Standards  >  

Security Protocols

RSS Feed   
Security Protocols Reports
 
RSA Conference 2020 guide: Highlighting security's human element
sponsored by ComputerWeekly.com
EGUIDE: The theme of the 2020 RSA Conference was the human element, and the event promised once more to live up to its reputation as the place "where the world talks security. This RSA Conference 2020 guide is your single stop to find all the latest breaking news and expert insights from one of the cybersecurity world's biggest annual gatherings.
Posted: 04 May 2020 | Published: 04 May 2020

ComputerWeekly.com

Punycode: Awareness and Protection
sponsored by Cisco Umbrella
VIDEO: The topic of this episode of A Cybersecurity Technical Mini Series: Punycode. But what is Punycode, how does it work & why is it important? To find out, join Chris Riviere, a security expert at Cisco as he further explores this malicious domain tactic.
Posted: 19 May 2020 | Premiered: 16 Dec 2019

Cisco Umbrella

MITRE ATT&CK Workbook
sponsored by VMware International Unlimited Company
WHITE PAPER: The MITRE ATT&CK framework has had a clear objective since its inception: develop a knowledge base around known cyberthreats and tactics to help organizations stay prepared. This workbook is designed as a starting point for organizations interested in leveraging the MITRE ATT&CK framework to improve their security posture.
Posted: 06 May 2020 | Published: 14 Feb 2020

VMware International Unlimited Company

How Do You Know If You Are Making the Right MSSP Choice?
sponsored by BlueVoyant
RESOURCE: MSSPs make valuable partners when it comes to ensuring the protection of your network and data. However, the unique nature of cybersecurity requires a thoughtful MSSPs selection process. The following evaluation guide is designed to equip you with key considerations for assessing your current environment, as well as vetting future MSSPs.
Posted: 08 May 2020 | Published: 08 May 2020

BlueVoyant

Cloud Security Assessment Workshop
sponsored by Cloud4C
BROCHURE: As organizations continue to migrate to the cloud, it’s critical that they don’t lose sight of their security and compliance objectives. This brochure provides an overview of what to expect in the CAF cloud security assessment workshop, designed to review your current strategy and make recommendations based on your compliance and security needs.
Posted: 08 May 2020 | Published: 08 May 2020

Cloud4C

The Top 5 Open Source Vulnerabilities in Financial Institutions
sponsored by Sonatype
WHITE PAPER: In terms of operational efficiency, open source is unmatched. However, for the financial industry, heavy regulations make ensuring the security of open source applications difficult to manage and prove. In this white paper, take a closer look at the top five areas of vulnerability plaguing today’s financial services organizations.
Posted: 11 May 2020 | Published: 11 May 2020

Sonatype

Duo for Microsoft Officer365, Azure, and Windows
sponsored by Duo Security
PRODUCT OVERVIEW: Organizations have been embracing the productivity benefits of Microsoft tools for several years. To get the most out of these applications, third-party security services, like Duo, can help organizations with their digital transformation initiatives. Read on to learn more about Duo and discover if its features match your objectives.
Posted: 04 May 2020 | Published: 04 May 2020

Duo Security

Don’t Give Away Keys to Your Kingdom with ADFS
sponsored by PortSys
RESOURCE: For years, organizations have been using Active Directory Federated Services (ADFS) to manage access to cloud applications. However, sole reliance on ADFS for managing these accounts can introduce risks. In this article, discover how Total Access Control (TAC), Portsys’ zero-trust offering, can help protect ADFS accounts from cyberattacks.
Posted: 06 May 2020 | Published: 28 Apr 2020

PortSys

Everything You Should Know About Cybersecurity Assessment, Planning & Response
sponsored by BlueVoyant
EBOOK: Today’s threat landscape necessitates thinking about security in terms of when, not if, an attack will occur. In this e-book, join Austin Berglas, an Army Veteran with decades of experience in cybersecurity both in the private sector as well as for the FBI, as he breaks down the current challenges & remedies for today’s breaches.
Posted: 06 May 2020 | Published: 06 May 2020

BlueVoyant

How to Combat Fileless Attacks
sponsored by VMware International Unlimited Company
WHITE PAPER: Cyberattackers are constantly devising new ways to target organizations, utilizing different methods or targeting untapped vectors. In this white paper, take an in-depth look at the increasing risk of fileless attack, how it works and ways to combat these threats.
Posted: 04 May 2020 | Published: 04 May 2020

VMware International Unlimited Company
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info