IT Agents  >   IT Workforce  >   Information Technology Professionals  >   IT Managers  >  

Security Managers

RSS Feed   
Security Managers Reports
1 - 25 of 767 Matches Previous Page  |  Next Page
Data Breach: Security Investigation, Detection and Rapid Response
sponsored by Splunk
WHITE PAPER: Discover the specific items to investigate when there is a security incident alert, what your analysts need to determine during a breach to mitigate further damage, the 6 most common steps in determining the impact of the breach, and the most appropriate course of action.
Posted: 17 Dec 2018 | Published: 01 May 2017

Splunk

State of the Channel Ransomware Report: Canadian Edition
sponsored by Datto, Inc.
EBOOK: More than 200 Canadian MSPs share their ransomware hardships and triumphs, with specifics on how ransomware is targeting customers—in particular, SMBs—and recommendations for recovery and business continuity. Read on for a unique look into the state of ransomware.
Posted: 07 Dec 2018 | Published: 31 Dec 2017

Datto, Inc.

Defending against Encrypted Threats
sponsored by F5 Networks
WHITE PAPER: In a world dominated by SSL/TLS encrypted traffic, find out how to overcome various challenges with inbound and outbound traffic inspection so that you can effectively neutralize malware attacks, intelligently route traffic, and more.
Posted: 03 Dec 2018 | Published: 03 Dec 2018

F5 Networks

Encrypted Traffic: Making What's Vulnerable More Visible
sponsored by F5 Networks
WHITE PAPER: This white paper explores how to update your SSL/TLS strategy for the increasing payload of encrypted attacks. Get tips on how to improve your cryptographic posture so that you can make sure your SSL/TLS strategy is able to decrypt and encrypt traffic while routing it intelligently across security inspection devices.
Posted: 03 Dec 2018 | Published: 03 Dec 2018

F5 Networks

Increase Visibility into SSL Encryption to Boost Security
sponsored by F5 Networks
WHITE PAPER: Regaining visibility into encrypted traffic is one of the most important steps you can take to protect your apps, your data, and your business. Find out how SSL/TLS orchestration can help you get that visibility and deliver high-performance decryption and encryption of outbound TLS traffic—without slowing your traffic down.
Posted: 30 Nov 2018 | Published: 30 Nov 2018

F5 Networks

Sports-Centric Streaming Service fuboTV Sees 50% ROI - Just from Auth0's Security
sponsored by Auth0
CASE STUDY: Read this case study to find out how fuboTV partnered with Auth0 in order to improve and scale their authentication and authorization workflows.
Posted: 28 Nov 2018 | Published: 28 Nov 2018

Auth0

Closing the Cybersecurity Gap
sponsored by Splunk
RESEARCH CONTENT: Discover 3 steps to help you move towards a more intelligence-driven cybersecurity strategy that takes full advantage of your available resources and skills.
Posted: 21 Nov 2018 | Published: 21 Nov 2018

Splunk

Build Identity Verification Processes with the Power of AI
sponsored by Jumio
EGUIDE: This expert e-guide explores recent developments in AI-powered identity verification technology. Get tips on how to outsmart potential fraudsters by finding out how you can improve your identity verification practices by building machine learning and other AI-based technologies into your security strategy.
Posted: 19 Nov 2018 | Published: 15 Nov 2018

Jumio

Managing the Risk of Post-Breach or "Resident" Attacks
sponsored by Illusive Networks
RESEARCH CONTENT: Find out what Ponemon Institute discovered about organizations' readiness for insider threats when they surveyed 627 IT and IT security practitioners in the United States about their understanding of attackers who operate internally.
Posted: 16 Nov 2018 | Published: 16 Nov 2018

Illusive Networks

Remove the Guesswork from Securing your Business
sponsored by CompuCom Systems, Inc.
WHITE PAPER: Discover a security best practices questionnaire and a cybersecurity protection checklist to see how your business's defensive strategies measure up against modern threats.
Posted: 16 Nov 2018 | Published: 16 Nov 2018

CompuCom Systems, Inc.

Infographic: 6 emerging trends in security
sponsored by ComputerWeekly.com
EGUIDE: In this infographic, we outline 6 emerging trends in security that cybersecurity pros - and their employers - need to prep for in the next year. These ideas are taken from a keynote by analyst Peter Firstbrook at Gartner Symposium 2018.
Posted: 15 Nov 2018 | Published: 15 Nov 2018

ComputerWeekly.com

Executive Summary: A Guide to Protecting Microsoft Office 365 from Security Threats
sponsored by Symantec
RESOURCE: Find out how to transform your security to safely deploy Office 365 and other SaaS apps by learning about how to spot potential vulnerabilities and defend against cloud-based threats.
Posted: 14 Nov 2018 | Published: 31 Aug 2018

Symantec

Integrated Security Management
sponsored by Skybox Security
RESOURCE: Learn how you can understand network connectivity, simulate attack vectors, and model your attack surface with an integrated cybersecurity management platform.
Posted: 14 Nov 2018 | Published: 14 Nov 2018

Skybox Security

A New SIEM for a New World
sponsored by Empow Cyber Security
VIDEO: Don't get overwhelmed by the onrush of cybersecurity data – protect your organization by leveraging a modern SIEM that uses AI-powered analytics and automation to process that large volume of data and turn it to your advantage.
Posted: 31 Oct 2018 | Premiered: 25 Oct 2018

Empow Cyber Security

Securing your Workforce across Cloud and Mobile
sponsored by Forcepoint
EBOOK: In this e-book, get tips on how to evaluate your CASB and overcome the leading cybersecurity challenges in cloud and mobile-first environments.
Posted: 26 Oct 2018 | Published: 31 Dec 2017

Forcepoint

Secure your Office 365 Environment
sponsored by Forcepoint
EBOOK: Many organizations have yet to fully migrate their users and apps over to a cloud-based Office 365 environment – largely due to security, compliance, and performance concerns. Discover 4 keys for building your Microsoft Office 365 security and performance strategy that will help you overcome these concerns.
Posted: 24 Oct 2018 | Published: 24 Oct 2018

Forcepoint

Protect your Online Business from Credential Stuffing
sponsored by Akamai Technologies
WHITE PAPER: Explore what credential stuffing is and how it works. Understand this potential threat to your business. Find out how advanced bot management can help you stay ahead of credential stuffing so that you can protect your organization and its critical assets.
Posted: 15 Oct 2018 | Published: 31 Mar 2018

Akamai Technologies

Akamai Cloud Security
sponsored by Akamai Technologies
WHITE PAPER: Learn about Akamai's cloud-based approach to security that leverages 24/7 monitoring to collect and analyze terabytes of attack data, bot requests, and IP addresses to solidify your defenses. Plus, discover 7 keys to reducing your attack surface.
Posted: 12 Oct 2018 | Published: 31 Mar 2018

Akamai Technologies

What SOC Managers Should Know about Security Orchestration and Threat Intelligence
sponsored by Siemplify
WHITE PAPER: Find out how security orchestration, automation, and response can empower security operations center teams to integrate data from disparate security systems for a more effective way to investigate and identify potential threats.
Posted: 05 Oct 2018 | Published: 05 Oct 2018

Siemplify

Selecting a Security Orchestration Vendor
sponsored by Siemplify
WHITE PAPER: This white paper gives an overview of security orchestration, automation, and response technologies, providing you with the tools you need to evaluate vendors. As you select your system, discover which 6 features to look for.
Posted: 05 Oct 2018 | Published: 05 Oct 2018

Siemplify

Deconstructing a Modern Bank Heist: the [not] Carbanak Source Code Leak
sponsored by Illusive Networks
RESOURCE: In August 2018, part of the source code leaked for Buhtrap/Ratopak/Pegasus malware threats – creating a rare opportunity to see how these attacks work and are executed by bad actors. This resource analyzes the leaked source code and takes a look at how it sneaks through network defenses.
Posted: 12 Sep 2018 | Published: 03 Aug 2018

Illusive Networks

How to Simplify Security and Shrink the Attack Surface
sponsored by VMware
WHITE PAPER: Modern applications are dynamic and distributed – and the attack surface keeps growing as a result. To secure your business, you need security integrated into your infrastructure, not bolted-on. Download the e-book to learn how to reduce the attack surface and simplify security.
Posted: 29 Oct 2018 | Published: 31 Aug 2018

VMware

Insider Threats: The Danger Within
sponsored by IBM
RESEARCH CONTENT: Most federal employees think their agencies are safe from insider threats, but a Meritalk survey found that 42% of federal security pros said their agencies were targeted by insider threats. To better understand the current climate, explore this report from GovLoop and IBM about insider threats and the growing importance of behavior analytics.
Posted: 26 Oct 2018 | Published: 26 Oct 2018

IBM

Mapping the Requirements of Next-Generation Sandboxing
sponsored by Fortinet, Inc.
WHITE PAPER: Discover 7 key capabilities to look for in a next-gen sandboxing platform so that you can build a security architecture that's designed to detect and prevent threats before they can impact your network or your business as a whole.
Posted: 11 Oct 2018 | Published: 11 Oct 2018

Fortinet, Inc.

Leveraging the Benefits of Cloud Web Application Security
sponsored by Oracle Dyn
RESOURCE CENTER: This custom article examines the recent advances in web app security and explores how you can leverage cloud-based technologies to mitigate the risk to your company's critical assets.
Posted: 14 Sep 2018 | Published: 14 Sep 2018

Oracle Dyn
1 - 25 of 767 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement