IT Management  >   Systems Operations  >   Security  >  

Network Level Threats

RSS Feed   
Network Level Threats Reports
 
Four Cybersecurity Essentials That Your Board Of Directors Wants To Know
sponsored by Cymulate
EGUIDE: For security leaders, one of the most daunting tasks is explaining your organization’s cybersecurity strategy and needs to a nontechnical audience – especially when that audiences consists of executives and the board of directors. Read this e-guide to learn about which key metrics to highlight and how to make your case to a room of execs.
Posted: 05 Feb 2021 | Published: 05 Feb 2021

Cymulate

Are Cybercriminals Taking the Lead? Exorcist 2.0 and BazarLoader Deconstructed
sponsored by GoSecure
WEBCAST: In this webinar, review the techniques used in 2 recent attacks and learn how GoSecure Titan Managed Detection and Response service was able to identify both using a combination of cutting-edge technology and event visibility with their highly skilled threat hunting team before they executed their malicious actions.
Posted: 26 Mar 2021 | Premiered: Mar 26, 2021

GoSecure

Future Of The Soc Soc People: Skills Not Tiers
sponsored by Chronicle
WHITE PAPER: We’ve entered a new phase of the digital revolution. Network edges are extended to a point of entanglement with the physical world, expanding hybrid cloud and an increasingly multi-cloud core—all of which necessitates a rethinking of the SOC workforce model. Access this white paper to see the prospective focus on SOC talent.
Posted: 27 Jan 2021 | Published: 27 Jan 2021

Chronicle

Rethinking Cyber Risk in a Re-globalized World with Andrea Little Limbago, VP Research and Analysis
sponsored by Interos
WEBCAST: The global pandemic has created seismic shifts in technology trends, particularly as they pertain to the global economy. Organizations are being driven to rethink their policies on security and risk.
Posted: 23 Feb 2021 | Premiered: Nov 5, 2020

Interos

The Evolution of Security Operations and the Contemporary State of Play
sponsored by Kaspersky
ANALYST REPORT: According to IDC research, over half of all global businesses with 2,500+ employees already have a security operations center (SOC) in place, and 72% of those have built these capabilities within the last five years. Examine the full IDC report to follow this trend and to see some of the challenges that come with building a modern SOC.
Posted: 17 Feb 2021 | Published: 31 Aug 2020

Kaspersky

Market Guide For Managed Detection And Response Services
sponsored by eSentire
ANALYST REPORT: Organizations are turning to managed detection and response (MDR) services for turnkey threat detection and response via modern, remotely delivered 24/7 security operations center capabilities and technology. Use this Gartner research report to determine whether MDR is a good fit with your operational security requirements.
Posted: 16 Feb 2021 | Published: 26 Aug 2020

eSentire

API Security & the OWASP API Top 10
sponsored by Traceable
VIDEO: The OWASP API Top 10 project set out with a clear goal – to identify and provide insight into the most detrimental API vulnerabilities that exist across today’s organizations. Watch this episode of The API Security & the OWASP API Top 10 webinar series for a deep dive into 4 of the 10 critical API threats.
Posted: 17 Feb 2021 | Premiered: 03 Jan 2021

Traceable

Protecting Healthcare Data with Removable Media Container Encryption
sponsored by WinMagic
CASE STUDY: To better manage and protect patient data, healthcare organizations are embracing encryption capabilities. In this use case, explore the common pain points and challenges that have led to the rise of encryption and discover the potential business benefits of adopting a Removable Media Container Encryption (RMCE).
Posted: 01 Feb 2021 | Published: 01 Feb 2021

WinMagic

The Complete Guide to Evaluating Attack Surface Management
sponsored by Randori
RESEARCH CONTENT: Attack surface management (ASM) is an emerging category of solutions which aims to help organizations understand and address risks related to the stark rise in remote devices connected to the internet – read this SANS report to learn more about the ASM market.
Posted: 16 Feb 2021 | Published: 31 Oct 2020

Randori

The 2021 State Of Open Source Vulnerabilities
sponsored by Fossa
RESEARCH CONTENT: Open source has become increasingly popular – but as its usage grows, so too do its vulnerabilities. This research report provides a comprehensive look into today’s open source vulnerability landscape, highlighting current trends, long-term developments and best practices – read on to unlock the full report.
Posted: 12 Feb 2021 | Published: 12 Feb 2021

Fossa
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences