IT Management  >   Systems Operations  >   Security  >   Security Management  >  

SIEM

RSS Feed   
SIEM Reports
 
Securing Your Remote Workforce from Cyberattacks
sponsored by Cox Communications, Inc.
VIDEO: Now more than ever, remote workforces need to be protected in order to ensure organizations stay productive. But as cybercriminals increase the tempo and severity of their attacks, what can organizations do to better protect themselves? Watch this webinar for exclusive insight into protecting remote workers.
Posted: 08 Oct 2020 | Premiered: 08 Oct 2020

Cox Communications, Inc.

How Much is Too Much Cybersecurity Noise?
sponsored by Dell SecureWorks
WHITE PAPER: For security professionals, cybersecurity alert volume has gotten to the point where it’s almost too noisy to sift through – creating significant security challenges. So, what can security teams do to make sense of the noise? Read this white paper to find out.
Posted: 19 Oct 2020 | Published: 19 Oct 2020

Dell SecureWorks

Unified Endpoint Management (UEM)
sponsored by BlackBerry
EBOOK: Today’s endpoints are widely distributed, unique and, most of all, vulnerable. The evolution of the endpoint requires an evolution in endpoint management to match, and that’s where Unified Endpoint Management (UEM) comes in. Dive into this e-book and learn 5 reasons why you should take a closer look at UEM, as well as its ties to zero trust.
Posted: 09 Oct 2020 | Published: 09 Oct 2020

BlackBerry

Preparing to Implement and Maintain a Zero Trust Security Strategy - Webcast and Demonstration
sponsored by Ionic Security
WEBCAST: The implementation and maintenance of a Zero Trust strategy requires meticulous preparation in order to ensure that users, devices, applications and networks are all protected. Watch this webinar and demo, which follows the story of an organization who sought to focus their Zero Trust efforts on protecting employee PII.
Posted: 07 Oct 2020 | Premiered: Oct 7, 2020

Ionic Security

Keeping Tabs on a Constantly Evolving Threat Landscape
sponsored by Dell SecureWorks
WHITE PAPER: Criminal threat actors aren’t just developing their tactics and techniques – they’re updating their ‘business’ strategies, too. Cybercriminal operators are adopting strategies often seen in the legitimate business world to increase return on investment (ROI) and operational efficiency. Jump into this white paper to learn more.
Posted: 20 Oct 2020 | Published: 20 Oct 2020

Dell SecureWorks

Leverage the power of Rapid7 and AWS integrated threat protection and response solution
sponsored by AWS Rapid7
VIDEO: Cloud environments are growing at such a rapid pace that traditional SIEM tools often lack the visibility to identify and mitigate threats – leading to an overworked security staff. This webinar discusses how the integration of Rapid7 InsightIDR and Amazon GuardDuty can improve visibility (and morale) for organizations with AWS environments.
Posted: 01 Oct 2020 | Premiered: 01 Oct 2020

AWS Rapid7

Hidden Text and Zero Font Attacks
sponsored by Inky Technology
RESOURCE: You may have heard that some phishing emails use something called zero font — text hidden in an email by various means. It is a brand forgery email intended to harvest login credentials. But what exactly is this technique, and why do attackers use it? Read this document to learn both the why and the how of hidden text and zero font.
Posted: 07 Oct 2020 | Published: 07 Oct 2020

Inky Technology

BlackBerry Helps ONGC Systems Achieve Significant Endpoint Security ROI
sponsored by BlackBerry
CASE STUDY: For ONGC Systems, who oversees IT management and security for more than 64,000 SMBs in Queensland, Australia, finding an endpoint security tool that would meet the security, visibility and budgetary needs was a daunting task. Read this case study to discover how ONGC partnered with BlackBerry to meet ROI needs.
Posted: 06 Oct 2020 | Published: 06 Oct 2020

BlackBerry

Responding to Public Sector Cybersecurity Threats: Views of Public Sector Professionals and Where-to From Here
sponsored by BlackBerry
WHITE PAPER: If you’re working in the public sector in Australia, look at this in-depth report about the state of cybersecurity on the continent, presented by Blackberry. It details key findings, presents critical themes for a rock-solid cybersecurity strategy and outlines the ‘Essential Eight’ Maturity Model for security technology.
Posted: 16 Oct 2020 | Published: 16 Oct 2020

BlackBerry

The Clock is Always Ticking: 24/7 Cybersecurity Monitoring Takes its Toll
sponsored by Dell SecureWorks
WHITE PAPER: 65% of Security Operations Center (SOC) professionals say stress has caused them to think about quitting. Needless to say, security is stressful, but relief is possible. Read this white paper to explore the issue of increasing demands on security practitioners and to explore several avenues for automating and reducing workloads for team members.
Posted: 20 Oct 2020 | Published: 20 Oct 2020

Dell SecureWorks
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info