IT Management  >   Systems Operations  >   Security  >  

Internet Security Threats

RSS Feed   
Internet Security Threats Reports
Making the Modern Security Operations Center: The Difference Between Seeing and Doing
sponsored by Skybox Security
RESEARCH CONTENT: Access this IDC Q&A with research director of IDC's Worldwide Security Product service on making a more efficient, successful security operations center (SOC).
Posted: 13 Nov 2018 | Published: 13 Nov 2018

Skybox Security

The Buyer's Guide to Cyber Threat Intelligence
sponsored by Recorded Future
RESOURCE: Download The Buyer's Guide to Cyber Threat Intelligence for 11 questions you should answer before you invest.
Posted: 12 Nov 2018 | Published: 12 Nov 2018

Recorded Future

4 Critical Features of a Cyber-Resilient Architecture
sponsored by Dell EMC and Microsoft
RESOURCE: To protect your servers against cyber-attacks throughout their lifecycle, industry analysts recommend implementing four practices into your hardware security strategy. Keep reading to learn all 4.
Posted: 04 Dec 2018 | Published: 04 Dec 2018

Dell EMC and Microsoft

The State of Application Security in Today's Application Economy
sponsored by Micro Focus
WHITE PAPER: As companies become active players in the application economy, the implications of security—and the lack thereof—loom over them. Organizations that have never before given thought to security are now concerned about the risk posed by their applications. In this IDG quick poll, uncover considerations for building your application security strategy.
Posted: 16 Nov 2018 | Published: 16 Nov 2018

Micro Focus

Remove the Guesswork from Securing your Business
sponsored by CompuCom Systems, Inc.
WHITE PAPER: Discover a security best practices questionnaire and a cybersecurity protection checklist to see how your business's defensive strategies measure up against modern threats.
Posted: 16 Nov 2018 | Published: 16 Nov 2018

CompuCom Systems, Inc.

To SIEM or Not to SIEM, Find Out Your Options
sponsored by Arctic Wolf
VIDEO: With the growing complexity of SIEM solutions increasing and a shortage of people with cybersecurity skills, many organizations are looking for alternatives to SIEM. This webcast compares SIEM to security operations centers (SOCs).
Posted: 06 Dec 2018 | Premieres: 31 Dec 2018

Arctic Wolf

Unlock Opportunity with a New Security Approach
sponsored by Citrix
RESOURCE: Enable new ways of working with a new security framework that secures your apps and data across clouds, devices, and networks.
Posted: 24 Oct 2018 | Published: 24 Oct 2018


Commercial Cybersecurity Breaches
sponsored by Nominet
RESOURCE: How prepared is your business in case of a cyberattack? Uncover statistics about real life cybersecurity breaches that could happen to your business any day at any time.
Posted: 08 Nov 2018 | Published: 08 Nov 2018

Are You Monitoring and Protecting Your Company's Digital Footprint?
sponsored by Proofpoint, Inc.
EBOOK: Although your digital presence is critical to providing a cohesive customer experience, it also exposes your company to security risks. Access this e-book to learn how to better monitor and secure your organization's digital footprint in 3 steps, even if you don't have an official brand presence in one.
Posted: 03 Dec 2018 | Published: 03 Dec 2018

Proofpoint, Inc.

Webinar: Impact of Your Business Continuity Program on Cyber Resiliency
sponsored by IBM
WEBCAST: In this webinar, APAC Leader at IBM Mijee Briana Walker stresses the importance of establishing a business continuity management (BCM) program that proactively provides uptime in case of data breaches. Tune in for a proven, 3-pronged framework for BC, 10 areas your BCM should focus on, and more.
Posted: 09 Nov 2018 | Premiered: Nov 9, 2018


About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement