IT Management  >   Systems Operations  >   Security  >  

Security Breaches

RSS Feed   
Security Breaches Reports
 
Application Shielding with Intertrust whiteCriterion Code Protection
sponsored by Intertrust
WHITE PAPER: Traditional parameter security measures lack the flexibility needed to meet mobile and IoT security risks. This white paper goes in-depth into the specific security challenges hackers are using to expose application vulnerabilities and defines the tactics and tools that can be implemented to mitigate these risks.
Posted: 17 Dec 2019 | Published: 31 Aug 2018

Intertrust

Reverse Engineering Still a Serious Problem in 2019
sponsored by Intertrust
WEBCAST: While mobile applications and interconnected devices offer unmatched convenience, they also expose organizations and consumers to cybersecurity risks. This webinar breaks down common mobile application security threats and highlights real-life reverse engineering examples.
Posted: 12 Dec 2019 | Premiered: Nov 8, 2019

Intertrust

Innovation in retail: Using cybersecurity as a competitive advantage
sponsored by Capgemini
RESOURCE: While cybersecurity measures enable retail organizations to identify and mitigate potential threats, it’s important to consider that data protection can be considered a competitive advantage. In this blog post, explore the importance of security for retail consumers, how GDPR is shaping the industry, and the role of SOCs in quantifying risks.
Posted: 19 Dec 2019 | Published: 13 May 2019

Capgemini

A guide to SIEM platforms, benefits and features
sponsored by SearchSecurity.com
EZINE: SIEM systems enable organizations to centralize indecent response, detection and handling, as well as data logging for compliance. This e-guide is a collection of resources highlighting SIEM benefits, criteria and tools. Read on to evaluate which SIEM system is right for you.
Posted: 09 Jan 2020 | Published: 09 Jan 2020

SearchSecurity.com

Datrium Ransomware Protection
sponsored by Datrium
WHITE PAPER: A recent study found that 1 in 2 companies have suffered a disaster recovery event in the past 2 years. Businesses can no longer ignore the possibility of attack and should proactively prepare. In this white paper, Datrium highlights the categories of ransomware attacks and how to defend against them. Read on to learn more.
Posted: 17 Jan 2020 | Published: 17 Jan 2020

Datrium

Intelligent Security Starts at the Edge
sponsored by Akamai Technologies
DATA SHEET: In Gartner’s most recent Magic Quadrant installment for Web Application Firewalls (WAF), they named Akamai a Leader for the third year in a row. This white paper provides an overview of the benefits of WAF, and highlights Akamai’s approach to WAF. Read on to get started.
Posted: 23 Dec 2019 | Published: 23 Dec 2019

Akamai Technologies

Beginner’s Guide to AWS Security Monitoring
sponsored by AT&T Cybersecurity
WHITE PAPER: In the Beginner’s Guide to AWS Security Monitoring, learn what the 3 biggest security concerns are and how you can get started with AWS security best practices.
Posted: 03 Jan 2020 | Published: 03 Jan 2020

AT&T Cybersecurity

Protecting Healthcare Software
sponsored by Intertrust
WHITE PAPER: For decades medical devices have been standalone instruments that interacted only with the patient or medical provider. In this white paper, learn about the shift to smart technologies and how to safeguard patient data and healthcare applications.
Posted: 17 Dec 2019 | Published: 17 Dec 2019

Intertrust

The State of Security Segmentation
sponsored by Illumio
WHITE PAPER: As cyberattacks grow increasingly common, it’s critical to look at how criminals operate in order to prevent damage. Read on to uncover the research findings of a recent study designed to shed light on the current state of security segmentation, and why it’s preferable compared to traditional firewalls.
Posted: 07 Jan 2020 | Published: 07 Jan 2020

Illumio

How to Safeguard Against Cross-Site Scripting (XSS) Attacks
sponsored by Tala Security
WHITE PAPER: Cross-site scripting (XSS) attacks are a rising concern for all industries and will continue to be a favored strategy for cybercriminals. With a proactive and strategic approach, your organization can ensure web application security. Read on to learn more.
Posted: 17 Jan 2020 | Published: 17 Jan 2020

Tala Security
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info