IT Management  >   Systems Operations  >   Security  >  

Network Level Threats

RSS Feed   
Network Level Threats Reports
 
9 Common Security Mistakes Your Organization Might Be Making
sponsored by Involta
WHITE PAPER: Without cybersecurity practices in place, a company could risk up to $4.43 million in breach costs, according to the Ponemon/IBM 2018 Cost of a Data Breach Study. Most companies should be very concerned about their security practices. In this white paper, explore 9 security mistakes that are commonly made over and over again.
Posted: 21 May 2019 | Published: 21 May 2019

Involta

The Basics of Auditing and Securing Your Network Perimeter with SIEM
sponsored by ManageEngine
WHITE PAPER: To thwart network attacks, you first need to be on top of critical security events occurring in your network. But due to the high volume of events, auditing these events in real time can be challenging, if not impossible. In this white paper, learn about the basics of auditing and securing your network perimeter by leveraging SIEM.
Posted: 10 May 2019 | Published: 10 May 2019

ManageEngine

Shake the Box: How to Get Encrypted Traffic Insights Without Decryption
sponsored by Corelight
WHITE PAPER: The most advanced security teams rely on network traffic as a fundamental data source for security investigations, but encryption has made that increasingly difficult. In this white paper, learn how the open-source Zeek framework (formerly called 'Bro') was purpose-built for network security monitoring.
Posted: 21 May 2019 | Published: 21 May 2019

Corelight

How to Protect Your Business from a Magecart Data Skimming Attack
sponsored by Instart
WHITE PAPER: Data and credit card skimming attacks are especially worrying for online businesses. Skimming attacks have increased in scale and scope over the last decade, proving that these types of attacks continue to be a persistent security problem. In this white paper, learn why preventing data access is the only true defense against skimming attacks.
Posted: 16 Apr 2019 | Published: 30 Apr 2019

Instart

Advanced Threat Prevention Appliance
sponsored by Juniper Networks
WHITE PAPER: Organizations worldwide face security and productivity challenges every day. Additionally, security teams often fail to recognize and act on critical incidents. In this white paper, learn how the Juniper Networks Advanced Threat Prevention Appliance can protect organizations from cyberattacks.
Posted: 17 Apr 2019 | Published: 31 Oct 2018

Juniper Networks

Autonomous Threat Hunting
sponsored by Verizon
WHITE PAPER: With Verizon's Autonomous Threat Hunting, you can transform massive amounts of system logs and threat data into high-quality, prioritized alerts. Download this white paper to learn more.
Posted: 15 Apr 2019 | Published: 15 Apr 2019

Verizon

Exploring the Gray Space of Cybersecurity with Insights from Cognitive Science
sponsored by Forcepoint
WHITE PAPER: Cybersecurity is traditionally very good at identifying activities that are black or white—either obviously bad or clearly good. But there is a wide "gray space" between black and white, full of activities that are less clear. In this white paper, learn how to determine the best course of action in ambiguous scenarios.
Posted: 14 May 2019 | Published: 14 May 2019

Forcepoint

Advanced Authentication Technologies for Detecting Real-time Threats to Banks
sponsored by HID Global
WHITE PAPER: Any financial institution or business that offers online financial services is a top target for hackers. If customers connecting to banking applications are doing so via infected devices, the malware resident can collect sensitive information. In this white paper, learn how ActivID Threat Detection Services can help protect your sensitive data.
Posted: 12 Apr 2019 | Published: 25 May 2016

HID Global

Smarter Data Protection with Machine Learning
sponsored by TITUS
WHITE PAPER: Protecting sensitive data is critical, but it can be difficult to achieve without first enhancing how data is kept. Many organizations struggle to accurately identify complex data as it moves throughout workflows. In this white paper, learn how machine learning offers a way for organizations to better protect their sensitive data.
Posted: 20 May 2019 | Published: 30 Nov 2018

TITUS

PCI and GDPR Data Protection Requirements Met with Zero Downtime
sponsored by comForte AG
WHITE PAPER: Bankart is a card payments processing center which has several files and databases in their network that contain cardholder data, all of which need to be protected from threats. In this case study, learn how Bankart was able to protect the sensitive data by using comforte's SecurDPS.
Posted: 15 Apr 2019 | Published: 15 Apr 2019

comForte AG
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement