IT Management  >   Systems Operations  >   Security  >  

Internet Threats

RSS Feed   
Internet Threats Reports
 
Cybersecurity and COVID-19: Securing Today’s Newly Distributed Workforce
sponsored by CrowdStrike
EBOOK: To play their part in ensuring the health and safety of their employees, organizations have quickly adopted a remote workforce model in order to maintain a semblance of ‘business as usual’. In this e-book, explore the security challenges organizations are seeing and discover how to embrace and secure a remote workforce.
Posted: 13 May 2020 | Published: 13 May 2020

CrowdStrike

Rethinking Data Protection: The Human-centric Approach
sponsored by Forcepoint
WHITE PAPER: While mobile devices and cloud applications enable organizations to enhance productivity, scalability and cost-savings, these modern environments come with new security risks. Download this e-book to learn more about the current and expected challenges and discover the benefits of a people-centric approach to cybersecurity.
Posted: 29 May 2020 | Published: 29 May 2020

Forcepoint

Making Sense of MITRE ATT&CK Evaluations to Address Your Cybersecurity Needs
sponsored by Dell SecureWorks
WEBCAST: The MITRE ATT&CK framework provides globally accessible information regarding adversary tactics and techniques based on observations. To further help end-users, MITRE uses the ATT&CK framework to evaluate various offerings and vendors. Watch this webinar to learn more about the evaluations and how to use them to address your security needs.
Posted: 28 May 2020 | Premiered: May 28, 2020

Dell SecureWorks

Justify Your Vulnerability Management Program
sponsored by Vulcan
WHITE PAPER: In this white paper, Vulcan compiled the results from several vulnerability management studies, conducted by organizations like Gartner, Ponemon, Verizon and more, to provide readers with a comprehensive set of key statistics and figures. Read on to unlock the findings.
Posted: 15 May 2020 | Published: 15 May 2020

Vulcan

10 Essential Capabilities of a Modern SOC
sponsored by Splunk
EBOOK: To build a modern SOC, organizations need a security operations platform that supports 10 key capabilities. Tap into this e-book to find out what they are.
Posted: 21 May 2020 | Published: 21 May 2020

Splunk

Okta ASA Netskope Private Access demo
sponsored by Okta + Netspoke
VIDEO: In this video demo, join a Solutions Architect at Okta as they provide a quick walkthrough of how Okta Advanced Server Access & Netskope Private Access can work together to enhance user experience.
Posted: 18 May 2020 | Premiered: 12 Mar 2020

Okta + Netspoke

Rain Financial Case Study
sponsored by Synack
CASE STUDY: In this case study, follow Rain Financial, a digital currency exchange partner in the Middle East, as they embark on a journey to identify, remediate and proactively protect against vulnerabilities that threaten the security of their customers’ data.
Posted: 21 May 2020 | Published: 21 May 2020

Synack

Your Guide to Mastering Vulnerability Remediation
sponsored by Vulcan
RESOURCE: In order to preemptively contain threats, today’s organizations must have policies, processes and tools in place in order to adequately detect and assess vulnerabilities. This article highlights 8 best practices your organization can take to overcome the common barriers to implementing effective vulnerability remediation. Read on to get started.
Posted: 21 May 2020 | Published: 06 May 2020

Vulcan

Learn How to Enhance Visibility and Early Detection by Using the SOC Triad
sponsored by Vectra Networks
WEBCAST: In this podcast, join security experts and business leaders from Cybereason, Vectra and Splunk as they discuss how to enhance visibility and early detection by using the SOC triad. But what is the SOC triad? Give the podcast a listen to discover the 3 components of the SOC triad and learn how to operationalize it.
Posted: 29 May 2020 | Premiered: Apr 24, 2020

Vectra Networks

Addressing Digital Risks in Business-Critical Infrastructures
sponsored by Schneider Electric
WHITE PAPER: In the age of digital transformations and the Internet of Things (IoT), cybersecurity needs to be front of mind in order to prevent costly disruptions. But as hackers grow increasingly clever, maintaining security in these environments becomes difficult. Read this white paper to learn more about the common risks and how to address them.
Posted: 29 May 2020 | Published: 29 May 2020

Schneider Electric
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info