IT Management  >   Systems Operations  >   Security  >  

Software Security Threats

RSS Feed   
Software Security Threats Reports
 
How companies in Asia-Pacific are addressing remote workplace security challenges
sponsored by Barracuda
WHITE PAPER: According to a recent study, 62% of APAC organizations said they wouldn’t have implemented remote working for another 5 years if it weren’t for COVID-19. The rapid adoption of the new normal has left many of these organizations vulnerable – read this white paper to learn how APAC organizations are addressing these security challenges.
Posted: 22 Sep 2020 | Published: 22 Sep 2020

Barracuda

Complete Endpoint Protection
sponsored by Cybereason
DATA SHEET: In today’s fast-paced and increasingly distributed business environment, protecting the growing population of endpoints from cyberthreats has become increasingly challenging. In this data sheet, discover the key capabilities of Cybereason’s endpoint protection platform and see if it aligns with your endpoint security strategy.
Posted: 10 Sep 2020 | Published: 10 Sep 2020

Cybereason

Putting the Trust in Zero Trust
sponsored by Lookout
WHITE PAPER: As workforces become more distributed and employees favor their BYOD devices, cybersecurity risks evolve to the point where traditional perimeter tactics are no longer relevant. Enter zero trust for mobile – a scalable approach to protecting every device within the network. Read on to learn more about this.
Posted: 22 Sep 2020 | Published: 22 Sep 2020

Lookout

Why Privileged Access Management Needs to Be Part of Your Virtualization Strategy
sponsored by Tehama
RESOURCE: As organizations rely more on remote capabilities for ensuring productivity during the new normal, cybercriminals have shifted their tactics to focus on this lucrative new vector. This article highlights emerging cyberthreat tactics and overviews the benefits of incorporating privileged access management (PAM) into virtualization strategies.
Posted: 21 Sep 2020 | Published: 17 Sep 2020

Tehama

How to Spot a Spear Phishing Email
sponsored by Vade Secure
RESOURCE: The personal nature of spear phishing emails can often make them hard to spot – especially when the sender adopts the persona of a trusted friend or colleague. To help you better spot these attempts, this resource highlights 5 details to look for to determine if an email is spear phishing or legitimate.
Posted: 18 Sep 2020 | Published: 18 Sep 2020


The Importance of Identity in Securing Your Business
sponsored by Okta
VIDEO: Identity management plays a critical role in an organization’s ability to secure an increasingly distributed workforce. This video underlines the importance of identity management for securing your business – particularly as it relates to the current pandemic and getting adjusted to the ‘new normal’.
Posted: 17 Sep 2020 | Premiered: 17 Sep 2020

Okta

Executive Summary 2020 Thales Data Threat Report
sponsored by Thales
ANALYST REPORT: Threat intelligence and information has never been more valuable to businesses. As such, an IDC survey commissioned by Thales found that 45% of respondents felt that their organizations would exceed their original 2020 security budgets. In APAC, the time for action is now. Read the full threat report to see how attitudes are changing.
Posted: 24 Sep 2020 | Published: 24 Sep 2020

Thales

Measuring and Improving Cyber Defense Using the MITRE ATT&CK Framework
sponsored by ThreatQuotient
WHITE PAPER: For the past 5 years, the MITRE ATT&CK project has grown into a cybersecurity staple – organizations and their security teams are adopting ATT&CK frameworks with blinding speed (and for good reason). Read this SANS paper to learn more about MITRE ATT&CK and discover why its popularity has skyrocketed.
Posted: 18 Sep 2020 | Published: 31 Jul 2020

ThreatQuotient

Phishing Attacks Advanced Techniques That Evade Detection
sponsored by Vade Secure
WHITE PAPER: The advancement of the phishing attack has left organizations looking for ways to identify the growing number of unique phishing URLs sent to their email servers. From spoofing addresses to exploiting credentials, these attacks grow more complex yearly. Don’t get left behind – read this comprehensive guide on phishing.
Posted: 22 Sep 2020 | Published: 22 Sep 2020


Why Seconds Matter
sponsored by Palo Alto Networks
WHITE PAPER: Todays' hackers are enjoying threats such as polymorphic malware that can avoid detection by constantly changing its identifiable features. How do security teams get around malleable threats? With inline machine learning, organizations may be able to stop threats while keeping business going. To learn more, read this comprehensive white paper.
Posted: 08 Sep 2020 | Published: 08 Sep 2020

Palo Alto Networks
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info