Build Identity Verification Processes with the Power of AI
sponsored by Jumio
EGUIDE:
This expert e-guide explores recent developments in AI-powered identity verification technology. Get tips on how to outsmart potential fraudsters by finding out how you can improve your identity verification practices by building machine learning and other AI-based technologies into your security strategy.
Posted: 19 Nov 2018 | Published: 15 Nov 2018
|
|
|
Why Web Application Attacks are a Growing Threat to the Cloud
sponsored by Oracle Dyn
ESSENTIAL GUIDE:
New research found that web application attacks present a significant threat to cloud environments. Find out what cybersecurity expert, Rob Shapland, has to say as he explains these risks and what enterprises should do about them.
Posted: 07 Sep 2018 | Published: 07 Sep 2018
|
|
|
Healthcare Security: How You Can Ward Off Insider Threats
sponsored by Cisco Umbrella
EGUIDE:
One of the greatest healthcare security threats comes from users within an organization. In this expert handbook, John Nye shares recommendations for technologies that healthcare organizations can use to fight against insider security threats.
Posted: 05 Sep 2018 | Published: 04 Sep 2018
|
|
|
Cryptojacking Attacks May Not Challenge Ransomware Dominance
sponsored by Cisco Umbrella
EGUIDE:
Cryptojacking attacks are on the rise, but experts are unsure if the threat can overtake ransomware as the cryptomining strategy of choice.Do you think cryptojacking could become more common than ransomware? Industry experts weigh in on the future of cryptomining inside.
Posted: 28 Aug 2018 | Published: 12 Apr 2018
|
|
|
Cryptojacking Emerging as a New Threat to Healthcare
sponsored by Cisco Umbrella
EGUIDE:
With the increasing trend of cryptojacking, organizations must take action against attackers looking to take advantage of their environment. Discover which appropriate steps you can take to fight cybercrime today.
Posted: 27 Aug 2018 | Published: 31 Jul 2018
|
|
|
Recent Ransomware Attacks Got you? Don't Cry; Fight Back!
sponsored by TechTarget Security
EBOOK:
Recent ransomware attacks may make you WannaCry, but there's no time for that. It's time to learn what you can do to minimize the threat and how to deal if the worst happens. Start here to discover how to fight back against hackers, today.
Posted: 24 Aug 2018 | Published: 24 Aug 2018
|
|
|
How to Prevent Cloud Cryptojacking Attacks on your Enterprise
sponsored by Cisco Umbrella
EGUIDE:
Cloud cryptojacking attacks are a newer threat targeting enterprises. Cybersecurity expert Rob Shapland – an ethical hacker who specializes in simulating advanced cyberattacks against corporate networks – explains what safeguards you should have in place to prevent these attacks.
Posted: 24 Aug 2018 | Published: 31 May 2018
|
|
|
Enterprises Wear Large Targets in Cloud Cryptomining Hacks
sponsored by Cisco Umbrella
EGUIDE:
Cryptojacking, the unauthorized use of a computer to mine cryptocurrencies, is on the rise and has put security teams on alert. For this reason, enterprises are adjusting their strategies and applying dedicated approaches to cloud security. Read on to find out how your organization can join this trend to protect its most sensitive data.
Posted: 23 Aug 2018 | Published: 28 Mar 2018
|
|
|
6 Ways to Prevent Ransomware in Health IT
sponsored by Cisco Umbrella
EGUIDE:
With so much at risk for healthcare organizations, IT must implement proactive steps to help mitigate their risks and keep attacks at bay. In this e-guide, you'll uncover the ins and outs of 6 ransomware prevention tips healthcare organizations should include as part of their ongoing security strategy.
Posted: 12 Jul 2018 | Published: 12 Jul 2018
|
|
|
By the Numbers: Ransomware and Patient Data Breaches in Health IT
sponsored by Cisco Umbrella
EGUIDE:
Take a look at how ransomware and malware strikes on healthcare organizations intensified last year, doubling to 64 incidents reported to federal officials. This e-guide is packed with data surrounding this security epidemic in the healthcare industry.
Posted: 12 Jul 2018 | Published: 12 Jul 2018
|
|
|
Get Smart About Threat Intel Tools and Services
sponsored by TechTarget Security
EBOOK:
Learn how threat intelligence tools can improve enterprise security and where they should fit into the broader security scheme.
Posted: 25 Jun 2018 | Published: 25 Jun 2018
|
|
|
Integrating IAM into your Digital Workspace
sponsored by Citrix
EGUIDE:
Learn how you can integrate identity and access management products into your digital workspace, and explore how security policies can take advantage of user's devices to provide context for determining access on the IT side.
Posted: 30 May 2018 | Published: 24 May 2018
|
|
|
Fundamentals of Endpoint Security: Anti-Malware Protection
sponsored by Citrix
EGUIDE:
Access this e-guide to learn about anti-malware protection and how endpoint security technology can prevent malware from infecting end-user computers and corporate networks.
Posted: 29 May 2018 | Published: 29 May 2018
|
|
|
Ins and Outs of Setting up a SOC
sponsored by Respond Software
EGUIDE:
Find out why a security operations center (SOC) can be a valuable part of your organization's cybersecurity strategy. Learn how to set one up, from the 3 types of SOC employees needed to core principles that organizations should follow when setting up their SOC.
Posted: 29 May 2018 | Published: 25 May 2018
|
|
|
How to Make the Most of your Detection and Response
sponsored by Respond Software
EGUIDE:
Learn from Gartner analyst Anton Chuvakin and Drew Conry-Murray from Packet Pushers, about incident detection and response processes that an organization needs when starting out.
Posted: 23 May 2018 | Published: 18 May 2018
|
|
|
Adapt Security for Hybrid Cloud Environments
sponsored by Citrix
EGUIDE:
In this expert e-guide, find out how you can overcome the security challenges of hybrid cloud, and learn about the organizational and cultural changes that accompany this shift in security.
Posted: 23 May 2018 | Published: 18 May 2018
|
|
|
Automation in Cybersecurity
sponsored by Juniper Networks
EGUIDE:
During his RSA Conference keynote, Juniper CEO Rami Rahim encouraged leaders to be "agents of change" that embrace automation in cybersecurity and new training techniques. Find out how automation in cybersecurity emphasizes the working relationship between AI and humans to prevent attacks.
Posted: 04 May 2018 | Published: 04 May 2018
|
|
|
New Cloud Threats to Watch Out for in 2018
sponsored by Juniper Networks
EGUIDE:
Safeguarding your critical data is getting harder as threat actors embrace the advantages, and missteps, of cloud. Inside this expert guide, Kathleen Richards details what to watch out for in 2018.
Posted: 30 Apr 2018 | Published: 30 Apr 2018
|
|
|
Data Classification Services and Keeping Cloud Data Secure
sponsored by Data443
EGUIDE:
In this expert guide, Dave Shackleford details how data classification services can help organizations ensure their cloud data is secure.
Posted: 12 Mar 2018 | Published: 31 Aug 2016
|
|
|
GDPR Looms with Organizations Still Unprepared
sponsored by Data443
EGUIDE:
GDPR regulations are looming, and not every company is prepared. In this expert e-guide, explore how data management software suppliers are trying to help companies get on track and avoid stiff GDPR penalties.
Posted: 12 Mar 2018 | Published: 31 Dec 2017
|
|
|
Five Principles for Securing DevOps
sponsored by Veracode, Inc.
WHITE PAPER:
Access this white paper to learn the five principles that solutions seeking to integrate application security into DevOps and CI/CD must address.
Posted: 02 Feb 2018 | Published: 02 Feb 2018
|
|
|
How to update, automate your IR processes
sponsored by Booz Allen Hamilton
EGUIDE:
In the era of nonstop security threats, creating a cyber threat intelligence team and leveraging incident response (IR) tools can help with detection and automation of processes. Explore the tools and considerations for updating your IR processes.
Posted: 04 Jan 2018 | Published: 04 Jan 2018
|
|
|
How SMBs are Changing their Security Tactics
sponsored by Booz Allen Hamilton
EGUIDE:
Security has changed dramatically over the decades. In this e-guide, learn why firms look to security analytics to keep pace with cyber threats and how closer collaboration between departments, such as business continuity and information security, could help raise staff awareness.
Posted: 03 Jan 2018 | Published: 03 Jan 2018
|
|
|
Buyers Guide: Network Security Management
sponsored by Palo Alto Networks
WHITE PAPER:
When it comes to network security, organizations often repeat processes. In this buyers guide, access 10 features your network security management should include and the benefits of network security management. As an added bonus, quiz yourself to determine if it's time to move to network security management.
Posted: 28 Nov 2017 | Published: 28 Nov 2017
|
|
|
Guide to Early Application Testing and Understanding Dev and Ops Responsibilities
sponsored by IBM
EGUIDE:
Explore the importance of early application security testing. Learn from Owen Garrett, Head of Products for NGINX Inc., while he explains the security risks with containers and developing microservices.
Posted: 19 Sep 2017 | Published: 19 Sep 2017
|
|