IT Management  >   Systems Operations  >   Security  >  

Internet Security Threats

RSS Feed   
Internet Security Threats Reports
 
The Business Case for Investing in a Security Ratings Platform
sponsored by Security Scorecard
WHITE PAPER: Data breaches caused by third-party vendor relationships are on the rise. Unfortunately, most assessment techniques are point-in-time and only express a vendor's cyber health at a particular moment. In this white paper, learn how a security ratings platform can help companies to monitor changes in the health of their vendor ecosystems.
Posted: 07 Feb 2019 | Published: 07 Feb 2019

TOPICS: 
Security Scorecard

Be Shielded From Every Angle in the Battle for Cybersecurity
sponsored by Lenovo & Microsoft
RESOURCE: Cybersecurity threats are all around you. It is important to shield against these threats from every angle. ThinkShield by Lenovo offers a comprehensive suite of end-to-end security offerings, with cutting-edge innovation that keep you safe.
Posted: 25 Jan 2019 | Published: 16 Oct 2018

TOPICS: 
Lenovo & Microsoft

Neustar SiteProtect Customer Success Stories
sponsored by Neustar
CASE STUDY: DDoS attacks represent a consistent and persistent threat to the digital operations and security of organizations everywhere. The attacks can be used to severely degrade network performance to the point of inoperability. In this case study, learn why organizations are turning to Neustar SiteProtect to keep their infrastructures secure.
Posted: 15 Feb 2019 | Published: 08 Feb 2018

TOPICS: 
Neustar

2017 Global EDR Research & Market Leadership Award
sponsored by Tanium
WHITE PAPER: The challenge for endpoint security professionals is to keep pace with the changing tactics of hackers. Ultimately, an endpoint security vendor needs to be adaptable. In this white paper, learn about how Tanium achieved a leadership position in the Endpoint Detect and Response Stand Alone market, according to Frost & Sullivan.
Posted: 04 Feb 2019 | Published: 31 Dec 2017

TOPICS: 
Tanium

Aflac Adopts Splunk Platform for Analytics-Driven Security
sponsored by Splunk Services UK Ltd
CASE STUDY: Aflac is the leading provider of voluntary insurance in the U.S. Facing an increase in the volume and velocity of security threats, Aflac needed a new analytics-driven security approach. In this case study, learn about the benefits Aflac has seen since deploying Splunk Enterprise Security and Splunk User Behavior Analytics.
Posted: 13 Feb 2019 | Published: 13 Feb 2019

TOPICS: 
Splunk Services UK Ltd

ALTR: Finally, a Killer Application of Blockchain
sponsored by ALTR
WHITE PAPER: A perfect storm of data breaches and regulations entered everyone's lives within just one year. The Yahoo! and Equifax data breaches have become the largest in history. GDPR is in full effect, while privacy laws emerge from California and China. This analyst report evaluates ALTR, a startup that offers the ability to safeguard data via blockchain.
Posted: 06 Feb 2019 | Published: 20 Jun 2018

TOPICS: 
ALTR

Incident response playbook in flux as services, tools arrive
sponsored by SearchSecurity.com
EBOOK: The enterprise incident response "playbook" is getting a rewrite. An IR playbook guides an enterprise security team's work, identifying triggering events and outlining best practices or regulatory requirements. Download this handbook to learn more about the essential playbook revisions that are putting new technologies and services to use.
Posted: 12 Feb 2019 | Published: 12 Feb 2019

TOPICS: 
SearchSecurity.com

Market Guide for Application Shielding
sponsored by Arxan
RESEARCH CONTENT: Protecting applications that run within untrusted environments is crucial as mobile, IoT and modern web applications migrate software logic to the client side. Application shielding is well-suited to protect consumer mobile apps. Download this Gartner research report to learn more about application shielding.
Posted: 14 Feb 2019 | Published: 27 Jun 2018

TOPICS: 
Arxan

Missing Critical Patches: A Cybersecurity Epidemic
sponsored by Tanium
WHITE PAPER: IT security leaders agree that following best practices is instrumental in reducing cyber incidents. However, most organizations need to improve their best practices to stay secure. In this white paper, review key findings from a Frost & Sullivan survey. Also discover 5 recommended action items to help address common endpoint security issues.
Posted: 04 Feb 2019 | Published: 31 Dec 2017

TOPICS: 
Tanium

DIY is DOA: Cybersecurity Moves Toward Hybrid Models
sponsored by Dell SecureWorks
WHITE PAPER: Information security always was complex and challenging. But the rise of cloud and mobile organizations has multiplied that challenge. However, information security services providers (ISSPs) can help organizations by empowering their internal resources. In this white paper, explore how using ISSPs can leverage an organization's operations.
Posted: 06 Feb 2019 | Published: 06 Feb 2019

TOPICS: 
Dell SecureWorks
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement