IT Systems  >   Business Systems  >  

Security Systems

RSS Feed   
Security Systems Reports
201 - 225 of 1178 Matches Previous Page  |  Next Page
The Self-Defending Inbox
sponsored by AWS & DarkTrace
WHITE PAPER: Phishing, account take-overs and other email-based cyberattacks grow in their severity and frequency each year, and traditional email security methods are becoming increasingly unfit. Download this white paper for an in-depth look at the world’s first self-defending inbox, which leverages AI to protect against attacks.
Posted: 11 Jun 2020 | Published: 11 Jun 2020

AWS & DarkTrace

State of Software Security
sponsored by Veracode, Inc.
WHITE PAPER: In today’s business environment, almost every application includes open source libraries that enable productive and scalable functionality. In this research report, explore an in-depth analysis of the results from a Veracode study into the current state of open source application security.
Posted: 11 Jun 2020 | Published: 11 Jun 2020

Veracode, Inc.

Veracode Security Labs
sponsored by Veracode, Inc.
WHITE PAPER: In order to help organizations enable their software developers to identify, remediate and prevent vulnerabilities, Veracode Security Labs provides comprehensive training for the most relevant application security topics of today. Read on to learn more about the program.
Posted: 11 Jun 2020 | Published: 11 Jun 2020

Veracode, Inc.

Help Developers Understand and Use the OWASP Top Ten
sponsored by IANS Research
WHITE PAPER: Each year, the Open Web Application Security Project (OWASP) publishes Top Ten list of common and critical web application security risks. This white paper provides an overview of the Top Ten, why it matters, and best practices for incorporating it into your workday. Read on to get started.
Posted: 11 Jun 2020 | Published: 11 Jun 2020

IANS Research

The Ransomware-as-a-Service Evolution Is Here, with Its Sights on Your Mainframe
sponsored by BMC
WHITE PAPER: The latest iteration of ransomware, known as Ransomware-as-a-service (RaaS), provides hackers with access to ransomware resources in exchange for sending a portion of each ransom to the malware programmer. So, what proactive steps can organizations take against ransomware groups? Read this white paper to find out.
Posted: 10 Jun 2020 | Published: 10 Jun 2020

BMC

Indicators of Compromise and Why It Takes Six-Plus Months to ID a Breach
sponsored by BMC
WHITE PAPER: Each year, cybercriminals find novel ways to bypass existing security measures and disrupt workflows. In order to effectively protect sensitive data, security approaches need to be an endless, ongoing effort as well. But identifying the indicators of an attack or compromise is tricky. Download this white paper for tips to get started.
Posted: 10 Jun 2020 | Published: 10 Jun 2020

BMC

Incorporating Technology to Mitigate Email Exploits and Human Error
sponsored by Egress Software Technologies Inc
PRODUCT OVERVIEW: Traditional email security approaches are no longer viable in today’s environment. In fact, a recent FBI study indicated that BEC generates more than 50% of all cybercrime revenue. Download this IDC Vendor Spotlight report for a closer look at Egress’ Intelligent Email Security offering, which uses machine learning to enhance threat readiness.
Posted: 10 Jun 2020 | Published: 31 May 2020

Egress Software Technologies Inc

Make It Work: The MITRE ATT&CK Framework and How to Put It into Practice
sponsored by Capsule8
VIDEO: The MITRE ATT&CK framework is growing in popularity amongst security teams, equipping them with the knowledge they need to better understand cyberthreats. But with constantly changing risks, how do you move past the theoretical to put it into practice? Watch this video to find out.
Posted: 09 Jun 2020 | Premiered: 15 Apr 2020


The Business Case for Cloud Threat Defense
sponsored by Palo Alto Networks
WHITE PAPER: In order to protect the growing security and compliance requirements needed to protect cloud data and applications, organizations are implementing cloud threat defenses. Download this white paper to get a better understanding of the benefits, costs, issues and risks associated with implementing cloud threat defenses.
Posted: 09 Jun 2020 | Published: 09 Jun 2020

Palo Alto Networks

2020 Remote Workforce Cybersecurity Guide
sponsored by Automox
WHITE PAPER: The sudden and dramatic fashion in which organizations had to enable nearly their entire workforce to operate remotely has brought about a new set of security challenges that need to be addressed. Download this white paper to explore these new threats and discover how to address them without increasing cost or complexity.
Posted: 09 Jun 2020 | Published: 09 Jun 2020


Solving IoT’s Access Control Conundrum
sponsored by PortSys
RESOURCE: It’s no surprise that organizations are embracing the collaboration and innovation benefits of the internet of things (IoT). In fact, its predicted that by 2024, the number of IoT connections will grow by 130%. So, how are IT and security teams going to manage access requests across growing environments? Read on to find out.
Posted: 09 Jun 2020 | Published: 29 May 2020

PortSys

Guide to AV Replacement
sponsored by Crowdstrike
WHITE PAPER: As cyberattacks evolve into most sophisticated and directed attacks, traditional detection methods, like antivirus (AV) tools, grow increasingly insufficient. Download this guide to better understand the critical information needed to make an informed decision about replacing your AV or endpoint security tools.
Posted: 08 Jun 2020 | Published: 08 Jun 2020


Retooling Cybersecurity Programs for the Cloud-first Era
sponsored by Capsule8
WHITE PAPER: The amount of cloud-resident sensitive data is expected to double over the next 2 years, and organizations are preparing for the onslaught of threats by making careful reconsiderations within their cybersecurity strategy to include the protection of cloud data and applications, but how are they going about this? Read on to find out.
Posted: 08 Jun 2020 | Published: 08 Jun 2020


Why IDS is Ineffective for Linux Production Environments
sponsored by Capsule8
WHITE PAPER: While intrusion detection systems (IDS) may have been a core component in traditional security strategies, they lack the scalability, agility and visibility to keep up with today’s fast-paced cyberattacks. Download this white paper to discover 9 ways IDS in no longer a viable security option and how to detect threats in modern environments.
Posted: 08 Jun 2020 | Published: 08 Jun 2020


5 Security Recommendations for CIOs Managing a Digital Transformation Program
sponsored by Dell SecureWorks
WHITE PAPER: In order to establish an effective digital transformation program, organizations must maintain a balance of agility, cost reduction and innovation, with security as a supportive underline. Read this white paper to discover 5 ways CIOs can maintain security during a digital transformation.
Posted: 08 Jun 2020 | Published: 08 Jun 2020

Dell SecureWorks

What Boards Should Know About the Company’s Cybersecurity Strategy
sponsored by Dell SecureWorks
WHITE PAPER: In order to stay ahead of today’s cyberthreats, security leadership is opting to include board members and non-security leaders in their strategic planning so they can achieve an organization-wide resiliency approach. Download this white paper to discover how to develop a collaborative strategy.
Posted: 08 Jun 2020 | Published: 08 Jun 2020

Dell SecureWorks

7 Key Steps to Developing an Audit-Ready Security Program
sponsored by Ostendio
VIDEO: In this webinar, join the President and CEO of Ostendio as he provides a comprehensive overview of the 7 steps to developing an audit-ready security program, including key considerations for ensuring organization-wide buy-in. Watch now to get started.
Posted: 08 Jun 2020 | Premiered: 08 Jun 2020

Ostendio

Capsule8 for PCI Compliance
sponsored by Capsule8
PRODUCT OVERVIEW: As e-commerce becomes essential to the revenue stream of digital businesses, ensuring the PCI DSS compliance and securing cardholder data becomes increasingly critical. Download this solution brief and explore Capsule8’s Protect platform, designed to ensure security while easing PCI DSS compliance workload.
Posted: 05 Jun 2020 | Published: 05 Jun 2020


The State of Mobile Phishing
sponsored by Lookout Inc.
WHITE PAPER: Each year, the mobile phishing becomes increasingly dangerous, causing disruptions across organizations of any size and in every industry. The following mobile phishing report examines the current state of these threats and explores their potential impacts as well as how to protect your organization against them. Read on to get started.
Posted: 05 Jun 2020 | Published: 13 May 2020

Lookout Inc.

Top 10 Considerations for GRC Software Tools
sponsored by Ostendio
RESOURCE: The GRC tool selection process is often flooded with an overwhelming amount of choices, made more difficult by confusing terminology and varied opinions. This article helps to break down the problem by providing a brief overview on why and how companies are using GRC as well as 10 questions to consider during the evaluating process.
Posted: 05 Jun 2020 | Published: 28 Jan 2020

Ostendio

Solution Brief: Best Practices for Secure Mobile Access
sponsored by SonicWall
PRODUCT OVERVIEW: As organizations shift towards digital workspaces, ensuring the protection of mobile devices becomes increasingly critical. The following solution brief provides a comprehensive set of best practices and practical steps to ensure your organization protects its mobile devices against modern threats.
Posted: 04 Jun 2020 | Published: 04 Jun 2020

SonicWall

How Can A Risk Management Platform Support Your Business During A Crisis?
sponsored by Ostendio
RESOURCE: While organizations may be anxious to return to work, it’s critical to keep in mind the lessons learnt about maintaining security and productivity during a crisis. Developing a solid crisis management plan can help with responding to future incidents. Read this article to uncover 6 key steps to help you get started.
Posted: 04 Jun 2020 | Published: 29 Apr 2020

Ostendio

Data Privacy and Non-Compliance: From Silicon Valley to SMBs
sponsored by Ostendio
RESOURCE: In this article written by the President and CEO of Ostendio, learn about the data privacy and non-compliance issues that are plaguing companies of all sizes – from Silicon Valley to SMBs.
Posted: 04 Jun 2020 | Published: 10 Apr 2020

Ostendio

How to Choose a SOC 2 Auditor: 6 Questions to Ask
sponsored by Ostendio
RESOURCE: For organizations looking to conduct a SOC 2 audit, choosing the right external audit firm can be a daunting, yet crucial, process. To make sure you choose the right partner, this article highlights 6 questions to consider during the selection process. Read on to find out what they are.
Posted: 04 Jun 2020 | Published: 27 Sep 2019

Ostendio

2020 SonicWall Cyber Threat Report
sponsored by SonicWall
WHITE PAPER: Each year is a constant struggle between cybercriminals attempting to conduct successful attacks and organizations defending their users and data. 2019 was a good year for organizations as malware attacks dropped by 6%. Read on to uncover key statistics and insights about last year’s cyberattack trends.
Posted: 04 Jun 2020 | Published: 04 Jun 2020

SonicWall
201 - 225 of 1178 Matches Previous Page    7 8 9 10 11 12    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info