IT Management  >   Systems Operations  >   Security  >  

Network Level Threats

RSS Feed   
Network Level Threats Reports
 
Carson Living Secures Rapidly Growing Cloud Environment
sponsored by Lacework
CASE STUDY: Due to the rapid growth in adoption (400% in the past year) of their AWS-hosted application, Carson Living was facing issues related to ensuring cloud compliance and maintaining security configurations. Download this white paper to see what led to their partnership with Lacework, as well as the results.
Posted: 08 Jul 2020 | Published: 08 Jul 2020

Lacework

Mistakes to Love: A Survey of Identity Mistakes
sponsored by Auth0
WHITE PAPER: For leading application development teams, there seems to be debate around buying vs building. The following report provides in-depth insights from a survey into the successes and failures of identity professionals across their identity projects – both bought and build. Read on to unlock the key findings.
Posted: 01 Jul 2020 | Published: 01 Jul 2020

Auth0

Workload Security: Visibility and Analysis for Cloud and Container Workloads
sponsored by Lacework
PRODUCT OVERVIEW: The modern cloud infrastructure requires a shift in the approach to workload security. Download this solution brief to learn more about Lacework’s automated approach to enabling visibility and analysis for cloud and container workloads.
Posted: 10 Jul 2020 | Published: 10 Jul 2020

Lacework

Nefilim Ransomware and Mitigating Attacks in the COVID-19 Era
sponsored by BlackBerry
RESOURCE: In Australia, organizations across every sector have been on the receiving end of increasingly frequent and complex malware and ransomware attacks. This article highlights one of the most prominent ransomware attacks, discusses cybersecurity in the COVID-19 era, and more. Read on to get started.
Posted: 30 Jun 2020 | Published: 15 Jun 2020

BlackBerry

SMB Cybersecurity: The Need for Better Protection
sponsored by Kaspersky Lab
EGUIDE: Small and medium-sized businesses (SMBs) are failing to keep their remote working employees adequately protected against the vast range of cyber threats they face, according to a study by Kaspersky. Access this e-guide to learn why many SMBs are turning to managed detection and response today.
Posted: 07 Jul 2020 | Published: 01 Jul 2020

Kaspersky Lab

The Australian Museum Takes on Cybersecurity
sponsored by BlackBerry
CASE STUDY: In this case study, follow the Australian Museum, keepers of a vast collection of sensitive historic and cultural information, as they partner with CylancePROTECT to implement a multi-layer approach to security that enables them to prevent malware attacks and secure their invaluable research data.
Posted: 29 Jun 2020 | Published: 29 Jun 2020

BlackBerry

From 30% to 100% Remote: How to Lead the Rapid Shift to a Remote Workforce
sponsored by Okta
WEBCAST: Connecting and communicating is critical for maintaining a semblance of normality, especially during times of crisis. Achieving this in the era of COVID-19, which saw the remote workforce jump from 30% to 100%, has been particularly challenging. Watch this webinar to see how IT and workplace technology experts at Okta handled this transition.
Posted: 07 Jul 2020 | Premiered: Jul 7, 2020

Okta

Itergy & Quest Live Webinar: IT Threats & Risks of the New Normal
sponsored by Itergy
VIDEO: After the initial changes in March, organizations are now adjusting to the ‘new normal’ – with nearly 100% of the workforce operating remotely. Organizations are now evaluating their current setup and ability to handle future changes. Watch this webinar to leverage the expertise of 2 industry leaders as they discuss these issues.
Posted: 10 Jul 2020 | Premiered: 16 Jun 2020

Itergy

Using Secure Email Gateway to enhance data security in Microsoft Office 365
sponsored by Clearswift
PRODUCT OVERVIEW: This solution brief examines the common areas of concern when it comes to securing Office 365 and explores how Clearswift’s SEG may be able to help organizations address these concern areas and ensure protection and visibility across their platform.
Posted: 10 Jul 2020 | Published: 10 Jul 2020

Clearswift

How to Get the Most Value out of Your Penetration Test
sponsored by RSA Conference
WEBCAST: At RSA Conference, Ed Skoudis from the SANS Institute facilitated a problem-solving discussion in the RSAC Engagement Zone. Jump into this webcast to see how he follows up on that discussion. He shares insights into what he learned from the community on getting the most value from penetration testing.
Posted: 07 Jul 2020 | Premiered: May 5, 2020

RSA Conference
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info