IT Management  >   Systems Operations  >   Security  >  

Security Breaches

RSS Feed   
Security Breaches Reports
 
Tanium: Unified Cloud Visibility & Control
sponsored by Tanium
PRODUCT OVERVIEW: In this brief, find 7 best practices shared by organizations that have been successful in securely migrating to the cloud. Also, learn how Tanium can help you accelerate cloud migration strategies with low risk.
Posted: 20 Nov 2019 | Published: 20 Nov 2019

Tanium

Why is Third-party Risk Management Essential to Cybersecurity?
sponsored by ServiceNow
EGUIDE: With organizations increasing their reliance on third-party service providers, developing a security strategy that extends beyond their immediate network perimeter is essential to a strong defense. In this e-guide, learn the basics of third-party risk management and what organizations can do meet these challenges.
Posted: 21 Nov 2019 | Published: 15 Nov 2019

ServiceNow

Your Firewalls Are Dirtier Than You Think
sponsored by FireMon
DATA SHEET: Outdated firewall practices can leave vulnerabilities within your organizations network. These gaps can lead to security risks and underperformance. This infographic highlights the 4 steps for improving your firewall cleanup process. Read on to learn more.
Posted: 25 Nov 2019 | Published: 25 Nov 2019

FireMon

Blueprint for PCI Compliance with Network Detective
sponsored by RapidFire
WHITE PAPER: The most common misconception is that PCI compliance means only having to pass a certified external vulnerability scan, when, in reality, there are 12 major segments an organization must address. This white paper provides a blueprint so MSPs can help ensure their clients achieve, and retain, compliance on a continual basis.
Posted: 02 Dec 2019 | Published: 31 Dec 2017

RapidFire

Ransomware: To Pay or Not to Pay?
sponsored by SentinelOne
WHITE PAPER: In the event of a ransomware attack, how does your organization decide what to do? This white paper addresses some of the top concerns organizations face and the immediate steps to take when dealing with a ransomware attack.
Posted: 22 Nov 2019 | Published: 22 Nov 2019

SentinelOne

DevSecOps and the Problem of Machine-Scale Data
sponsored by Ionic Security
RESOURCE: The amount of data being created daily is growing exponentially, and manual processes can’t scale. With data growth comes increasing complexity and higher importance for security to be integrated into the SDLC. Discover the opportunities and threats of machine-scale data, how to maintain agility, and the implications this has for DevSecOps.
Posted: 01 Nov 2019 | Published: 08 Oct 2019

Ionic Security

Securing Your SWIFT Environment Using Micro-Segmentation
sponsored by Illumio
WHITE PAPER: All SWIFT customers must self-attest to their compliance with the SWIFT Customer Security Program (CSP). The program is designed to respond to the wave of cybercrime targeting SWIFT installations. In this white paper, explore 3 challenges that prove especially difficult for SWIFT customers looking to achieve compliance.
Posted: 25 Oct 2019 | Published: 25 Oct 2019

Illumio

KuppingerCole Report Leadership Compass Database and Big Data Security
sponsored by IBM
ANALYST REPORT: This Leadership Compass from analyst firm KuppingerCole provides an overview of the market for database and big data security solutions along with guidance and recommendations for finding the sensitive data protection products that best meet client’s requirements.
Posted: 24 Oct 2019 | Published: 30 Jun 2019

IBM

Building a Strong and Effective Incident Response Plan
sponsored by ServiceNow
EGUIDE: Literally every business -- both large and small and across every industry -- is a target for criminal hackers and careless employees alike. The question is: What are you doing about it? This is where incident response comes into play. In this e-guide, learn how to create an effective incident response plan.
Posted: 28 Oct 2019 | Published: 23 Oct 2019

ServiceNow

Rethinking Enterprise Data Defense
sponsored by FireMon
EBOOK: Despite heavy investment of time and resources, the number of cybersecurity breaches and incidents continues to increase each year. In this e-book discover how to rethink your enterprise security strategy and explore proactive defense tactics.
Posted: 27 Nov 2019 | Published: 27 Nov 2019

FireMon
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement