Software  >  

Joke Programs

RSS Feed   
Joke Programs Reports
 
Account Takeover Attacks Are On The Rise
sponsored by PerimeterX
WEBCAST: This video describes everything you need to know about account takeovers and what you can do to prevent them at your organization. It also details recent breach examples from companies like FitBit, Marriott Hotels, Twitter, and more. Tune in to learn more about account takeover attacks.
Posted: 12 Dec 2019 | Premiered: Dec 12, 2019

PerimeterX

How Spear Phishing Targets the C-Suite
sponsored by Inky Technology
RESOURCE: In this resource learn about the leading tactics and costs of spear phishing, as well as anti-phishing solutions to help protect you from email phishing and malware concerns.
Posted: 24 Jun 2019 | Published: 24 Jun 2019

Inky Technology

Trend Report: Threats are Multiplying and Becoming More Sophisticated
sponsored by Cisco Umbrella
ANALYST REPORT: Despite all the buzz about security and staying prepared, malicious attackers are more audacious than ever. Download this research report to explore popular threats such as phishing, ransomware, cryptomining and more. Also, learn how Cisco Umbrella can help keep your organization secure as threat risks continue to escalate.
Posted: 03 Sep 2019 | Published: 03 Sep 2019

Cisco Umbrella

How To Harness Machine Learning
sponsored by Webroot
EBOOK: In this e-book, discover 5 of the most pressing issues facing cybersecurity professionals today and how Webroot's 6th generation machine learning can help stop these sophisticated attacks today and in the future.
Posted: 31 Jul 2019 | Published: 31 Jul 2019

Webroot

BlackBerry Cylance Cybersecurity Maturity Evaluation Guide
sponsored by Blackberry Cylance
EGUIDE: In this guide, discover a methodology and roadmap for organizations of all sizes to use in assessing and advancing the maturity of their cyber risk management programs.
Posted: 18 Sep 2019 | Published: 18 Sep 2019

Blackberry Cylance

What Is Phishing and What Are Top CISOs Doing About It?
sponsored by Inky Technology
RESOURCE: In the last year, different types of phishing attacks have begun to emerge. One example is a wire transfer scam in which attackers steal money from companies after suggesting an overdue bill or unpaid invoice. Download this blog to explore different types of phishing attacks and see what businesses can do to prevent them.
Posted: 24 Jun 2019 | Published: 24 Jun 2019

Inky Technology

Case Study: Electronic Manufacturing
sponsored by enSilo
CASE STUDY: A manufacturing enterprise's pre-existing AV was getting bypassed by malicious activity. As a result, the enterprise was seeking an endpoint security solution to protect their data from external cyberattacks. In this case study, learn how the manufacturing enterprise was able to provide the necessary protection when deploying enSilo.
Posted: 20 Sep 2019 | Published: 20 Sep 2019


Ransomware Attacks: How to Get the Upper Hand
sponsored by Cisco Umbrella
EGUIDE: The rock group Radiohead is celebrated for its unconventional approach to recording and releasing music. Lately, the band is also turning heads for how it handled a hacker trying to sell its unreleased work. In this e-guide learn what security experts think of Radiohead’s strategy for dealing with the ransomware threat.
Posted: 26 Nov 2019 | Published: 21 Nov 2019

Cisco Umbrella

Efficient Threat Remediation with Check Point and ServiceNow
sponsored by ServiceNow
RESOURCE: Discover how security administrators can create, orchestrate, and efficiently process block list requests for malicious sites using ServiceNow Security Operations and Check Point Next Generation Threat Prevention Gateways.
Posted: 24 Oct 2019 | Published: 24 Oct 2019

ServiceNow

Best Practices Award: Email Security Global
sponsored by Mimecast
WHITE PAPER: The trend towards cloud migration for email security adds new levels of complexity for organizations, and the increase in email-based threats means the need for secure email is critical to the protection of sensitive data. Read this research report to explore the top industry challenges and best practices as they relate to email security.
Posted: 12 Dec 2019 | Published: 12 Dec 2019

Mimecast
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement