IT Management  >   Systems Operations  >   Security  >  

Network Security Threats

RSS Feed   
Network Security Threats Reports
 
How to Boost Your Breach Defense: A 3-Part Plan
sponsored by Micro Focus
RESOURCE: Even the strongest, most protected networks can be brought to their knees with just 1 minor misstep. Thus, the cyber defender has to protect against all attack vectors. In this blog, learn how you can help secure your organization by adopting a 3-part security model consisting of security in depth, DevSecOps, and security validation.
Posted: 12 Aug 2019 | Published: 12 Aug 2019

Micro Focus

Sydney Opera House Case Study
sponsored by Blackberry Cylance
CASE STUDY: The Sydney Opera House embarked on a renewal process which included updating their endpoint security system. They were looking for a solution that could help address a number of challenges including cyberattacks and compliance. Download this case study to learn why they choose to deploy CylancePROTECT.
Posted: 09 Aug 2019 | Published: 09 Aug 2019

Blackberry Cylance

How to Up Level your Defenses with Security Analytics
sponsored by Splunk
WHITE PAPER: If you don't have actionable insights to detect and respond to emerging and current threats, you're not reaping the rewards of modern SIEM technology. Find out what you (and your SIEM) are missing and how to harden your defenses.
Posted: 19 Aug 2019 | Published: 19 Aug 2019

Splunk

Mobile Security in the Financial Services
sponsored by Wandera
WHITE PAPER: Download this report for an overview of mobile security challenges facing modern Financial Services companies, including changing technologies and compliance with government regulations, as well as an in-depth analysis of how mobile cyber threats impact the industry.
Posted: 06 Aug 2019 | Published: 06 Aug 2019

Wandera

Infographic: 5 ways to achieve a risk-based security strategy
sponsored by ComputerWeekly.com
EGUIDE: In this infographic, learn five steps to implement a risk-based security strategy that naturally delivers compliance as a consequence of an improved security posture.
Posted: 16 Aug 2019 | Published: 16 Aug 2019

ComputerWeekly.com

Security Powered by Understanding
sponsored by Armorblox
DATA SHEET: In this brief, learn how Armorblox brings understanding to security to address security's weakest link: the human layer.
Posted: 22 Aug 2019 | Published: 22 Aug 2019

Armorblox

Top 3 Telecom Provider Secures Mobile Accounts
sponsored by Shape Security
CASE STUDY: A Top 3 US Telecom Provider needed to secure its mobile accounts from credential stuffing attackers targeting them to commit various fraud schemes. In this case study, learn how the company was able to stop upgrade theft, 2FA bypass, and virtual calling with Shape Enterprise Defense.
Posted: 19 Aug 2019 | Published: 19 Aug 2019

Shape Security

Fortinet 2019 Operational Technology Security Trends Report
sponsored by Fortinet, Inc.
ANALYST REPORT: Fortinet's 2019 OT Security Trends Report analyzes data from FortiGuard Labs to glean insights about the state of security for supervisory control and data acquisition (SCADA) and other industrial control systems (ICS). Download the report to discover key findings.
Posted: 14 Aug 2019 | Published: 08 May 2019

Fortinet, Inc.

Balancing Fraud Detection and the Customer Experience
sponsored by SAS
WHITE PAPER: Digital channels are a must-have in the financial industry as customers flock to the businesses that can offer speed and convenience. But there's a dark side. The relative anonymity of digital channels opens up new doors for fraud. In this white paper, learn how organizations can verify a true identity and identify high-risk behavior in real time.
Posted: 07 Aug 2019 | Published: 31 Mar 2019

SAS

How Midsize Enterprises are Tackling Cyberthreat Challenges
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: The small to midsize enterprise (SME) segment may not make the top headlines when it comes to cyberattacks, but that doesn't mean these organizations have it any easier than their large enterprise counterparts. Read on for actionable insights into how peer organizations in this segment are tackling cyberthreat challenges.
Posted: 07 Aug 2019 | Published: 07 Aug 2019

Arctic Wolf Networks, Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement