IT Management  >   Systems Operations  >   Security  >  

Information Security Threats

RSS Feed   
Information Security Threats Reports
 
Redefining Security Orchestration, Automation & Response with the MITRE ATT&CK Framework
sponsored by D3 Security
WHITE PAPER: SOAR platforms are broadly effective at the linear process of in-taking events and orchestrating response actions. However, they vary in their ability to support larger investigations that identify the scope of an incident. In this white paper, learn more about SOAR platforms including key differences between event-based and intent-based response.
Posted: 02 Apr 2019 | Published: 02 Apr 2019

D3 Security

Anatomy of a Cyber Attack
sponsored by Oracle Corporation
WHITE PAPER: Security is everyone's job today, from consumers, to system administrators, to executives. Explore this resource to gain insight into the anatomy of a cyberattack, the lifecycle of a security breach and how to augment your current approach to protect your sensitive data.
Posted: 04 Apr 2019 | Published: 31 Dec 2017

Oracle Corporation

Webinar: What's New in iOS 12 Security
sponsored by Data Theorem
WEBCAST: This webcast led by Phillip Tennen of Data Theorem explores the major changes in Apple's iOS 12. Watch now to learn about new security and privacy changes, how to take advantage of these changes and best practices to continuously improve privacy and data security for mobile apps.
Posted: 10 Apr 2019 | Premiered: Oct 22, 2018

Data Theorem

Orion Health Automates Security on AWS and Gains Centralized Management
sponsored by Trend Micro, Inc.
CASE STUDY: Orion Health embarked on a journey to build a SOC to support the deployment of Amadeus on AWS. They wanted everything on AWS to be automated. Having consistent, automated policies and processes would help to ensure that their customers' data was protected. In this case study, learn about Orion Health's experience using Trend Micro's Deep Security.
Posted: 03 Apr 2019 | Published: 03 Apr 2019

Trend Micro, Inc.

Top 3 Causes of Endpoint Security Failure
sponsored by Comodo
RESOURCE: Endpoint security has been radically redefined in recent years making it essential that organizations rethink and rearchitect how they prevent cybercriminals. This paper looks at 3 major reasons for endpoint security failure, why solving the problem is becoming more difficult and where to look for endpoint security platforms.
Posted: 02 Apr 2019 | Published: 02 Apr 2019

Comodo

The Market of Data Loss Prevention
sponsored by Forcepoint
RESEARCH CONTENT: This research report provides an analysis of the market for data loss prevention, revealing top players, trail blazers, specials and mature players. Data loss prevention solutions provide electronic data supervision and management to help organizations prevent non-compliant information sharing. In this research report, explore key vendors.
Posted: 01 Apr 2019 | Published: 31 Oct 2018

Forcepoint

Verizon Risk Report
sponsored by Verizon
RESOURCE: Find out how you can measure your risk and security posture with comprehensive visibility and daily updates that address gaps and maximize ROI through actionable data.
Posted: 18 Apr 2019 | Published: 18 Apr 2019

Verizon

You Can Get IAM Right
sponsored by One Identity
BOOK: In this e-book created exclusively for the RSA Conference, discover the most pressing IAM issues faced by virtually every organization and actionable, affordable and sustainable approaches to the IAM challenges you face.
Posted: 25 Mar 2019 | Published: 25 Mar 2019

One Identity

What is SOAR, Exactly?
sponsored by D3 Security
WHITE PAPER: A SOAR platform incorporates many different functions and activities. These functions including orchestration, automation incident management and report. In this white paper, learn about main requirements for each function in a SOAR. Also, explore how SOAR tools can help organizations to meet their goals.
Posted: 03 Apr 2019 | Published: 03 Apr 2019

D3 Security

Securing Big Data Analytics
sponsored by comForte AG
WHITE PAPER: Not only are the uses and benefits of big data expanding, so are the environments where it is collected and analyzed. Increasingly, data is ending up in the hands of cybercriminals. In this white paper, learn more about this fundamentally different approach to protecting sensitive data.
Posted: 01 Apr 2019 | Published: 01 Apr 2019

comForte AG
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement