Standards  >  

P3P

RSS Feed   
P3P Reports
 
API Security & the OWASP API Top 10
sponsored by Traceable
VIDEO: The OWASP API Top 10 project set out with a clear goal – to identify and provide insight into the most detrimental API vulnerabilities that exist across today’s organizations. Watch this episode of The API Security & the OWASP API Top 10 webinar series for a deep dive into 4 of the 10 critical API threats.
Posted: 17 Feb 2021 | Premiered: 03 Jan 2021

Traceable

5 Types of Insider Threats and How to Detect Them in Your ERP System
sponsored by Appsian
RESOURCE: Although insider threats are the leading cause of the majority (57%) of data breaches, organizations often overlook these threats and focus their efforts on defending against external attacks. Read this blog post and discover the 5 most common insider threats and how to detect them in your ERP system.
Posted: 06 Jan 2021 | Published: 06 Jan 2021

Appsian

A Guide for Community Banks: Democratizing Machine Learning
sponsored by Feedzai
EGUIDE: Even pre-pandemic, customers were demanding that their financial institutions offered digital banking capabilities. The spread of COVID-19 accelerated this, and digital banking is a competitive necessity. In this e-guide, discover how COVID-19 has impacted the banking industry, including how it’s shaping the future of fraud.
Posted: 11 Feb 2021 | Published: 11 Feb 2021

Feedzai

5 Questions To Ask Your Security Platform Vendor
sponsored by Cisco
DATA SHEET: The market for security platforms has become oversaturated with a wide array of vendors. This can make it a difficult process for organizations evaluating their options. To help get your started, this datasheet offers 5 key questions your organization should be asking potential security platform vendors – read on to get started.
Posted: 01 Feb 2021 | Published: 01 Feb 2021

Cisco

High-Velocity Cloud Security at Scale
sponsored by BreakFree Solutions
WHITE PAPER: The key to realizing the full benefits of a cloud migration lies in striking a balance between transformative cloud capabilities and effective cloud security. Read this insight report to learn about BreakFree’s cloud security framework and discover how to implement it with JupiterOne.
Posted: 11 Feb 2021 | Published: 11 Feb 2021

BreakFree Solutions

The 2021 State Of Open Source Vulnerabilities
sponsored by Fossa
RESEARCH CONTENT: Open source has become increasingly popular – but as its usage grows, so too do its vulnerabilities. This research report provides a comprehensive look into today’s open source vulnerability landscape, highlighting current trends, long-term developments and best practices – read on to unlock the full report.
Posted: 12 Feb 2021 | Published: 12 Feb 2021

Fossa

Unboxing CSPM As The Answer To IaaS Security Risks
sponsored by Horangi
RESOURCE: From lack of controls and misconfiguration to cloud sprawl, there are several cybersecurity risks facing organizations migrating to the cloud. Cloud Security Posture Management (CSPM) tools can help, but it may not be ideal for your organization. Read this article to learn about cloud risks, the benefits of CSPMs and who should use them.
Posted: 03 Feb 2021 | Published: 03 Feb 2021

Horangi

Enable & Secure Your Remote Workforce
sponsored by BeyondTrust Corporation
EGUIDE: IT departments have faced incredible challenges this year trying to maintain productivity for an expanded remote workforce. However, these challenges didn’t disappear with the start of 2021, your remote workers need to be able to operate efficiently and securely. Read this e-guide for a comprehensive overview of the pillars of remote work.
Posted: 12 Feb 2021 | Published: 12 Feb 2021

BeyondTrust Corporation

Preventative vs. Reactionary: Early Risk Detection for Account Takeover Mitigation
sponsored by Feedzai
EGUIDE: Account takeover fraud (ATO) has increased steadily over the past 5 years or so, and traditional reactionary approaches to risk detection are no longer viable. This how-to guide offers helpful advice for organizations interested in implementing preventative security measures to combat ATO – read on to unlock the exclusive insight.
Posted: 10 Feb 2021 | Published: 10 Feb 2021

Feedzai

The Fidelis Threat Intelligence Toolkit is Here
sponsored by Fidelis
RESOURCE: Organizations are struggling to keep up with threat actors as they engage different vectors and develop their toolkit of attacks. It seems only fair, then, that you have a toolkit of your own. Click here to access your Fidelis Threat Intelligence Toolkit. Leverage the latest cybersecurity news and know what’s on the prowl and how to defend.
Posted: 21 Jan 2021 | Published: 21 Jan 2021

Fidelis
 
Browse by Report Type:
P3P White Papers | P3P Multimedia | P3P IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences