IT Management  >   Systems Operations  >   Security  >  

Security Breaches

RSS Feed   
Security Breaches Reports
 
MicroScope – February 2021: The forecast on channel security
sponsored by MicroScope
EZINE: MicroScope asks experts to share their opinions on what lies ahead for the channel in the security market, along with their predicitions for what upcoming threats to expect. Also read about how the managed service community helped to keep SMEs afloat during Covid-19, and how to arm the business with the best IAM tools for remote working
Posted: 04 Feb 2021 | Published: 05 Feb 2021

MicroScope

Vitens Moves To Cloud Security With Bloxone™ Threat Defense From Infoblox
sponsored by Infoblox
CASE STUDY: Vitens is the largest drinking water utility in The Netherlands, delivering water to 5.6 million people. In an effort to strengthen security, Vitens set out to improve visibility into their network infrastructure and endpoints. Download this case study to see how Infoblox’s BloxOne Threat Defense gave Vitens oversight they needed to succeed.
Posted: 16 Feb 2021 | Published: 16 Feb 2021

Infoblox

SOLUTION BRIEF Advancing SOC Endpoint Incident Response Practices
sponsored by Malwarebytes
DATA SHEET: Learn how Malwarebytes Incident Response can help you combat sophisticated cyberthreats as well as avoid the damage a successful breach could inflict on your organization’s reputation.
Posted: 12 Mar 2021 | Published: 12 Mar 2021

Malwarebytes

Secure by Design Cloud Business Communications Apps & Infrastructure from NWN
sponsored by NWN Corporation
DATA SHEET: Integrated security is helping companies mitigate larger attack surfaces created by remote and hybrid work teams. Security postures are shifting from reactive to proactive, and one-size-fits-all approaches are falling by the wayside. View this solution brief to explore how to get a unified view of your entire cloud communications infrastructure.
Posted: 12 Feb 2021 | Published: 12 Feb 2021

NWN Corporation

BEST PRACTICES DNS: The First Principle Of Enterprise Security
sponsored by Infoblox
WHITE PAPER: For today’s WFH and soon-to-be-hybrid workforces, security teams must exploit DNS. As the foundation of enterprise networks, DNS can provide a layer of security intelligence otherwise not seen by security operations centers. Leverage this report to learn 5 critical questions organizations must ask of DNS security vendors.
Posted: 25 Feb 2021 | Published: 25 Feb 2021

Infoblox

Cyber Security: 2021 Worst in Show
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide: Throughout 2021, there has been a strong focus worldwide on how to combat cyber security attacks for most businesses. In this e-guide we take a look at the best of the worst of those attacks to happen throughout January to June this year and how businesses can learn/adapt from these attacks.
Posted: 09 Jun 2021 | Published: 09 Jun 2021

ComputerWeekly.com

A simple and effective security layer for digital communications
sponsored by Zivver
CASE STUDY: In this case study, follow the journey of Agency DNA, a business management consultancy, as they partner with Zivver to establish a simple and effective data protection program that addresses key challenges related to compliance, user experience, and more – read on to unlock the full story.
Posted: 27 Jan 2021 | Published: 27 Jan 2021

Zivver

The Complete Guide to Evaluating Attack Surface Management
sponsored by Randori
RESEARCH CONTENT: Attack surface management (ASM) is an emerging category of solutions which aims to help organizations understand and address risks related to the stark rise in remote devices connected to the internet – read this SANS report to learn more about the ASM market.
Posted: 16 Feb 2021 | Published: 31 Oct 2020

Randori

Secure processing of personal data in the healthcare sector; making staff aware of the importance of privacy
sponsored by Zivver
EGUIDE: Data protection and compliance starts with streamlining internal processes, especially in the healthcare sector. This helpful e-guide provides a comprehensive set of the considerations and insights healthcare organizations (of any size) should make in order to create awareness for the secure processing of personal data – read on to get started.
Posted: 27 Jan 2021 | Published: 27 Jan 2021

Zivver

Advanced Threat Detection, Focused Investigation And Effective Response
sponsored by Bitdefender
DATA SHEET: Traditional endpoint security efforts are growing less and less capable of preventing today’s sophisticated cyberthreats – increasing the need for advanced threat detection, investigated and response capabilities, typically in the form of Endpoint Detection and Response (EDR). Read this datasheet to see what Bitdefender offers in terms of EDR.
Posted: 10 Feb 2021 | Published: 10 Feb 2021

Bitdefender
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences