Vertical Industries  >  

Security Equipment Industry

RSS Feed   
Security Equipment Industry Reports
 
6 Steps To Overcoming Pci Dss Compliance Challenges In Multi - Cloud And Hybrid Environments
sponsored by Alert Logic
EBOOK: In Verizon’s Payment Security Report, 63.3% of the organizations assessed did not maintain all PCI DSS controls. And this is not due to a lack of security tools – rather, organizations are missing PCI expertise, or the dedicated staff required to keep pace. Access this e-book to unlock 6 steps to overcoming PCI compliance challenges.
Posted: 17 Feb 2021 | Published: 17 Feb 2021

Alert Logic

Marrying Threshold Cryptography with Encryption Keys: Why?
sponsored by Atakama
RESOURCE: Threshold cryptography – often referred to as ‘secret sharing’ – is a mechanism for sharing information among a group of participants. It’s not very well-known, but it can offer tremendous benefits within an existing cybersecurity stack. In this article, explore threshold cryptography and its relationship to encryption keys.
Posted: 08 Dec 2020 | Published: 09 Jun 2020

Atakama

Fidelis Extended Detection and Response (XDR)
sponsored by Fidelis
VIDEO: Security teams are responsible for more threats than ever before. As a result, security stacks are bloated, and analysts overloaded. What can security teams do to overcome this overload and get back to mounting coordinated responses? Take two minutes to watch this short video and exhibiting Fidelis’ Extended Detection & Response.
Posted: 15 Jan 2021 | Premiered: 15 Jan 2021

Fidelis

API Security & the OWASP API Top 10 (BOLA/IDOR) - 1 of 4
sponsored by Traceable
WEBCAST: Bad actors have moved beyond attacking just applications – they’re attacking APIs, too. But what makes APIs prime targets? How has app security changed? Why is there a need for a new OWASP project for APIs? Access this webcast to answer these questions and to cover Broken Object Level Authentication (BOLA), the most critical API vulnerability.
Posted: 17 Feb 2021 | Premiered: May 20, 2020

Traceable

MicroScope – February 2021: The forecast on channel security
sponsored by MicroScope
EZINE: MicroScope asks experts to share their opinions on what lies ahead for the channel in the security market, along with their predicitions for what upcoming threats to expect. Also read about how the managed service community helped to keep SMEs afloat during Covid-19, and how to arm the business with the best IAM tools for remote working
Posted: 04 Feb 2021 | Published: 05 Feb 2021

MicroScope

Securing the enterprise with 360° visibility: Don’t leave a gap in defenses
sponsored by OpenText
WHITE PAPER: Organizations fight cyberthreats every day, and with more at stake than ever before, including customer data, intellectual property and company reputations, one successful attack can mean game over. This white paper demonstrates why organizations need total visibility and how endpoint detection & response (EDR) can help them achieve it.
Posted: 08 Dec 2020 | Published: 08 Dec 2020

OpenText

Top 10 Capabilities that Organizations Need in a Secure Email Gateway: A buyer’s guide
sponsored by Mimecast
EBOOK: With the proliferation of advanced threat techniques in today’s ecosystem, organizations are adopting secure email gateways (SEGs) for a multi-layered approach against email-borne threats. How can you be sure you’re considering the right one? This buyer’s guide details the 10 most important capabilities organizations should seek in a SEG solution.
Posted: 08 Dec 2020 | Published: 08 Dec 2020

Mimecast

Phishing: Not Just One Kind of Attack
sponsored by Atakama
RESOURCE: Phishing attacks utilize a wide range of ever-evolving techniques to steal data, from impersonating executives to targeting and duping unsuspecting employees. How can you better understand these scams? This article breaks down common schemes, their targets and their indicators, and gives a solution from Atakama for keeping these threats at bay.
Posted: 07 Dec 2020 | Published: 19 Aug 2020

Atakama

Leading Operator of Mexican Hypermarkets Achieves PCI-DSS Compliance
sponsored by Comforte AG
BROCHURE: A leading Mexican hypermarket operator needed to achieve PCI-DSS compliance in order to remain operational. They wanted to do so while implementing robust security for protection for data at rest within their enterprise systems. View this case study to see how Comforte AG was able to help maintain compliance and security.
Posted: 04 Dec 2020 | Published: 04 Dec 2020

Comforte AG

Vitens Moves To Cloud Security With Bloxone™ Threat Defense From Infoblox
sponsored by Infoblox
CASE STUDY: Vitens is the largest drinking water utility in The Netherlands, delivering water to 5.6 million people. In an effort to strengthen security, Vitens set out to improve visibility into their network infrastructure and endpoints. Download this case study to see how Infoblox’s BloxOne Threat Defense gave Vitens oversight they needed to succeed.
Posted: 16 Feb 2021 | Published: 16 Feb 2021

Infoblox
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences