IT Management  >   Systems Operations  >   Security  >  

Security Breaches

RSS Feed   
Security Breaches Reports
 
Isolation: A Part of the Modern Security Architecture
sponsored by Menlo Security
WHITE PAPER: Cyberattacks are a worldwide threat, and every person, government, and organization connected to the Internet needs to be aware of it. Most attacks leverage the ubiquitous web for proliferation. In this white paper, learn how Menlo Security's multi-tenant platform can create a safe web environment.
Posted: 05 Apr 2019 | Published: 05 Apr 2019

Menlo Security

Introducing the Verizon Risk Report
sponsored by Verizon
RESEARCH CONTENT: This Verizon Risk Report uses daily threat cyber-risk intelligence from multiple sources allowing businesses to make data-driven security decisions and focus their security spending on where it will have the most impact.
Posted: 15 Apr 2019 | Published: 15 Apr 2019

Verizon

Cloud Visibility and Security for DevOps & SecOps Teams
sponsored by Ziften
WHITE PAPER: Moving a business-critical server or application to the cloud is not foolproof. System outages, data loss and more can, and do, occur due to misconfigurations, system failures, or security exploits. In this white paper, explore 6 common cloud visibility use cases encountered by DevOps and SecOps personnel on a regular basis.
Posted: 26 Mar 2019 | Published: 26 Mar 2019

Ziften

Security and Compliance Fears Keep Companies from Cloud Migration
sponsored by Ziften
RESOURCE: Migrating parts of your IT operations to the cloud can seem like a huge chore, and a dangerous one at that. There are a lot of security issues to deal with when migrating to the cloud. In this article, learn about how to keep your environment secure before, during and after a cloud migration.
Posted: 25 Mar 2019 | Published: 27 Feb 2019

Ziften

Modern Defense in Depth: An Integrated Approach to Better Web Application Security
sponsored by Oracle Dyn
WHITE PAPER: Cyberattacks are still successful. Breaches continue to occur. And each time we ask the same questions: why and how did this happen? Many businesses know the steps they're taking to protect ourselves are clearly inadequate. In this book, learn how an integrated, platform-based approach can help you achieve better web application security.
Posted: 22 Mar 2019 | Published: 21 Mar 2019

Oracle Dyn

Advanced Threat Prevention Appliance
sponsored by Juniper Networks
WHITE PAPER: Organizations worldwide face security and productivity challenges every day. Additionally, security teams often fail to recognize and act on critical incidents. In this white paper, learn how the Juniper Networks Advanced Threat Prevention Appliance can protect organizations from cyberattacks.
Posted: 17 Apr 2019 | Published: 31 Oct 2018

Juniper Networks

Advanced Authentication Technologies for Detecting Real-time Threats to Banks
sponsored by HID Global
WHITE PAPER: Any financial institution or business that offers online financial services is a top target for hackers. If customers connecting to banking applications are doing so via infected devices, the malware resident can collect sensitive information. In this white paper, learn how ActivID Threat Detection Services can help protect your sensitive data.
Posted: 12 Apr 2019 | Published: 25 May 2016

HID Global

SOAR-Native SOC
sponsored by D3 Security
WHITE PAPER: If you already have some detection tools and ad hoc processes, and are transforming those elements into a formal SOC, now is an optimal time to learn how to leverage a SOAR platform's capabilities. In this white paper, explore the benefits of implementing a SOAR platform into your SOC.
Posted: 01 Apr 2019 | Published: 01 Apr 2019

D3 Security

Security Information and Event Management (SIEM) Solutions
sponsored by Rapid7
WHITE PAPER: As the security landscape has evolved, SIEMs have evolved as well. However, many organizations struggle to deploy a new SIEM, achieve rapid success, and deliver a return on investment. In this white paper, learn how to evaluate SIEM platforms. Also, discover the top 3 capabilities every SIEM should provide.
Posted: 08 Apr 2019 | Published: 08 Apr 2019

Rapid7

What Worries Enterprise CISOs When Migrating to the Cloud
sponsored by Ziften
RESOURCE: Migrating to the cloud offers a number of advantages to enterprise organizations that CISOs really like, but there are real security issues that make switching over to a cloud environment worrisome. In this article, learn why it is essential to have security and visibility within your cloud environment.
Posted: 26 Mar 2019 | Published: 18 Feb 2019

Ziften
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement