IT Management  >   Systems Operations  >   Security  >  

Security Breaches

RSS Feed   
Security Breaches Reports
 
Overcome Alert Fatigue with Actionable Threat Intelligence
sponsored by Bitdefender
WEBCAST: Organizations want to defend from threats, but because of the sensory overload caused by constant alerts, IT departments are suffering from alert fatigue. Fortunately, threat intelligence can use data to alleviate this issue. Watch this webcast to learn more.
Posted: 28 Jul 2020 | Premiered: Jul 28, 2020

Bitdefender

How to Secure Operational Technology
sponsored by Fortinet, Inc.
RESOURCE: The consequences of a successful intrusion into operational technology (OT) are serious. In businesses that rely on operational and industrial production systems, the chief information security officer (CISO) must ensure that security teams have the right architectural defenses in place. Read this checklist for 7 considerations for securing OT.
Posted: 07 Aug 2020 | Published: 05 May 2020

Fortinet, Inc.

Phishing Factories Exploit Trust to Attack Businesses
sponsored by Akamai Technologies
RESOURCE: As if it wasn’t enough to worry about attacks from independent threat actors, there is now an emerging underground economy of phishing ‘factories’ using more sophisticated social engineering tactics to gain trust among victims. Is your organization prepared? Read this article to discover alarming trends about phishing and how to increase awareness.
Posted: 04 Aug 2020 | Published: 04 Aug 2020

Akamai Technologies

Combating Threats with the DDoS Defenders at Tata
sponsored by TATA Communications
VIDEO: In August 2019, one of Tata Communications’ customers was targeted by a 2-wave DDoS attack campaign of unprecedented scale. This video provides an overview of the tactics and methods used by the attacker and highlights how Tata’s analysts were able to identity and isolate the threat.
Posted: 31 Jul 2020 | Premiered: 31 Jul 2020

TATA Communications

SailPoint Predictive Identity
sponsored by SailPoint Technologies
PRODUCT OVERVIEW: AI and machine learning capabilities enable unmatched efficiency and automation across cybersecurity tools and tactics. Download this report for an in-depth look at Predictive Identity, SailPoint’s identity governance SaaS platform that harnesses the power of AI to assess risk and offer recommendations.
Posted: 03 Aug 2020 | Published: 30 Apr 2020

SailPoint Technologies

Security That Works Wherever You Go: Empower Your Workers to Safely Stay Productive
sponsored by Lookout
DATA SHEET: IT security professionals have never had their hands fuller than during ‘the new normal’. Cybercriminals see the many hundreds of thousands (if not millions) of remote workers as a breaching buffet, and as a result, organizations need to secure their workforces ASAP. View this brochure to find out how you can keep employees secure wherever they go.
Posted: 24 Jul 2020 | Published: 24 Jul 2020

Lookout

Lockdown Lessons: Closing Security Gaps
sponsored by Webroot
WHITE PAPER: It’s known that keys to security include finding the best technology and putting protocols in place to keep intruders out and employees vigilant. But simple processes such as updating systems, installing patches and disabling unnecessary services can also go a long way. Read this white paper to learn more about gaps to close in your network.
Posted: 29 Jul 2020 | Published: 29 Jul 2020

Webroot

Empowering Business Innovation: Ricoh USA, Inc. Partners for Success
sponsored by Dell SecureWorks
CASE STUDY: In this case study, discover how Ricoh, in collaboration with Secureworks, implemented, monitored and managed end-to-end security services in order to support their digital transformation initiatives and growing network complexity.
Posted: 07 Aug 2020 | Published: 07 Aug 2020

Dell SecureWorks

How to Manage Access Control with Zero Trust
sponsored by AT&T Cybersecurity
WEBCAST: Listen in on this conversation with the AT&T Chief Security Office (CSO) on their current point of view on how to manage access control using ZT principals, including best practices.
Posted: 29 Jul 2020 | Premiered: Jul 29, 2020

AT&T Cybersecurity

TikTok Case Study
sponsored by Lookout
WHITE PAPER: Social media companies have been known to breach privacy laws regarding user data, and TikTok, a video sharing app, may be the latest culprit. US, Chinese and Russian governments are all of the belief that TikTok is covertly being used to collect user data, and organizations are digging to find answers. Open this white paper to learn more.
Posted: 24 Jul 2020 | Published: 24 Jul 2020

Lookout
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info