IT Management  >   Systems Operations  >   Security  >  

Network Level Threats

RSS Feed   
Network Level Threats Reports
Rethinking Cyber Operations: Creating Clarity Out of Complexity
sponsored by Optiv
WHITE PAPER: Rethinking and evolving cyber operations is key to reducing complexity and achieving a cybersecurity model aligned to organizational risk. Download this white paper for insights into the innovation landscape, key symptoms of lagging cyber operations and a roadmap that organizations can follow to achieve a new cyber operations paradigm.
Posted: 06 Aug 2019 | Published: 06 Aug 2019


The Complete Guide to G Suite Email Protection for IT and Security Leaders
sponsored by Virtru
WHITE PAPER: A mistaken reply all or forward can cost millions. And for executives with more sensitive and valuable information stored in their inboxes, the stakes are even higher.This guide explains the strategic drivers around the need for email encryption and outlines the best available options for organizations that use G Suite. Read on to learn more.
Posted: 09 Aug 2019 | Published: 09 Aug 2019


Top 3 Telecom Provider Secures Mobile Accounts
sponsored by Shape Security
CASE STUDY: A Top 3 US Telecom Provider needed to secure its mobile accounts from credential stuffing attackers targeting them to commit various fraud schemes. In this case study, learn how the company was able to stop upgrade theft, 2FA bypass, and virtual calling with Shape Enterprise Defense.
Posted: 19 Aug 2019 | Published: 19 Aug 2019

Shape Security

State of Operational Technology and Cybersecurity Report
sponsored by Fortinet, Inc.
ANALYST REPORT: Recently, IT-based technologies have been integrated with operational technology networks to create new efficiencies and competitive advantages. However, this increases the digital attack surface and the risk of intrusion. In this research report, explore key findings from a survey of plant operations and manufacturing leaders.
Posted: 14 Aug 2019 | Published: 15 Mar 2019

Fortinet, Inc.

The Difference Between Format-Preserving Encryption and Tokenization
sponsored by comForte AG
RESOURCE: Format-preserving encryption (FPE) and tokenization have similar objectives, but the difference between the 2 can be confusing at times. Download this resource for a brief overview of both the similarities and differences between these 2 data-centric security methods. Also, explore examples of when 1 method might be used instead of the other.
Posted: 06 Aug 2019 | Published: 06 Aug 2019

comForte AG

The Definitive Guide to Public Cloud Security
sponsored by Lacework
WHITE PAPER: In this security report, discover how Lacework compares security vendors for AWS, Azure, and GCP and dive deeper into common security challenges presented by the cloud.
Posted: 06 Aug 2019 | Published: 06 Aug 2019


Enterprise Email Security, Q2 2019: The 12 Providers That Matter Most And How They Stack Up
sponsored by Proofpoint
ANALYST REPORT: Email is a critical business function deeply embedded in business processes. Its ubiquity makes email a platform for credential phishing attempts, malware, spam, and business email compromise. This research report suggests 3 key considerations to look for when choosing an email content security provider.
Posted: 19 Aug 2019 | Published: 16 May 2019


Key Considerations for Selecting an Industrial Cybersecurity Solution for Asset Identification, Threat Detection, and Response
sponsored by Dragos
WHITE PAPER: In this white paper, discover the considerations organizations should take into account when researching ICS cybersecurity platforms and assess the best solution for your industrial operations.
Posted: 02 Aug 2019 | Published: 08 Jan 2019


Enhanced Security for AWS
sponsored by Lacework
WHITE PAPER: In this security solution brief, discover how Lacework uses threat detection, compliance, and automated security monitoring for workloads and accounts running in AWS and in multi-cloud environments.
Posted: 06 Aug 2019 | Published: 06 Aug 2019


Closing the People, Processes and Technology Gap: How Innovation Can Strengthen Your Cybersecurity Program
sponsored by Optiv
RESOURCE: A robust security model is built on 3 pillars—people, processes and technology. Unfortunately, a failure to innovate could negatively affect your ability to excel at all 3. In this blog, explore these 3 pillars and discover 5 steps to solving the people, process and technologies equation.
Posted: 05 Aug 2019 | Published: 24 Jul 2019


About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.


All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement