IT Management  >   Systems Operations  >   Security  >  

Internet Threats

RSS Feed   
Internet Threats Reports
 
Countering Evasive Threats With Moving Target Defense
sponsored by Morphisec, Inc.
WHITE PAPER: Download this white paper to learn about Moving Target Defense (MTD) and how it leverages the tactics used by sophisticated attackers — deception, modification and polymorphism — to level the cybersecurity playing field.
Posted: 11 Sep 2019 | Published: 11 Sep 2019

Morphisec, Inc.

Understanding Privileged Identity Theft
sponsored by One Identity
WHITE PAPER: Privileged Identity Theft is a widespread technique in some of the largest data breaches and cyberattacks. In this white paper, learn why privileged identities pose such a risk to enterprises and how your organization can protect itself.
Posted: 27 Aug 2019 | Published: 27 Aug 2019

One Identity

Securing the Mobile and API Connected Work Space: Evernote Case Study
sponsored by Data Theorem
VIDEO: Evernote is a global software provider of mobile applications for individuals and teams. In this video, learn how Data Theorem helped Evernote identify and close 105 security issues and remove 17 harmful third-party libraries, all before releasing them to the public app stores.
Posted: 18 Sep 2019 | Premiered: 18 Sep 2019

Data Theorem

Security Analytics for Threat Detection and Breach Resolution in 2019
sponsored by Gigamon
ANALYST REPORT: While there is no security silver bullet, security analytics is a great step forward for any organization to improve its ability to detect threats. In this white paper, explore the top 4 considerations for investigating a security analytics tool.
Posted: 27 Aug 2019 | Published: 27 Aug 2019

Gigamon

Considerations for Developing a Cyber Threat Intelligence Team
sponsored by Farsight Security
EGUIDE: In this e-guide, explore the best practices for team location and selection when developing a cyberthreat intelligence team.
Posted: 04 Sep 2019 | Published: 10 Oct 2017

Farsight Security

What's the Difference Between UEM and MTD?
sponsored by Wandera
WHITE PAPER: Two security tools that many often mix up are Unified Endpoint Management (UEM) and Mobile Threat Defense (MTD). In this white paper, learn about the key capabilities and use cases for both security tools to determine which one is better for your organization.
Posted: 20 Sep 2019 | Published: 20 Sep 2019

Wandera

Detecting and Preventing Cybercrime and Fraud
sponsored by Concur Technologies
WHITE PAPER: In this white paper, explore what CFOs from some of Australia's leading businesses have to say about their cybercrime and fraud experiences and the risks facing their businesses today. Also, explore advice for businesses looking to tackle fraud.
Posted: 18 Sep 2019 | Published: 18 Sep 2019

Concur Technologies

Threat Report: Defending Against Today's Critical Threats
sponsored by Cisco Umbrella
ANALYST REPORT: When it comes to the threat landscape, it's important to take a look in the rearview mirror once in a while. Not only do you get a good look at what's behind you, but you can often spot what's coming up quick. In Cisco's 2019 Threat Report, discover 5 key threats from the last year that are predicted to appear again in the near future.
Posted: 10 Sep 2019 | Published: 28 Feb 2019

Cisco Umbrella

The Hacker Powered Security Report 2019
sponsored by HackerOne
ANALYST REPORT: Security vulnerabilities are a fact of life. For this reason, organizations are competing to attract hackers who have 1 key advantage over traditional methods: they can think like an attacker. In this 2019 research report, learn about the state of hacker-powered security.
Posted: 16 Sep 2019 | Published: 16 Sep 2019

HackerOne

You Need to See It to Protect It: How Real-Time Visibility and IT Hygiene Drive AWS EC2 Security
sponsored by Amazon Web Services
WHITE PAPER: Organizations are increasingly connecting mission-critical apps and data to AWS and taking advantage of its scalable Elastic Compute Cloud (EC2). But, managing and securing your own EC2 environment can become a challenge. In this white paper, learn how real-time visibility and good IT hygiene can drive AWS EC2 security.
Posted: 06 Sep 2019 | Published: 06 Sep 2019

Amazon Web Services
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement