Security Software

Security Software Reports
Okta + HYPR: Secure, Passwordless Authentication for Employees and Consumers
sponsored by Okta
DATA SHEET: Passwords present a significant weakness in an organization’s security architecture, and cybercriminals are keen on exploiting this weakness. Read this data sheet to learn how Okta and HYPR are enabling organizations to eliminate passwords in favor of passwordless authentication methods.
Posted: 15 Mar 2021 | Published: 12 Feb 2021

Okta

Case Study: Archdiocese
sponsored by Bitdefender
CASE STUDY: The Archdiocese isn’t typically renowned for their IT and cybersecurity skills. However, in this case study, they partnered with Bitdefender to integrate MDR capabilities as part of a project to consolidate time spent on security operations and enable their IT staff to focus on strategic initiatives. Read on to unlock the full story.
Posted: 15 Mar 2021 | Published: 09 Feb 2021

Bitdefender

The Total Economic Impact™ Of ServiceNow Risk And Compliance
sponsored by ServiceNow
RESEARCH CONTENT: Download this Forrester Total Economic Impact Report for exclusive insight into the efficiencies and advancements in governance, risk and compliance (GRC), vendor risk management (VRM) and business continuity management (BCM) with ServiceNow Risk and Compliance – as well as an analysis of costs.
Posted: 10 Mar 2021 | Published: 31 Jan 2021

ServiceNow

The Impact of XDR in the Modern SOC
sponsored by Dell SecureWorks
ANALYST REPORT: Extended detection and response (XDR) is gaining momentum in the security arena. ESG recently surveyed IT/InfoSec professionals across multiple industry verticals to better understand the market perception of XDR, as well as value points and challenges that come with it. Access the full ESG report to see the impact of XDR in the modern SOC.
Posted: 23 Feb 2021 | Published: 30 Nov 2020

Dell SecureWorks

Security Think Tank Pt.1 - 2020 bought us universal remote working. So what next?...
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide: Each month Computer Weekly poses a question to its Security Think Tank, a panel of cyber security experts comprising industry insiders, technologists, analysts, legal experts and educators, to share their years of collective cyber security wisdom with the security community.
Posted: 19 Feb 2021 | Published: 19 Feb 2021

ComputerWeekly.com

The Total Economic Impact™ Of ServiceNow Security Operations
sponsored by ServiceNow
ANALYST REPORT: With the growing complexity and volume of cyberattacks, organizations will become more vulnerable to security threats. You need security orchestration tools that can connect security and IT teams for faster and more efficient response to security incidents. Access this Forrester report to get the facts on ServiceNow’s Security Operations.
Posted: 12 Feb 2021 | Published: 30 Oct 2020

ServiceNow

Enterprise Data Protection Solutions, Explained
sponsored by Forcepoint
EGUIDE: It’s hard to overstate the value of data protection given its ability to safeguard critical assets, maintain brand image and avoid legal issues. However, choosing the right data protection partner can be tough. This data protection buyer’s guide offers key search criteria, questions to ask potential partners and more – read on to get started.
Posted: 08 Feb 2021 | Published: 15 Jan 2021

Forcepoint

Omdia Market Radar: Outbound Email Security
sponsored by Zivver
WHITE PAPER: When it comes to email security, organizations put their primary focus on potential threats coming in. And that’s fine, but outbound email security is arguably just as important. Browse this white paper to get a closer look at outbound email data protection, which focuses on building controls to offset risks from the insider threat.
Posted: 08 Feb 2021 | Published: 09 Dec 2020

Zivver

A Security Engineer’s Nightmare
sponsored by Cribl.io
WHITE PAPER: For security pros, preventing breaches and ensuring data privacy is hectic enough – having an incompetent system on top of these challenges can introduce new levels of stress. Read this white paper to learn how Cribl is helping security engineers log information and incidents so they can focus their efforts on more important tasks.
Posted: 08 Feb 2021 | Published: 19 Nov 2020

Cribl.io

Surviving Beyond the New Normal: It's more than securing your remote workers
sponsored by Okta
WEBCAST: In today’s organizations, directory structures need to be able to handle quick moves to new cloud applications and other systems. This means you need top-of-the-line identity management. Watch this webinar to get a clear-eyed view of the stresses these new requirements put on Azure AD and how Okta’s modern identity platform may be able to help.
Posted: 08 Feb 2021 | Premiered: Jan 14, 2021

Okta

Covid-19 Lessons Learned—Business Continuity Management
sponsored by ServiceNow
WHITE PAPER: Regardless of whether an organization had a business continuity management (BCM) program in place prior to COVID-19, 2020 has been a learning experience for the shortcomings of most BCM programs. This white paper highlights common oversights and lessons learned regarding BCM in the era of COVID-19 – read on to get started.
Posted: 08 Feb 2021 | Published: 11 Nov 2020

ServiceNow

Business Continuity Management Continuity Planning, Disaster Recovery, Crisis Response
sponsored by ServiceNow
PRODUCT OVERVIEW: Business continuity management (BCM) tools are an effective way for organizations to ensure crisis preparation and disaster recover plans are in place prior to an unforeseen disruption. This solution brief highlights the key features and capabilities of ServiceNow’s BCM tool – read on for more information.
Posted: 08 Feb 2021 | Published: 12 Nov 2020

ServiceNow

Intelligent Privacy Automation: The Future Of Data Privacy
sponsored by ServiceNow
WHITE PAPER: Growing privacy concerns and emerging data privacy laws require organizations to not only know the location and usage of all personal data, but operationalize their privacy policies and accommodate a timely response to data access requests. But how can you ensure you’re always in compliance? Read this white paper to get the answer.
Posted: 08 Feb 2021 | Published: 12 Nov 2020

ServiceNow

Attacking And Defending A Distributed Workforce
sponsored by ServiceNow
WHITE PAPER: The shift to a distributed, remote workforce has exposed businesses to new attack vectors, including confidentiality threats, remote business process threats and availability threats, all of which alter company risk profiles. What does this mean for network professionals and risk management? Read this white paper to get the answer.
Posted: 08 Feb 2021 | Published: 11 Nov 2020

ServiceNow

KuppingerCole Market Compass IT-GRC Tools
sponsored by ServiceNow
WHITE PAPER: IT GRC tools are emerging as one of the most effective ways for organizations to create, organize and manage GRC policies. This KuppingerCole Market Compass report covers the top IT GRC vendors and tools that can assist organizations in reducing the risk of non-compliance – read on to unlock the full report.
Posted: 08 Feb 2021 | Published: 21 Jul 2020

ServiceNow

Magic Quadrant for IT Risk Management
sponsored by ServiceNow
RESOURCE: IT risk management (ITRM) has emerged as a key pillar in assessing risk, bolstering security and addressing compliance needs. Read this Gartner Magic Quadrant Report for an in-depth comparison of the capabilities of top ITRM vendors and offerings in today’s market.
Posted: 08 Feb 2021 | Published: 11 Aug 2020

ServiceNow

Magic Quadrant for IT Vendor Risk Management Tools
sponsored by ServiceNow
RESOURCE: IT vendor risk management (IT VRM) software provides solutions to manage and automate the vendor risk management life cycle, address third-party risk and meet regulatory compliance. This Gartner Magic Quadrant Report provides an overview of the IT VRM market and a comprehensive evaluation of the top offerings – read on to get started.
Posted: 08 Feb 2021 | Published: 24 Aug 2020

ServiceNow

Enterprise Risk Management (ERM) and Governance, Risk and Compliance (GRC) Digital tools for oversight in the enterprise
sponsored by ServiceNow
WHITE PAPER: In this report, discover the results of Constellation Research’s initiative into determining the most effective digital tools for oversight in the enterprise and observe a shortlist of 12 unique enterprise risk management (ERM) and governance, risk and compliance (GRC) offerings you should be aware of.
Posted: 08 Feb 2021 | Published: 09 Oct 2020

ServiceNow

Developing a more effective risk report for your board
sponsored by ServiceNow
WHITE PAPER: Today’s risk climate necessitates that everyone within the organization, regardless of job function, is invested in security and protection of their organization. However, organization-wide buy-in starts with getting the board involved. Download this white paper to learn how to convey the seriousness of cyber risk to your board.
Posted: 08 Feb 2021 | Published: 07 Oct 2020

ServiceNow

Top COVID-19 Phishing Scams
sponsored by Inky Technology
RESOURCE: Phishing scammers have taken advantage of the frequent updates regarding COVID-19 information to use it as an entry point for their campaigns. This article, Top COVID-19 Phishing Scams, looks at the emerging threat types and what to look for to identify an attack – read on to get started.
Posted: 08 Feb 2021 | Published: 06 Oct 2020

Inky Technology

CEO Impersonation
sponsored by Inky Technology
WHITE PAPER: Threat actors have realized that they can achieve at least a minimal rate of success by impersonating a company’s CEO or other high-level official in an email to an employee lower down in the organization. They will typically request money via wire transfer, but it does not stop there. Read this white paper to see some examples.
Posted: 08 Feb 2021 | Published: 02 Oct 2020

Inky Technology

Invisible Characters
sponsored by Inky Technology
WHITE PAPER: Similar to hidden text and zero font, invisible characters is a phishing tactic designed to obscure text in order to bypass secure email gateways (SEGs). Read this edition of Understanding Phishing for a full breakdown of invisible text – including real-world examples and best practices for stopping it.
Posted: 08 Feb 2021 | Published: 06 Oct 2020

Inky Technology

Understanding Phishing: Text Direction Deception!
sponsored by Inky Technology
WHITE PAPER: Phishing scams continue to evolve, and attackers apply an ever-growing bag of tricks to fool recipients as well as email protection tools. In this edition of Understanding Phishing, the cybersecurity experts at INKY dissect a recently uncovered tactic which uses Cascading Style Sheets (CSS) to bypass security protocols by mixing scripts.
Posted: 08 Feb 2021 | Published: 30 Sep 2020

Inky Technology

GoSecure Cybersecurity Perceptions Versus Reality
sponsored by GoSecure
WHITE PAPER: This 29-page research report provides the key findings from a recent GoSecure survey designed to better understand the biases, gaps and misconceptions surrounding cybersecurity. Read on to learn more about this disconnect and discover how to address and overcome it.
Posted: 08 Feb 2021 | Published: 16 Sep 2020

GoSecure

MSPs: The 5 essentials from your endpoint security partner
sponsored by Malwarebytes
EBOOK: When it comes to managing cybersecurity, safeguarding client endpoints is a critical piece of the MSP service offering—as well as a complicated one. Read this e-book to view 5 essentials that MSPs need from their endpoint security providers and for tips and solutions to ensure your MSP is successful in this area.
Posted: 08 Feb 2021 | Published: 06 Jul 2020

Malwarebytes