IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Intrusion Prevention

RSS Feed   
ALSO CALLED: Network Intrusion Prevention, Host Intrusion Prevention, Intrusion Protection, Network Intrusion Management
DEFINITION: Diffie-Hellman key exchange, also called exponential key exchange, is a method of digital encryption that uses numbers raised to specific powers to produce decryption keys on the basis of components that are never directly transmitted, making the task of a would-be code breaker mathematically overwhelming. To implement Diffie-Hellman, the two end users Alice and Bob, while communicating over a channel  … 

Intrusion Prevention definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Intrusion Prevention Reports
1 - 25 of 185 Matches Previous Page  |  Next Page
Vendor Portfolios for Secure Web Gateways
sponsored by Netskope
ANALYST REPORT: Vendors are expanding their core secure web gateways (SWG) to add more security features such as CASB, zero-trust network access, FWaaS and remote browser isolation. Download this Gartner Magic Quadrant to examine broader portfolios that may help you consolidate security vendors.
Posted: 13 Jan 2021 | Published: 08 Dec 2020

Netskope

5 Types of Insider Threats and How to Detect Them in Your ERP System
sponsored by Appsian
RESOURCE: Although insider threats are the leading cause of the majority (57%) of data breaches, organizations often overlook these threats and focus their efforts on defending against external attacks. Read this blog post and discover the 5 most common insider threats and how to detect them in your ERP system.
Posted: 06 Jan 2021 | Published: 06 Jan 2021

Appsian

Innovation Insight For Extended Detection And Response
sponsored by Palo Alto Cortex
RESEARCH CONTENT: Disparate risk management teams and security tools make it difficult to efficiently mitigate threats. This Gartner report highlights the risks and advantages of today’s leading extended detect and response (XDR) tools – designed to unify incident detection and response efforts into a single platform.
Posted: 04 Jan 2021 | Published: 19 Mar 2020

Palo Alto Cortex

2020 Threat Hunting Survey Results
sponsored by DomainTools
RESEARCH CONTENT: Each year, SANS conducts a Threat Hunting Survey to better understand the threat hunting landscape and how security professionals are conducting threat hunting in their organizations – read on to unlock the results from this year’s survey.
Posted: 18 Dec 2020 | Published: 18 Dec 2020

DomainTools

Threat Hunting Report
sponsored by DomainTools
RESEARCH CONTENT: Threat hunting is becoming the gold standard for addressing today’s increasingly disruptive cyberthreats – in fact, 93% of organizations agree that threat hunting should be a top security priority. Read this 2020 Threat Hunting Report for more insights and best practices as they related to the current state of threat hunting.
Posted: 17 Dec 2020 | Published: 17 Dec 2020

DomainTools

The DevOps Vulnerability Remediation Paradox
sponsored by Rezilion
VIDEO: The vulnerability management lifecycle can be chaotic, as deciding how to prioritize risk can be a daunting task. This video highlights how the addition of autonomous validation can help organizations reduce remediation work, shrink their attack surface and speed up DevOps deployments – watch now to get started.
Posted: 15 Dec 2020 | Premiered: 18 Nov 2020

Rezilion

Detection & Response: To Outsource or Not to Outsource
sponsored by AWS Rapid7
VIDEO: The cybersecurity skill shortage often leaves security teams feeling overworked and underprepared – or as Hamlet might say, “foolish prating knaves”. Watch this webinar, Detection & Response: To Outsource or Not to Outsource, and discover which option is best fit based on your organization’s needs.
Posted: 11 Dec 2020 | Premiered: 11 Dec 2020

AWS Rapid7

Render Zero-Day Attacks Useless on Your Network
sponsored by Atakama
RESOURCE: Zero-day attacks are becoming more and more common, exploiting a vulnerability that is either unknown to or undisclosed by the target organization. Read this white paper to learn more about how zero-day attacks operate and how your organization can render them useless.
Posted: 09 Dec 2020 | Published: 30 Apr 2020

Atakama

Onfido’s Identity Fraud Report 2020
sponsored by Onfido
RESEARCH CONTENT: Each year, fraudsters find new and more effective ways to benefit from cyberthreats – the pandemic of 2020 made it an especially profitable year for fraudsters. Read this identity fraud research report to learn more about the emerging threat types and most effective security techniques.
Posted: 08 Dec 2020 | Published: 08 Dec 2020

Onfido

Detecting a Java Backdoor with Dtex
sponsored by Dtex
CASE STUDY: In this case study, see how a financial services company fell victim to a java backdoor attack – despite having AV, EDR and other security tools deployed – and discover how Dtex’s detection and forensic capabilities enabled a complete time of resolution of under 24 hours.
Posted: 02 Dec 2020 | Published: 02 Dec 2020

Dtex

Introduction to DNSDB Part 1: Crawl
sponsored by Farsight Security
WEBCAST: Cheap, easy-to-obtain domain names, IP addresses and other DNS assets are helping to fuel today’s cybercrime, from spam and phishing to more sophisticated nation-state attacks. What can you do to stay protected? Jump into this webinar to learn how you can advance your threat intelligence and navigate roadblocks when using DNS in investigations.
Posted: 01 Dec 2020 | Premiered: Dec 1, 2020

Farsight Security

How to Elevate Your Threat Intelligence Program
sponsored by DomainTools
WEBCAST: According to the SANS 2020 Cyber Threat Intelligence Survey, 82% of organizations find value in threat intelligence, however, only 4% of respondents had processes in place to measure effectiveness. So, how do you demonstrate and quantify the value of your threat intelligence program? View this Forrester-sponsored webcast to learn the answer.
Posted: 25 Nov 2020 | Premiered: Nov 25, 2020

DomainTools

Detecting and Defending Against SSRF
sponsored by WhiteHat Security
WEBCAST: Server-side request forgery (SSRF) attacks are a critical threat to be aware of in today’s landscape – targeting restricted information by manipulating server sent requests in order to gain access. This WhiteHat webinar provides a comprehensive overview of SSRF, how it operates, common weak points, and how to defend against it – watch now.
Posted: 25 Nov 2020 | Premiered: Nov 25, 2020

WhiteHat Security

Upgrade the Hunt with Splunk and DomainTools
sponsored by DomainTools
WEBCAST: Splunk has just released an update for its prominent app DomainTools that offers enhanced detection, monitoring and diagnostic capabilities as well as more customization, self-service capabilities and deeper contexts within enterprise security. Watch this webcast to learn how you may be able to take your threat hunt to the next level.
Posted: 23 Nov 2020 | Premiered: Nov 23, 2020

DomainTools

Managed Detection and Response (MDR) Services Buyers Guide
sponsored by Sophos
EGUIDE: Managed detection and response (MDR) tools are growing in popularity among security leaders as workloads grow in volume. The following buyers guide highlights the potential benefits and required capabilities of an ideal MDR tool and evaluates current offerings against these features – read on to get started.
Posted: 23 Nov 2020 | Published: 23 Nov 2020

Sophos

Security Incident Response & Vulnerability Response: Cost Savings & Other Benefits
sponsored by ServiceNow
RESEARCH CONTENT: Cyberattacks are occurring at a more frequent rate than ever before – not to mention the increased complexity of today’s threats. To address this, organizations are turning to security operations tools, like ServiceNow’s. Read this Forrester Total Economic Impact report for a closer look at the key features and ROI of ServiceNow’s offering.
Posted: 11 Nov 2020 | Published: 31 Oct 2020

ServiceNow

Hacking Active Directory – From A Pen Tester
sponsored by Quest
WHITE PAPER: Active Directories (AD) provides authentication and protects credentials, information systems and intellectual property from unauthorized access – protecting your organization from financial and reputational harm. However, cybercriminals have found ways to exploit ADs – read this white paper to see the 8 most common AD-specific threats.
Posted: 26 Oct 2020 | Published: 26 Oct 2020

Quest

Tips for Preparing an RFP for SOC-as-a-Service & Evaluation Criteria
sponsored by Cysiv
WHITE PAPER: SOCs are a critical aspect to effectively identifying and addressing potential threats – however the evaluation process and subsequent RFP drafting process can be overwhelming with the amount of available options. The following white paper provides evaluation best practices and tips to guide RFP drafting to help you get started.
Posted: 14 Oct 2020 | Published: 14 Oct 2020

Cysiv

Ask These Critical Questions and Consider These Risks When Selecting an MDR Provider
sponsored by GoSecure
RESOURCE: According to Gartner, 25% of organizations will be using managed detection and response (MDR) services by 2024. So when considering key requirements and managing risks associated with outsourcing threat detection and response, it’s critical that you ask the right questions. View this Gartner report to learn what these questions are and more.
Posted: 23 Sep 2020 | Published: 31 Oct 2019

GoSecure

How to Respond Rapidly to Emerging Cyberthreats
sponsored by ThreatQuotient
PRODUCT DEMO: Since the COVID-19 pandemic began, organization’s have had to deal with a growing volume of cyberthreats that look to take advantage of uncertainty and commotion as an entry point for their attacks. Watch this video demo to see how the ThreatQ platform handles these kinds of threats.
Posted: 21 Sep 2020 | Premiered: 21 Sep 2020

ThreatQuotient

Enhancing Orchestration Using Threat Intelligence
sponsored by ThreatQuotient
VIDEO: Managing modern risk requires dedicated threat intelligence platforms that equip organizations with the information and guidance needed to identity and thwart potential cyberattacks. Watch this webinar to learn about how threat intelligence can (and should) be used to enhance security orchestration initiatives.
Posted: 21 Sep 2020 | Premiered: 21 Sep 2020

ThreatQuotient

5 Steps to Making Better Security Decisions
sponsored by ThreatQuotient
WHITE PAPER: The goal of any cybersecurity program is to make better decisions faster. However, IT and security teams are often overwhelmed with the number of alerts requiring their attention. In this report, discover a 5-step process for making better security decisions and achieving a more effective response.
Posted: 18 Sep 2020 | Published: 18 Sep 2020

ThreatQuotient

IDC Technology Spotlight
sponsored by GoSecure
WHITE PAPER: In order to address the increasing frequency (and efficacy) of malware attacks, organizations have begun embracing managed detection and response (MDR) tools. This report provides an overview of MDR required capabilities, emerging trends and a closer look at the key features and capabilities of the GoSecure MDR Platform.
Posted: 17 Sep 2020 | Published: 31 May 2020

GoSecure

Airbus Cybersecurity Strengthens its Threat Intelligence with ThreatQuotient
sponsored by ThreatQuotient
CASE STUDY: How do you improve an already mature and reliable offering? For Airbus Cybersecurity, the answer was to enrich the threat intelligence service it had been offering customers since 2011 with contextual information at scale. Read this case study to learn how Airbus partnered with ThreatQuotient to achieve this.
Posted: 17 Sep 2020 | Published: 17 Sep 2020

ThreatQuotient

Incident Response Tools: How, When & Why to Use Them
sponsored by Claranet
EGUIDE: Incident response tools are growing in popularity as an effective method for proactively analyzing and addressing the vulnerabilities within your network. This e-guide was written to help readers through the vetting process as well as understand how, when and why to use them – read on to get started.
Posted: 21 Sep 2020 | Published: 17 Sep 2020

Claranet
1 - 25 of 185 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info