IT Management  >   Systems Operations  >   Security  >   Security Management  >   Vulnerability Management  >  

Security Vulnerabilities

RSS Feed   
Security Vulnerabilities Reports
 
Tackling Cyber Threats in a Newly Distributed Workforce
sponsored by IntelliGO
WHITE PAPER: As organizations scramble to deal with the logistical kinks that come from hastily enabling a newly remote workforce, their IT teams must remain vigilant and flexible when it comes to securing tech assets amid changing circumstances. How can you make sure you’re staying on top of threats? Read this white paper to learn where to start.
Posted: 20 Oct 2020 | Published: 20 Oct 2020

IntelliGO

DDoS Attacks are Growing in Frequency and Scale During the Pandemic. What Can Businesses Do?
sponsored by Akamai Technologies
RESOURCE: Remote work means DDoS attacks loom larger than ever. On June 25, 2020, a European bank was hit with an attack that generated 809 million packets per second. The velocity and volume of these attacks can be overwhelming, but the right strategy can keep your network safe. Read this article to learn 6 considerations for mitigating DDoS attacks.
Posted: 13 Aug 2020 | Published: 13 Aug 2020

Akamai Technologies

Swinburne University of Technology Meets Its Essential 8 Mandate
sponsored by Ivanti ANZ
CASE STUDY: Following a risk assessment, Swinburne University determined that following the ASD Essential 8 recommended cybersecurity mitigation strategies would help ensure the strongest form of defense against a cyberattack. In this case study, learn how Swinburne was able to implement the ASD Essential 8 by implementing Ivanti's security portfolio.
Posted: 30 May 2019 | Published: 30 May 2019

Ivanti ANZ

2020 Webroot Threat Report
sponsored by Webroot
ANALYST REPORT: In 2019, 93.6% of malware detected was only seen on a single PC. This is significant because it shows that it only takes one mistake from one employee to compromise a network. Organizations are looking for ways to defend against threats, but to do so, they must first know their enemy. Read this threat report to see the statistics of cybersecurity.
Posted: 28 Jul 2020 | Published: 28 Jul 2020

Webroot

A Field Guide to Understanding the Tactics, Techniques and Attack Vectors Used by Cybercriminals
sponsored by Radware
WHITE PAPER: The threat landscape is as diverse as it is sophisticated, thanks largely to the fact that the skills and tools behind launching cyberattacks have become commoditized. In Radware's Hacker's Almanac, gain an understanding the threat landscape and current tactics, techniques and procedures used by today's cybercriminals.
Posted: 20 Sep 2019 | Published: 20 Sep 2019

Radware

BlackBerry MITRE ATTACK APT29 Evaluation
sponsored by BlackBerry
WHITE PAPER: In conjunction with the framework, MITRE ATT&CK also conducts security evaluations without commentary or bias – the purpose is to provide objective information regarding how vendors fare against certain threat techniques. Download this report for BlackBerry’s analysis and interpretation of MITRE ATT&CK APT29 evaluation data.
Posted: 31 Jul 2020 | Published: 31 Jul 2020

BlackBerry

Combating the Threat of Business Email Compromise
sponsored by Mimecast
WHITE PAPER: According to the FBI, business email compromise (BEC) cost U.S. organizations more than $1.7 billion last year. According to Gartner, BEC phishing attacks will double every year.In this white paper, read about some of the key challenges business face when it comes to email security and how to be prepared for coming threats.
Posted: 20 Jul 2020 | Published: 20 Jul 2020

Mimecast

Automated Assurance is Key to the Automation of 5G and SD-WAN Operations
sponsored by Spirent
WHITE PAPER: 5G and SD-WAN are significant emerging technologies hitting the market. However, as operations automation becomes more pervasive, these technologies will need to be rigorously checked for vulnerabilities. Luckily, automation can help. Read this white paper to understand automated assurance.
Posted: 15 Oct 2020 | Published: 31 Mar 2019

Spirent

How to Get the Most Value out of Your Penetration Test
sponsored by RSA Conference
WEBCAST: At RSA Conference, Ed Skoudis from the SANS Institute facilitated a problem-solving discussion in the RSAC Engagement Zone. Jump into this webcast to see how he follows up on that discussion. He shares insights into what he learned from the community on getting the most value from penetration testing.
Posted: 07 Jul 2020 | Premiered: May 5, 2020

RSA Conference

State and Local Governments Chart Their Path Toward Improved Digital Security
sponsored by Dell Technologies
RESOURCE: State and local governments are under attack from cyberespionage and malware, and they are exposed to a broad variety of security risks. New approaches are needed to make government IT less vulnerable. In this infographic, learn 7 best practices for cybersecurity in state and local governments.
Posted: 12 May 2020 | Published: 12 May 2020

Dell Technologies
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info