IT Management  >   Systems Operations  >   Security  >  

Security Breaches

RSS Feed   
Security Breaches Reports
 
10 Myths in Selecting a Web Application Firewall
sponsored by Akamai
WHITE PAPER: Securing your web applications can be a daunting task. However, a web application firewall (WAF) can help keep threats at bay while preserving application performance. The challenge is choosing the right WAF. This white paper dispels 10 WAF myths that will help you evaluate what matter most when choosing a WAF.
Posted: 09 Jul 2019 | Published: 30 Apr 2019

Akamai

Acalvio Deception and the MITRE ATT&CK Framework
sponsored by Acalvio
WHITE PAPER: The Cyber Kill Chain has long been used to describe the stages of an attack commonly used to compromise sensitive assets. Unfortunately, too much emphasis has been placed on the initial exploitation stages, and not enough on the later stages. To overcome this problem, MITRE has developed ATT&CK. Read on to learn about the framework today.
Posted: 26 Jun 2019 | Published: 26 Jun 2019

Acalvio

Reduce your attack surface using Guardicore Centra Security Platform
sponsored by Guardicore
WHITE PAPER: Enterprise IT infrastructure is evolving to cloud and hybrid cloud architectures. Although this transformation is helping many organizations, it is also creating a larger security attack surface. In this data sheet, learn how Guardicore Centra Security Platform can help organizations apply micro-segmentation controls to reduce their attack surface.
Posted: 18 Jun 2019 | Published: 18 Jun 2019

Guardicore

Top 10 Reasons Customers Choose Proofpoint to Protect Office 365
sponsored by Proofpoint
RESOURCE: For organizations migrating to the cloud, Microsoft Office 365 is a whole new way of working—one that requires a whole new approach to security and compliance. Download this infographic for the top 10 reasons why customers choose Proofpoint to protect Office 365.
Posted: 28 Jun 2019 | Published: 28 Jun 2019

Proofpoint

Spear Phishing Attacks: The #1 Cyberthreat
sponsored by Inky Technology
RESOURCE: Spear phishing is the most popular email fraud and scam method used today. In this blog, learn how a spear phishing attack works and how organizations can prevent it.
Posted: 26 Jun 2019 | Published: 26 Jun 2019

Inky Technology

What Makes a Standalone IPS so Effective?
sponsored by Trend Micro, Inc.
WHITE PAPER: In this white paper, explore the guiding principles security researchers need to follow when designing and developing effective vulnerability filters, with examples of how these filters can be used by an IPS to detect and block the latest threats.
Posted: 11 Jul 2019 | Published: 01 Mar 2019

Trend Micro, Inc.

Webcast: 5 Steps to Selecting an Enterprise Antivirus Replacement
sponsored by Ziften
WEBCAST: 38% of enterprises plan to replace their AV in the next 12 months, according to The State of Endpoint Security Risk, Ponemon Institute study. However, researching and finding an endpoint security solution can be overwhelming. In this webcast, explore 5 steps to help you select an enterprise antivirus replacement.
Posted: 17 Jun 2019 | Premiered: Jun 17, 2019

Ziften

Email Security Risk Assessment
sponsored by Mimecast
WHITE PAPER: Many organizations think their current email security systems are up to the task of protecting them from phishing. Unfortunately, many of them fall short and don't keep their organizations safe. In this report, uncover research from Mimecast's study on the amount of unwanted and dangerous emails missed by incumbent email security systems.
Posted: 25 Jun 2019 | Published: 25 Jun 2019

Mimecast

5 Signs of Malicious Activity Your Organization May Be Overlooking
sponsored by Farsight Security
RESOURCE: If given even the smallest window of opportunity, cybercriminals will exploit any Internet service or infrastructure to support their campaigns. Security and IT admins play critical roles in monitoring networks for indicators of malicious activity. In this infographic, explore 5 signs of malicious activity your organization may be overlooking.
Posted: 08 Jul 2019 | Published: 08 Jul 2019

Farsight Security

Anybody Home? Vulnerability Scans vs. Penetration Tests
sponsored by SkOUT
WHITE PAPER: This white paper defines, and digs into the differences between, vulnerability scans and penetration testing so you can apply them as needed and properly defend against known threats.
Posted: 25 Jun 2019 | Published: 25 Jun 2019

SkOUT
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement