IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Event Management

RSS Feed   
Security Event Management Reports
1 - 25 of 473 Matches Previous Page  |  Next Page
SANS Threat Hunting Survey: The Differing Needs of New and Experienced Hunters
sponsored by Authentic8, Inc.
ANALYST REPORT: This SANS research report shows the scope of the different needs within organizations that are just starting their threat hunting journey, versus those who are honing their skills and programs. Read on to learn more.
Posted: 17 Feb 2020 | Published: 17 Feb 2020

Authentic8, Inc.

SOAR in The Real World Survey
sponsored by D3 Security
ANALYST REPORT: Over the past few years, SOAR has emerged as an important tool for large organizations in their perpetual fight against data breaches, ransomware, and other cyberattacks. The evolution of SOAR has been rapid. In this report, learn everything you need to know about SOAR.
Posted: 17 Feb 2020 | Published: 17 Feb 2020

D3 Security

CIS Critical Security Controls Evaluation Guide
sponsored by Absolute Software Corporation
WHITE PAPER: The Center for Internet Security (CIS) Critical Security Controls have become a trusted resource for organizations looking to identify threats and enhance security. This evaluation guide measures the Absolute Platform against the CIS Top 20 Critical Security Controls to illustrate its capabilities.
Posted: 14 Feb 2020 | Published: 02 Nov 2018

Absolute Software Corporation

Malwarebytes Cut Potential Downtime to a Matter of Hours Rather than Weeks
sponsored by Malwarebytes
CASE STUDY: In this case study, discover how Neoperl, a global IT company operating in Europe, partnered with Malwarebytes address challenges related to system downtime, resulting cost savings, complete remediation of threats, and minimized downtime and disruptions.
Posted: 14 Feb 2020 | Published: 14 Feb 2020

Malwarebytes

4 Ways to Leverage the MITRE ATT&CK Framework in Your Security Operations
sponsored by D3 Security
WHITE PAPER: While the MITRE ATT&CK Framework is popular amongst security professionals, many teams struggle to get optimize its efficiency. In this white paper, learn 4 ways your security team can incorporate the MITRE ATT&CK Framework into your operations.
Posted: 14 Feb 2020 | Published: 14 Feb 2020

D3 Security

Cryptomining - How Cryptocurrency is Changing Cyber Security
sponsored by Cisco Umbrella
WEBCAST: The introduction of cryptocurrencies has changed the cyber threat landscape. New varieties of ransomware in the form of cryptojacking, mining, and exchange phishing are plaguing today’s businesses. In this episode of ‘A Cybersecurity Technical Mini Series’, learn how you can stay protected.
Posted: 13 Feb 2020 | Premiered: Dec 16, 2019

Cisco Umbrella

Chart Industries Vaporizes Ransomware and Malware
sponsored by Malwarebytes
CASE STUDY: In this case study, follow the journey of Chart Industries, a global manufacturer and distributer, as they partner with Malwarebytes to address the growing risk of malware and phishing attacks targeted at mobile workers and endpoints. Download the report to see the results.
Posted: 13 Feb 2020 | Published: 13 Feb 2020

Malwarebytes

The Impact of Unsecured Digital Identities
sponsored by Keyfactor
WHITE PAPER: In this report, uncover key research findings from a recent study conducted by the Ponemon Institute into the impact of unsecured digital identities. Download the full study to unlock the key insights from the research.
Posted: 12 Feb 2020 | Published: 12 Feb 2020

Keyfactor

Core - DNS - Abracadabra of Malware: Obfuscation
sponsored by Cisco Umbrella
WEBCAST: In this episode of ‘A Cybersecurity Technical Mini Series’, take an in-depth look at obfuscation malware techniques; how they work, types of attacks, and how to mitigate these threats. Watch now to learn more.
Posted: 12 Feb 2020 | Premiered: Nov 30, 2019

Cisco Umbrella

Are you ready? Breach Readiness and Response
sponsored by Cisco Umbrella
RESOURCE: Cyberattacks are growing in their frequency and sophistication, leading to organization’s shifting their focus towards breach response. Yet, despite their efforts, attackers continue to bypass security measures. Read on to uncover the tips and best practices for refining your breach readiness.
Posted: 12 Feb 2020 | Published: 12 Feb 2020

Cisco Umbrella

How to Create a Successful Cybersecurity Plan
sponsored by Malwarebytes
WHITE PAPER: According to a Ponemon Institute study, the average cost of a breach is $3.86 million. Aside from monetary costs, organizations also face potential legal and reputational ramifications. Download this paper to better understand the key areas for consideration to help get you started building a cybersecurity plan.
Posted: 12 Feb 2020 | Published: 31 Jul 2019

Malwarebytes

Ransomware Can’t Stop the Presses at La Sentinelle
sponsored by Malwarebytes
CASE STUDY: In this case study, La Sentinelle, a media group in Mauritius, sought to eliminate downtime associated with ransomware in the wake of a disruptive malware attack. Download this white paper to learn how they developed a program that would enable them to identify, mitigate, and prevent malware attacks.
Posted: 12 Feb 2020 | Published: 12 Feb 2020

Malwarebytes

Abusing Code Signing for Profit
sponsored by Chronicle
WHITE PAPER: Code signing was originally developed as way of guaranteeing the authenticity of a published file. However, given that this process is based on trust, it can be easily manipulated by skilled hackers. Download this white paper to unlock the results of a recent study into this issue and discover where the key concerns lie.
Posted: 11 Feb 2020 | Published: 11 Feb 2020

Chronicle

Redefining security analytics with Chronicle Backstory
sponsored by Chronicle
WHITE PAPER: Today’s security teams face several challenges: from escalating threats and expanding networks and devices to the increased pressure of meeting security requirements. In this white paper, take a closer look at the 5 security requirements to include in your strategy and learn more about Chronicle’s Backstory data platform.
Posted: 11 Feb 2020 | Published: 11 Feb 2020

Chronicle

5 Reasons Why Virus Protection Software Isn't Enough
sponsored by Inky Technology
RESOURCE: Cyberattacks are troubling more and more business each year, and while most organizations opt for some sort of virus protection software, these platforms are unable to provide the security necessary to detect and thwart attacks. In this article, uncover the 5 reasons why virus protection software isn’t enough.
Posted: 11 Feb 2020 | Published: 11 Feb 2020

Inky Technology

Case Study: Quanta Services
sponsored by Chronicle
CASE STUDY: In this case study, join James Stinson, VP of IT at Quanta Services, a skilled workforce contractor in North America, as he highlights the company’s journey towards cybersecurity and their partnership with Chronicle to establish a security analytics platform.
Posted: 10 Feb 2020 | Published: 31 Oct 2019

Chronicle

Cryptomining - Malicious Cryptominers are Eying Your Resources
sponsored by Cisco Umbrella
EBOOK: Cryptomining is a growing security threat, allowing cybercriminals profit at your organization’s expense. Organizations in the US are key targets, making up roughly 62% of global attacks. In this white paper, find out who they’re targeting and how to protect your network.
Posted: 10 Feb 2020 | Published: 10 Feb 2020

Cisco Umbrella

Collective Offense Calls for Collective Defense
sponsored by IronNet
WHITE PAPER: Advanced cybersecurity systems, such as AI and ML, are not preventing cyber incidents. Disparate efforts to thwart attacks are unlikely to remain sustainable as threats increase. Download this white paper and discover the collective defense platform: where security teams aggregate their threat intelligence to increase awareness and response time.
Posted: 07 Feb 2020 | Published: 07 Feb 2020

IronNet

Core - DNS - Threat Intelligence – the new driver for incident response
sponsored by Cisco Umbrella
WEBCAST: Malware attacks in the financial services industry have grown considerably over the past year. Organizations are finding that they require complete network visibility to consolidate disparate security efforts and establish a strong resiliency program. In this webinar, discover the foremost threats of 2019 and how integrated security can help.
Posted: 07 Feb 2020 | Premiered: Jan 15, 2020

Cisco Umbrella

Iranian Threat Groups and Campaigns
sponsored by IronNet
WHITE PAPER: In a recent study, cybersecurity experts studied leading cyberthreat groups across Iran in order to provide a comprehensive report summarizing documented campaigns, common target & actor types, and geographic trends in attack patterns – all in order to help organizations be better prepared in the event of an attack.
Posted: 06 Feb 2020 | Published: 06 Feb 2020

IronNet

Core - DNS - The role of predictive intelligence in the fight against cyberattacks
sponsored by Cisco Umbrella
WHITE PAPER: The reactive nature of threat intelligence makes it difficult for organizations to keep pace with the increasing frequency of modern attacks. In this white paper, take a closer look at predictive intelligence and how you can monitor live activity to better anticipate when and where and attack will strike.
Posted: 05 Feb 2020 | Published: 05 Feb 2020

Cisco Umbrella

The Value of Threat Intelligence
sponsored by DomainTools
WHITE PAPER: With over 80% of organizations reporting 1 or more security incidents over the past year, it’s safe to say that security issues are common. This study shows that while most organizations can defend against malware attacks, they fail against most other threats. Read on to view the results of Osterman’s study into the value of threat intelligence.
Posted: 05 Feb 2020 | Published: 30 Nov 2019

DomainTools

Cyber Threat Intelligence
sponsored by DomainTools
RESOURCE: As cyberattacks become more sophisticated and difficult to detect, proactive approaches to threat management are no longer viable for ensuring network security. In this solution brief, discover a proactive approach to threat intelligence that helps you identify & monitor threats while building a cyber threat database.
Posted: 04 Feb 2020 | Published: 04 Feb 2020

DomainTools

Managed Vulnerability Assessment
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: In this buyer’s guide, discover how vulnerability assessment and management can give you the visibility you need to prioritize security tasks.
Posted: 04 Feb 2020 | Published: 04 Feb 2020

Arctic Wolf Networks, Inc.

The Importance of Remote Support in a Shift-Left World
sponsored by LogMeIn, Inc.
WHITE PAPER: As organizations continue to expand their remote workforce and BYOD devices, remote access becomes a critical practice for ensuring smooth customer support. This report takes a closer look at the results of a recent study to provide you with the key elements that go into an effective remote access support strategy.
Posted: 03 Feb 2020 | Published: 03 Feb 2020

LogMeIn, Inc.
1 - 25 of 473 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info