IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

Iris Scanning

RSS Feed   
Iris Scanning Reports
 
Machine Learning in the SOC
sponsored by Micro Focus
WHITE PAPER: Most challenges that afflict security operations centers (SOCs) can addressed by machine learning. However, as with any new technology, it needs to be selected and deployed strategically. In this white paper you’ll learn how to achieve the best threat detection results with machine learning (including how to select the right tool).
Posted: 15 Jun 2020 | Published: 15 Jun 2020

Micro Focus

Improve Your Privacy Strategy
sponsored by TITUS
WHITE PAPER: As data privacy concerns and regulatory compliance requirements grow more complex and stringent, IT and security teams are tasked with the increasingly difficult task of improving their organization’s privacy strategy. This white paper highlights how Titus’ Accelerator for Privacy tool can help enhance current capabilities. Read on to learn more.
Posted: 22 Jun 2020 | Published: 22 Jun 2020

TITUS

How the Cognito platform replaces IDS and enables organizations to detect intrusions again
sponsored by Vectra AI
WHITE PAPER: While intrusion detection systems (IDS) and intrusion prevention systems (IPS) have long been a staple in incident response strategies, the modern threats that target today’s organizations require a new approach – perhaps one that leverages automation an AI. Read this white paper for more about defining the next generation of IDS.
Posted: 18 Jun 2020 | Published: 18 Jun 2020

Vectra AI

Mistakes to Love: A Survey of Identity Mistakes
sponsored by Auth0
WHITE PAPER: For leading application development teams, there seems to be debate around buying vs building. The following report provides in-depth insights from a survey into the successes and failures of identity professionals across their identity projects – both bought and build. Read on to unlock the key findings.
Posted: 01 Jul 2020 | Published: 01 Jul 2020

Auth0

Example of a Cloud Ransomware Attack Video Presented by Spin Technology
sponsored by Spin Tech
VIDEO: As organizations continue to move their sensitive data to cloud environments, it should come as no surprise that hackers are altering their methods to improve the success rates of their ransomware campaigns. Watch this video to see how a seemingly simple phishing scheme leads to a cloud ransomware attack.
Posted: 22 Jun 2020 | Premiered: 01 Apr 2020

Spin Tech

5 Misconceptions About Dynamic Application Security Testing (DAST) for Mobile
sponsored by NowSecure
RESOURCE: Dynamic Application Security Testing (DAST) plays a critical role in any mobile app security and privacy program. However, long-held misconceptions create confusion, leading to slower and infrequent testing. Read this article to bust 5 common misconceptions about DAST for mobile.
Posted: 25 Jun 2020 | Published: 25 Sep 2019

NowSecure

How the Cognito platform enables organizations to detect intrusions
sponsored by Vectra AI
WHITE PAPER: Security analytics and SIEM are modern approaches to security designed to help organizations better understand their environments and the threats they face. This EMA Top 3 report highlights a variety of use cases designed to inform decision makers in their project planning and decision-making process.
Posted: 17 Jun 2020 | Published: 31 Mar 2019

Vectra AI

Using Farsight Passive DNS
sponsored by Farsight Security
WHITE PAPER: For a hacker, the efficiency and ease-of-use of DNS-related phishing attacks is second to none. In fact, one Verizon study found phishing to be the #1 cause of data breaches. Download this white paper to learn more about Farsight’s Passive DNS tool, which embraces NIST’s 4-phase incident response lifecycle to help you thwart DNS-related threats.
Posted: 15 Jun 2020 | Published: 31 Jul 2019

Farsight Security

Nefilim Ransomware and Mitigating Attacks in the COVID-19 Era
sponsored by BlackBerry
RESOURCE: In Australia, organizations across every sector have been on the receiving end of increasingly frequent and complex malware and ransomware attacks. This article highlights one of the most prominent ransomware attacks, discusses cybersecurity in the COVID-19 era, and more. Read on to get started.
Posted: 30 Jun 2020 | Published: 15 Jun 2020

BlackBerry

MITRE ATT&CK Framework Q&A with Forrester Research
sponsored by Capsule8
WHITE PAPER: In response to the growing popularity and adoption of the MITRE ATT&CK framework, John Zelonis, principal analyst at Forrester Research, provides answers to commonly asked questions and offers further insight into the MITRE ATT&CK framework, including: Who should use the framwork, where priorities should begin & how it falls short.
Posted: 25 Jun 2020 | Published: 24 Jun 2020

 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info