource to see how 1touch.io strives to give you the clearest view of your data.
Posted: 01 Mar 2021 | Published: 01 Mar 2021

1Touch.io

How Continuous, Automated Red-Teaming Can Elevate Your Security Posture
sponsored by Randori
WHITE PAPER: Security teams are recognizing that a continuously evolving IT ecosystem demands a shift in tactics. Continuous, automated red team testing can help enterprises adopt a risk-based and adversary-focused security approach to ensure that they are prepared to defend against evolving threats. Dive into this S&P Global brief to get the specifics.
Posted: 16 Feb 2021 | Published: 16 Feb 2021

Randori

Opinion Matters: UK Public Sector attitudes on communication security after the onset of COVID-19
sponsored by Zivver
RESEARCH CONTENT: The following report highlights the results from recent study into communication security trends and concerns across the UK public sector. Read through these in-depth results to see how your organization’s communication security concerns compare.
Posted: 29 Jan 2021 | Published: 29 Jan 2021

Zivver

Sase & Ztna
sponsored by VMware
EBOOK: Already, SASE is playing a big role in conversations about how to improve remote security and increase network efficiency. Now, zero-trust network access (ZTNA) can provide a user’s contextual identity to all the different SASE security services, making for a smarter, more secure edge. Download SASE & ZTNA For Dummies to learn more.
Posted: 25 Feb 2021 | Published: 25 Feb 2021

VMware

2021 Cyber Threat Intelligence Survey
sponsored by DomainTools
ANALYST REPORT: Are you or other members of your organization looking to gain a greater understanding of bad actors and their efforts? Investigate the 2021 SANS Cyber Threat Intelligence Survey, which examines the capabilities, opportunities and intent of adversaries conducting cyber operations.
Posted: 27 Jan 2021 | Published: 27 Jan 2021

DomainTools

API Security & the OWASP API Top 10 (BOLA/IDOR) - 1 of 4
sponsored by Traceable
WEBCAST: Bad actors have moved beyond attacking just applications – they’re attacking APIs, too. But what makes APIs prime targets? How has app security changed? Why is there a need for a new OWASP project for APIs? Access this webcast to answer these questions and to cover Broken Object Level Authentication (BOLA), the most critical API vulnerability.
Posted: 17 Feb 2021 | Premiered: May 20, 2020

Traceable

Advanced cybersecurity fraud and how to fight it
sponsored by SearchSecurity.com
EBOOK: Fraud is as ancient as time, but cybersecurity fraud is hitting heights of sophistication the ancient Greeks never imagined. Learn the latest cyberfraud scams and how to thwart them with a combination of processes, tools and education.
Posted: 02 Mar 2021 | Published: 02 Mar 2021

SearchSecurity.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences