IT Management  >   Systems Operations  >   Security  >  

Network Level Threats

RSS Feed   
Network Level Threats Reports
 
Machine Learning Applications for Banking Fraud Detection
sponsored by Dataiku
EGUIDE: AI-based systems can augment regulatory alert systems and improve analysts’ workflow by reducing noise without discarding results. Access this paper to view the 3 types of anomalies to look out for, understand examples of how banks use fraud and anomaly detection, and learn how to build a basic, machine learning-based fraud detection system.
Posted: 14 Jan 2020 | Published: 14 Jan 2020

Dataiku

How Does Security Innovation Power Digital Transformation?
sponsored by ZeroNorth
WHITE PAPER: Digital transformation defined by its seeming-endless search for technological innovation. Unfortunately, security can sometimes be an afterthought for companies looking to stay ahead of the competition. In this white paper, discover how security innovation can augment digital transformation.
Posted: 24 Jan 2020 | Published: 31 Oct 2019

ZeroNorth

Javascript vs Javascript: Performance Penalty of Api Hooking
sponsored by Tala Security
WHITE PAPER: While it’s intuitive that defending your code is an important practice, there are times when that defense comes at a high cost.In this white paper, get an overview of the performance penalties associated with hooking browser JavaScript APIs to defend against JavaScript based threats.
Posted: 14 Jan 2020 | Published: 14 Jan 2020

Tala Security

Making MITRE ATT&CK Actionable
sponsored by ThreatQuotient
WEBCAST: In this webinar, join technical experts at ThreatQuotient as they outline merging MITRE ATT&CK with SIEM visibility and threat intelligence in the ThreatQ platform to unify threat detection efforts. Interested in seeing how this platform works? Watch the webinar to learn more.
Posted: 23 Jan 2020 | Premiered: Jan 23, 2020

ThreatQuotient

How to Conquer Phishing? Beat the Clock
sponsored by Ironscales
WHITE PAPER: Reducing the risk of phishing attacks is a race against time – defenders must respond before their own users are to open emails and click on malicious links. In fact, Aberdeen’s research show that defenders have a median of 134 seconds to respond. Continue to uncover the remaining key data points related to this phishing attacks research.
Posted: 13 Jan 2020 | Published: 30 Sep 2018

Ironscales

Under the Hoodie 2019
sponsored by Rapid7
RESOURCE: Due to the sensitive nature of its findings, penetration testing is a relatively unknown, yet critical, piece of the information security puzzle. This study by Rapid7 was an effort to demystify what goes on in a typical pen test by examining 180 engagements to break down what clients and practitioners should expect to see.
Posted: 09 Jan 2020 | Published: 09 Jan 2020

Rapid7

Why Your Business Needs to Implement Web Security Standards
sponsored by Tala Security
WHITE PAPER: With web-based attacks on e-commerce growing in volume and complexity, businesses need to fine-tune their website security tactics to avoid a major breach. This white paper highlights the current website security landscape and provides best-practices for future-proofing your business.
Posted: 14 Jan 2020 | Published: 14 Jan 2020

Tala Security

Catching Modern Threats: InsightIDR Detection Methodologies
sponsored by Rapid7
PRODUCT OVERVIEW: Modern threat detection is a 2-pronged approach: to protect an organization against loss, an IT security team needs to be able to detect the 2 types of threats (common and targeted), and deal with them accordingly. This solution guide highlights the key benefits and features of InsightIDR’s cloud SIEM for modern threat detection.
Posted: 07 Jan 2020 | Published: 07 Jan 2020

Rapid7

AlienVault USM vs SIEM
sponsored by AT&T Cybersecurity
RESOURCE: Like any other security program, SIEM was helpful at detecting threats for a time. When new compliance regulations began requiring data records, SIEM became unable to handle the increased volume. This white paper highlights the shortcomings of SIEM and explores AlienVault’s Unified Security Management (USM) platform. Read on to learn more.
Posted: 07 Jan 2020 | Published: 07 Jan 2020

AT&T Cybersecurity

CISO’s Playbook to Cloud Security
sponsored by Lacework
WHITE PAPER: As organizations continue to implement cloud technologies and capabilities, they introduce additional security concerns that the CISO needs to consider. In this playbook, uncover the steps and strategies IT security leaders should consider in order to achieve these positive outcomes.
Posted: 27 Dec 2019 | Published: 27 Dec 2019

Lacework
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info