IT Management  >   Systems Operations  >   Security  >  

Network Threats

RSS Feed   
Network Threats Reports
The Evolution of Mobile Security
sponsored by Symantec
WHITE PAPER: Given that emails containing sensitive information are routinely opened on a mobile device, implementing robust security controls on these devices should be a top priority. In this white paper, learn how to break down the barriers that separate mobile security from traditional security to ensure your organization has a seamless security ecosystem.
Posted: 08 May 2019 | Published: 08 May 2019


TITUS Changes Tack, Places Big Bet on Machine-Learning-Based Classification
sponsored by TITUS
WHITE PAPER: One of the primary reasons data security is less adopted than other security areas is that it can be complex, and often places a burden on users in terms of changes to workflows. In this white paper, learn how TITUS Intelligence Protection (TIP) with machine-learning-based classifications can greatly reduce the need for user involvement.
Posted: 15 May 2019 | Published: 09 Nov 2018


Security Awareness Computer-Based Training
sponsored by Proofpoint
RESEARCH CONTENT: The market for security awareness computer-based training (CBT) is driven by the recognition that people play a critical role in an organization's overall security and risk. Organizations must invest in tools that increase awareness. In Gartner's Magic Quadrant report, explore security awareness CBT market trends and key vendors in the field.
Posted: 07 May 2019 | Published: 13 Nov 2018


Case Study: New York Cruise Lines & Armor Cloud Security
sponsored by Armor
CASE STUDY: The New York Cruise Lines wanted to ensure they provided guests with online resources. However, with every new web-facing resource, there's an increased risk of a data breach. In this case study, learn how the New York Cruise Lines were able to secure their hybrid cloud infrastructure by implementing Armor's managed security provider.
Posted: 30 Apr 2019 | Published: 30 Apr 2019


2018 Threat Report
sponsored by CenturyLink
WHITE PAPER: As cyberthreats proliferate, organizations often seek to find the silver bullet for cybersecurity issues. With so many differing viewpoints of the threat landscape, identifying actionable intelligence is difficult. In this threat report, explore key insights on what the CenturyLink Threat Research Labs sees across the CenturyLink global backbone.
Posted: 01 May 2019 | Published: 01 May 2019


Autonomous Threat Hunting
sponsored by Verizon
WHITE PAPER: With Verizon's Autonomous Threat Hunting, you can transform massive amounts of system logs and threat data into high-quality, prioritized alerts. Download this white paper to learn more.
Posted: 15 Apr 2019 | Published: 15 Apr 2019


Cybersecurity Incident Response Services
sponsored by CrowdStrike
RESEARCH CONTENT: According to Forrester Analytics 2018 survey data, 50% of global security decision makers reported suffering at least one breach in the past 12 months. Pragmatic businesses plan for a breach. In this Forrester Wave report, explore key criteria to look for when evaluating a cybersecurity incident response service provider.
Posted: 09 May 2019 | Published: 18 Mar 2019


Break the Link Between Users and Cyber Threats
sponsored by Avast Business
WHITE PAPER: Because SMBs rarely have the resources to build intricate anti-malware solutions, your organization is uniquely positioned to step in and offer those necessary security layers. This white paper highlights a secure web gateway (SWG) that can help you do so. Read on for 5 main benefits and how it delivers added value for service providers.
Posted: 22 Apr 2019 | Published: 22 Apr 2019

Avast Business

2019 SonicWall Cyber Threat Report
sponsored by SonicWall
RESEARCH CONTENT: To promote global awareness and facilitate important dialogues, SonicWall remains steadfast in its commitment to research, analyze and share threat intelligence via the 2019 SonicWall Cyber Threat Report. Download the report to discover shocking revelations from the SonicWall Capture Lab threat researchers today.
Posted: 30 Apr 2019 | Published: 30 Apr 2019


The Truth about Shadow IT
sponsored by Cisco Umbrella
RESOURCE: Employees in every industry are expected to work quickly, but they're often frustrated by company-issued apps. As a result, they're downloading personal apps to get the job done instead of using secure, enterprise-approved tools. This is called shadow IT. In this infographic, learn how your organization can stop shadow IT in its tracks.
Posted: 02 May 2019 | Published: 02 May 2019

Cisco Umbrella

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.


All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement