IT Management  >   Systems Operations  >   Security  >  

Security Breaches

RSS Feed   
Security Breaches Reports
 
Security Maturity: Mapping the Road to Resilience
sponsored by Dell SecureWorks
WHITE PAPER: Download this e-book for a deep dive into risk and cybersecurity actions all organizations should consider as they think through their security strategy.
Posted: 08 Feb 2019 | Published: 08 Feb 2019

TOPICS: 
Dell SecureWorks

Threat Intelligence Executive Report
sponsored by Dell SecureWorks
RESEARCH CONTENT: In the last year, the number of sophisticated attacks has increased and threat actors have demonstrated greater adaptability. However, implementing security best practices could limit the impact of many intrusions. In this research report, learn about key developments in the cybercrime threat landscape.
Posted: 04 Feb 2019 | Published: 31 Dec 2018

TOPICS: 
Dell SecureWorks

Endpoint Security Buyer's Guide: Protect, Detect, Respond
sponsored by Tanium
WHITE PAPER: Today, virtually every organization connected to the Internet is attacked at its endpoints, and the most significant cybersecurity attacks involve at least one compromised endpoint. In this white paper, learn about the 4 main areas of endpoint security, why they are important and the essential capabilities of each.
Posted: 30 Jan 2019 | Published: 30 Jan 2019

TOPICS: 
Tanium

An Overview of Endpoint Detection & Response (EDR)
sponsored by Trend Micro, Inc.
WEBCAST: ESG Senior Principal Analyst Jon Oltsik discusses an overview of Endpoint Detection & Response (EDR) in the market, including trends, challenges, and how automation can help.
Posted: 06 Feb 2019 | Premiered: Mar 23, 2018

TOPICS: 
Trend Micro, Inc.

Your App Security Stack: How to Defend Against the Evolving Threat
sponsored by Arxan
WEBCAST: In this webcast, Ken Jochims from Arxan sits down with Forrester Research Principal Analyst, Amy DeMartine, to talk about app security and the evolving threat landscape in 2019.
Posted: 15 Feb 2019 | Premiered: Feb 15, 2019

TOPICS: 
Arxan

Securing Innovation
sponsored by Micro Focus
WHITE PAPER: Businesses must adopt new technologies, innovate with new products, and find new partners to expand their business. But, all of these activities increase security risk. If these risks are not addressed, they can cause damage to the company. In this white paper, learn how Micro Focus security tools can help secure your data.
Posted: 05 Feb 2019 | Published: 31 Jul 2018

TOPICS: 
Micro Focus

Aflac Adopts Splunk Platform for Analytics-Driven Security
sponsored by Splunk Services UK Ltd
CASE STUDY: Aflac is the leading provider of voluntary insurance in the U.S. Facing an increase in the volume and velocity of security threats, Aflac needed a new analytics-driven security approach. In this case study, learn about the benefits Aflac has seen since deploying Splunk Enterprise Security and Splunk User Behavior Analytics.
Posted: 13 Feb 2019 | Published: 13 Feb 2019

TOPICS: 
Splunk Services UK Ltd

Neustar UltraDNS Customer Success Stories
sponsored by Neustar
CASE STUDY: Neustar UltraDNS delivers performance and security for thousands of enterprises. They enjoy fast, accurate responses and few dropped queries, along with protection from DDoS attacks and other cyber threats. In this case study, discover how Neustar UltraDNS has helped a number of companies improve their DNS performance.
Posted: 14 Feb 2019 | Published: 20 Oct 2017

TOPICS: 
Neustar

Context-Aware Security Provides Next-Generation Protection
sponsored by Citrix
RESOURCE: Cybersecurity is among the most important board-level issues for nearly every organization. In this article, learn more about next-generation security strategies. These strategies are driven by personalized cyberdefenses based on what each user typically does and what information and application each user regularly works with.
Posted: 06 Feb 2019 | Published: 06 Feb 2019

TOPICS: 
Citrix

Detection and Response: Discover and respond to targeted attacks with advanced detection techniques
sponsored by Trend Micro, Inc.
RESOURCE: Advanced threats are designed to bypass cybersecurity defences and compromise sensitive data. Effective detection and response solutions seek out these threats and eliminate them. In this resource, learn how Trend Micro has layered detection and response techniques into its Endpoint Protection Platform to leverage its response capabilities.
Posted: 07 Feb 2019 | Published: 07 Feb 2019

TOPICS: 
Trend Micro, Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement