IT Management  >   Systems Operations  >   Security  >  

Information Security Threats

RSS Feed   
Information Security Threats Reports
 
Extreme AI Security
sponsored by Extreme Networks
PRODUCT OVERVIEW: In this brief, learn how ExtremeAI Security can help to defend against cyberattacks by delivering an innovative, AI-powered solution for IoT device security coupled with automated threat remediation and containment.
Posted: 26 Nov 2019 | Published: 26 Nov 2019

Extreme Networks

Are Bots Killing Your Business Intelligence?
sponsored by F5 Networks
WHITE PAPER: While it’s known that bots can disrupt websites, enable fraud, and steal data, bots can also impact the business intelligence you rely on to make strategic decisions by skewing audience metrics. With the right tools, you can filter out unwanted traffic and improve the quality of your data. Read on to get started.
Posted: 05 Dec 2019 | Published: 05 Dec 2019

F5 Networks

Supporting Cybersecurity & Privacy Standards with ITAM
sponsored by Snow Software
WHITE PAPER: Cybersecurity is now a priority across the entire business, from the board-level down as companies increasingly rely on operating models that require data sharing. With company reputations hanging in the balance, it’s essential that organizations align their policies around data handling and cybersecurity. Read on to learn more.
Posted: 29 Oct 2019 | Published: 29 Oct 2019

Snow Software

How to Avoid Epic Fails in Data Security Battlecard
sponsored by IBM
RESOURCE: Get a quick overview of the five most common data security failures that, if left unchecked, could lead to unforced errors and contribute to the next major data breach.
Posted: 24 Oct 2019 | Published: 24 Oct 2019

IBM

Risk Management: 3 Security Changes to Consider for Cloud Adoption
sponsored by ServiceNow
EGUIDE: According to Nemertes Research, this is the year most workloads will be in the cloud versus in on-premises data centers. While the benefits of cloud services can’t be overlooked, these changes also present a security risk. In this e-guide, uncover the 3 changes IT professionals should consider in order to manage third-party risk.
Posted: 20 Nov 2019 | Published: 15 Nov 2019

ServiceNow

DevSecOps and the Problem of Machine-Scale Data
sponsored by Ionic Security
RESOURCE: The amount of data being created daily is growing exponentially, and manual processes can’t scale. With data growth comes increasing complexity and higher importance for security to be integrated into the SDLC. Discover the opportunities and threats of machine-scale data, how to maintain agility, and the implications this has for DevSecOps.
Posted: 01 Nov 2019 | Published: 08 Oct 2019

Ionic Security

Whirlpool Corporation Takes Tanium Out for a Spin
sponsored by Tanium
CASE STUDY: In this case study, discover how Whirlpool leveraged the Tanium platform to discover and act on IT challenges in order to improve their ‘security hygiene’ within their complex environment. Read on to learn more.
Posted: 18 Nov 2019 | Published: 18 Nov 2019

Tanium

Lookout discovers Monokle, new mobile surveillanceware
sponsored by Lookout
WEBCAST: In July of 2019, Lookout’s Security Research team announced its discovery of Monokle, a set of mobile surveillanceware tools. These tools were connected to a Russia-based company sanctioned by the U.S. Government in connection with the 2016 Presidential election. Continue to watch a brief video highlighting this discovery!
Posted: 22 Nov 2019 | Premiered: Aug 13, 2019

Lookout

KuppingerCole Report Leadership Compass Database and Big Data Security
sponsored by IBM
ANALYST REPORT: This Leadership Compass from analyst firm KuppingerCole provides an overview of the market for database and big data security solutions along with guidance and recommendations for finding the sensitive data protection products that best meet client’s requirements.
Posted: 24 Oct 2019 | Published: 24 Oct 2019

IBM

Discover Hidden API Security Vulnerabilities and How to Defend Against Them
sponsored by Ping Identity Corporation
WHITE PAPER: Already an attractive target for bad actors, APIs are predicted to soon become the top attack vector. And while APIs may hold the key to compliance with regulations like GDPR, PSD2 and CDR, they also expose potential vulnerabilities. Read this white paper to gain a deeper visibility into your API activity today.
Posted: 13 Nov 2019 | Published: 13 Nov 2019

Ping Identity Corporation
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement