IT Management  >   Systems Operations  >   Security  >  

Information Security Threats

RSS Feed   
Information Security Threats Reports
 
Future of the SOC - SOC People: Skills, Not Tiers
sponsored by Chronicle
WHITE PAPER: We’ve entered a new phase of the digital revolution. Network edges are extended to a point of entanglement with the physical world, expanding hybrid cloud and an increasingly multi-cloud core—all of which necessitates a rethinking of the SOC workforce model. Access this white paper to see the prospective focus on SOC talent.
Posted: 27 Jan 2021 | Published: 27 Jan 2021

Chronicle

4 Key Tips from Incident Response Experts
sponsored by Sophos
WHITE PAPER: Today’s cyberthreats are unpredictable, so you need to make sure that you and your organization know what to do in the event of an incident. You also need to make sure you’re investing in the right technologies to detect and respond to threats. Reading these 4 tips will help you to know where you stand.
Posted: 11 Jan 2021 | Published: 09 Nov 2020

Sophos

How the Security Inversion Impacts User and Data Protection
sponsored by Netskope
WHITE PAPER: Legacy cybersecurity methods are becoming increasingly inefficient against today’s cyberthreats. Modernizing the security model is necessary to ensure innovation and the protection of data and users. Read this white paper to learn more about ensuring effective security in a cloud and mobile-first world.
Posted: 14 Jan 2021 | Published: 14 Jan 2021

Netskope

Vendor Portfolios for Secure Web Gateways
sponsored by Netskope
ANALYST REPORT: Vendors are expanding their core secure web gateways (SWG) to add more security features such as CASB, zero-trust network access, FWaaS and remote browser isolation. Download this Gartner Magic Quadrant to examine broader portfolios that may help you consolidate security vendors.
Posted: 13 Jan 2021 | Published: 08 Dec 2020

Netskope

Axis Security Video: Safely Delivering Simple, Secure and Managed 3rd Party Access
sponsored by Axis Security
VIDEO: VPNs, despite their long-standing rate of success in securing corporate networks, do not hold up in a remote world. In particular, offering third parties remote VPN access presents a major risk to your network. Watch this video by Axis Security to see how you can deliver secure access to third parties without their ever touching your network.
Posted: 11 Jan 2021 | Premiered: 09 Sep 2020

Axis Security

Enterprise Edge and Cloud Security: A Buyer’s Guide
sponsored by Forcepoint
EGUIDE: Determining which cloud security vendor is right for your organization can be challenging. As more people work remotely and there are more ways to connect to the cloud, providing reliable security has never been more important. Read this cloud security buyer’s guide for exclusive evaluating criteria to help you choose with confidence.
Posted: 12 Jan 2021 | Published: 12 Jan 2021

Forcepoint

MyID – Replacing Central Access Management with a State-of-the-Art IAM Solution
sponsored by IC Consult
CASE STUDY: Legacy authentication lacks flexibility, availability and security. Businesses are now searching for future-proof solutions that can optimize the flexibility of IT services by providing innovative and secure authentication methods. Peruse this case study to learn how iC Consult provided an enterprise-wide IAM solution through a hybrid cloud.
Posted: 11 Jan 2021 | Published: 11 Jan 2021

IC Consult

Protecting APIs and Securing Applications So Business Can Thrive
sponsored by Radware
RESEARCH CONTENT: Nearly every organization relies on applications to connect with customers, business partners, suppliers and staff. As a result, the application and API threat landscape has evolved dramatically. Read this research report for a closer look at the state of application and API security, including top threats, best practices and more.
Posted: 26 Jan 2021 | Published: 26 Jan 2021

Radware

Pipl: The Online Identity Information Company
sponsored by Pipl
VIDEO: Digital identities are critical for interacting in today’s connected world, and the need to secure and manage these identities has never been higher. Watch this short video to learn more about the state of identity management and the role of Pipl in this global shift.
Posted: 15 Jan 2021 | Premiered: 15 Jan 2021

Pipl

CyberArk Privileged Access Security for U.S. Federal Government Agencies
sponsored by Merlin International
WHITE PAPER: US federal government agencies are tasked with the difficult challenge of protecting sensitive data against both internal and external threats. This white paper explores the benefits of establishing a comprehensive Privileged Access Management (PAM) program to protect federal systems & data – read on to get started.
Posted: 27 Jan 2021 | Published: 27 Jan 2021

Merlin International
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info