IT Management  >   Systems Operations  >   Security  >  

Internet Threats

RSS Feed   
Internet Threats Reports
 
3 Threat Vectors Addressed by Zero Trust App Sec
sponsored by Traceable
WHITE PAPER: Zero trust has been around for some time, but implementations of a zero-trust model for network and application security are few and far between. Now, you can explore how a zero-trust approach can help protect applications from 3 dangerous threat vectors. Read the full blog post to learn what they are and what you can do.
Posted: 23 Feb 2021 | Published: 23 Feb 2021

Traceable

Integrated Cybersecurity Delivers Efficiency and Effectiveness in a Challenging Environment
sponsored by Kaspersky
ANALYST REPORT: According to IDC research, the majority (75%) of organizations worldwide recognize that security team's time is wasted due to a lack of integration in their security environments. These teams would be wise to consider a multi-level, integrated approach with endpoint protection in mind. See this IDC white paper to examine such an approach.
Posted: 17 Feb 2021 | Published: 31 Jul 2020

Kaspersky

How to Become a Threat Hunter
sponsored by Cisco Systems Inc.
EGUIDE: Much of hunting is instinct, and when it comes to hunting cyberthreats, it’s no different. Threat hunters are good at what do because they aren’t as ‘by-the-book’ as other professionals. But they do have a set of learnable skills that make them successful. Download this e-guide featuring Gartner analyst John Collins to know what these skills are.
Posted: 14 Apr 2021 | Published: 07 Apr 2021

Cisco Systems Inc.

SOLUTION BRIEF Advancing SOC Endpoint Incident Response Practices
sponsored by Malwarebytes
DATA SHEET: Learn how Malwarebytes Incident Response can help you combat sophisticated cyberthreats as well as avoid the damage a successful breach could inflict on your organization’s reputation.
Posted: 12 Mar 2021 | Published: 12 Mar 2021

Malwarebytes

Expand your Endpoint Security without Expending Resources
sponsored by Kaspersky
DATA SHEET: Now that the security perimeter is disappearing, integration can become a part of security stacks everywhere. Automation is already playing its part, and with the explosion of remote work at hand, a focus on endpoint detection and response (EDR) is necessary. View this data sheet to explore Kaspersky’s multi-layer security approach.
Posted: 17 Feb 2021 | Published: 17 Feb 2021

Kaspersky

2020 Enterprise Cloud Incident Response Survey
sponsored by Infoblox
RESEARCH CONTENT: In this year’s SANS Enterprise Cloud Incident Response (IR) Survey, discover the key challenges that today’s IT and security leaders are facing as it relates to addressing cloud-related threats – which range from external risks like data theft to internal dangers like staffing shortages. Download the report now to get started.
Posted: 16 Feb 2021 | Published: 30 Sep 2020

Infoblox

A Guide for Community Banks: Democratizing Machine Learning
sponsored by Feedzai
EGUIDE: Even pre-pandemic, customers were demanding that their financial institutions offered digital banking capabilities. The spread of COVID-19 accelerated this, and digital banking is a competitive necessity. In this e-guide, discover how COVID-19 has impacted the banking industry, including how it’s shaping the future of fraud.
Posted: 11 Feb 2021 | Published: 11 Feb 2021

Feedzai

Rethinking Cyber Risk in a Re-globalized World with Andrea Little Limbago, VP Research and Analysis
sponsored by Interos
WEBCAST: The global pandemic has created seismic shifts in technology trends, particularly as they pertain to the global economy. Organizations are being driven to rethink their policies on security and risk.
Posted: 23 Feb 2021 | Premiered: Nov 5, 2020

Interos

Advanced Threat Detection, Focused Investigation And Effective Response
sponsored by Bitdefender
DATA SHEET: Traditional endpoint security efforts are growing less and less capable of preventing today’s sophisticated cyberthreats – increasing the need for advanced threat detection, investigated and response capabilities, typically in the form of Endpoint Detection and Response (EDR). Read this datasheet to see what Bitdefender offers in terms of EDR.
Posted: 10 Feb 2021 | Published: 10 Feb 2021

Bitdefender

Universal Directory: Create One World.
sponsored by Okta
EBOOK: Directories have helped businesses manage identities, but the more identities there are to manage, the more directories are born, and the more confusion arises. Dive into this e-book to learn more about directories, then discover a central identity management system by Okta that strives to integrate users across different organizations.
Posted: 02 Mar 2021 | Published: 02 Mar 2021

Okta
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences