IT Management  >   Systems Operations  >   Security  >  

Security Network

RSS Feed   
Security Network Reports
 
Security Governance: Building a Framework and Establishing Trust
sponsored by RSA Conference
WEBCAST: Not only is Kuwait’s oil and gas industry critical to its economy—it’s also heavily targeted by global threat actors. In this RSAC Unplugged presentation, see how Kuwait’s oil and gas companies reached a consensus around common security objectives and a unified governance framework to protect this vital sector.
Posted: 22 Jan 2020 | Premiered: Oct 10, 2019

RSA Conference

Connected Car Security
sponsored by Intertrust
WHITE PAPER: As connected cars grow in popularity due to their convenience, it’s important to note that the increasing number of smart features built into cars opens the network to serious vulnerabilities and threats. This white paper highlights the threats facing connected cars by examining common cyberattack patterns and how to protect against them.
Posted: 13 Dec 2019 | Published: 13 Dec 2019

Intertrust

Clemson University: Balancing Network Performance and Security
sponsored by Gigamon
CASE STUDY: In this case study, learn how Clemson University uses Gigamon’s next-generation network visibility solution to defend against cyberthreats and optimize network and security operations by SSL/TLS decryption, balancing network access, performance and protection.
Posted: 14 Jan 2020 | Published: 14 Jan 2020

Gigamon

Intelligent Security Starts at the Edge
sponsored by Akamai Technologies
DATA SHEET: In Gartner’s most recent Magic Quadrant installment for Web Application Firewalls (WAF), they named Akamai a Leader for the third year in a row. This white paper provides an overview of the benefits of WAF, and highlights Akamai’s approach to WAF. Read on to get started.
Posted: 23 Dec 2019 | Published: 23 Dec 2019

Akamai Technologies

Digital Identity Security Assurance: How to Keep Your Customer Data Secure
sponsored by Akamai Technologies
WHITE PAPER: Customer identities are among the most critical and valuable assets of any organization. Failing to provide adequate security can result in financial, reputational, and even legal consequences. This paper highlights industry best practices for building customer trust through comprehensive security programs. Read on to learn more.
Posted: 23 Dec 2019 | Published: 30 Nov 2019

Akamai Technologies

4 Ways to Modernize Your Campus Network for Digital Transformation
sponsored by Somerville
RESOURCE CENTER: This custom white paper lists 4 requirements for modernizing your campus network for digital transformation. Find out what it takes to successfully transform your wireless network with always-on connectivity, network automation, security, and more.
Posted: 16 Jan 2020 | Published: 16 Jan 2020

Somerville

ThreatQ for Healthcare
sponsored by ThreatQuotient
DATA SHEET: The personal health information that healthcare providers process and store make them enticing targets for hackers. The average cost of a data breach over the past 2 years is $2.2 million, and the number of attacks is increasing rapidly. Read this white paper to uncover key cybersecurity insights for the healthcare industry.
Posted: 17 Jan 2020 | Published: 17 Jan 2020

ThreatQuotient

Cybersecurity Insights Report Ninth Edition
sponsored by AT&T Cybersecurity
RESOURCE: 5G is more than just an increase in speed; its rollout is expected to change the way organizations approach network and technology security. A recent study was conducted to uncover the potential impacts of 5G and the preparedness of enterprises. Read on to uncover the key insights from the research.
Posted: 08 Jan 2020 | Published: 08 Jan 2020

AT&T Cybersecurity

Beginners Guide to Open Source Intrusion Detection Tools
sponsored by AT&T Cybersecurity
RESOURCE: Intrusion detection systems (IDS) are a set of technologies that enable IT teams network visibility in order to identify and prevent suspicious activity from becoming a breach. Read this beginner’s guide to explore various IDS detection techniques to help you get started with network visibility and security.
Posted: 06 Jan 2020 | Published: 06 Jan 2020

AT&T Cybersecurity

Whack-a-phish
sponsored by Area 1 Security
WHITE PAPER: Traditional email security defenses rely on past data to detect the next attack, and therefore can’t defend against modern continually evolving phishing methods. Protection from modern attacks requires a proactive approach to security. Read on to learn more about forward-looking security technology for phishing attacks.
Posted: 09 Jan 2020 | Published: 09 Jan 2020

Area 1 Security
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info