IT Management  >   Systems Operations  >   Security  >  

Software Security Threats

RSS Feed   
Software Security Threats Reports
 
Business Email Compromise: The Catalyst for Mailbox Level Email Security
sponsored by Ironscales
WHITE PAPER: As phishing attack grow in sophistication, organizations must establish security protocols to meet these evolving threats. One emerging threat is business email compromise (BEC), which affects more than 500 businesses per day. In this white paper, go in-depth into BEC, what makes it so successful and how organizations can mitigate the risks.
Posted: 13 Jan 2020 | Published: 13 Jan 2020

Ironscales

Making MITRE ATT&CK Actionable
sponsored by ThreatQuotient
WEBCAST: In this webinar, join technical experts at ThreatQuotient as they outline merging MITRE ATT&CK with SIEM visibility and threat intelligence in the ThreatQ platform to unify threat detection efforts. Interested in seeing how this platform works? Watch the webinar to learn more.
Posted: 23 Jan 2020 | Premiered: Jan 23, 2020

ThreatQuotient

How to Safeguard Against Cross-Site Scripting (XSS) Attacks
sponsored by Tala Security
WHITE PAPER: Cross-site scripting (XSS) attacks are a rising concern for all industries and will continue to be a favored strategy for cybercriminals. With a proactive and strategic approach, your organization can ensure web application security. Read on to learn more.
Posted: 17 Jan 2020 | Published: 17 Jan 2020

Tala Security

6 Practical Approaches to Bridge the Cybersecurity Talent Shortage
sponsored by Alert Logic
WHITE PAPER: Many organizations are adopting new and emerging technologies faster than they can address related security issues. The situation is further exacerbated by the industry’s skills and resources gap. In this white paper, discover 6 practical approaches to bridge the cybersecurity skills and resource gap in your organization.
Posted: 17 Jan 2020 | Published: 17 Jan 2020

Alert Logic

Closing the Website Security Gap: Why a WAF Is Not Enough
sponsored by Tala Security
WHITE PAPER: Although web application firewalls (WAFs) have a come a long way in recent years, they remain ineffective as a standalone security solution against Magecart cyberattacks. This white paper underlines the shortcomings of WAFs and highlights the importance of protecting the browser-side and the client-side from threats.
Posted: 15 Jan 2020 | Published: 15 Jan 2020

Tala Security

Whack-a-phish
sponsored by Area 1 Security
WHITE PAPER: Traditional email security defenses rely on past data to detect the next attack, and therefore can’t defend against modern continually evolving phishing methods. Protection from modern attacks requires a proactive approach to security. Read on to learn more about forward-looking security technology for phishing attacks.
Posted: 09 Jan 2020 | Published: 09 Jan 2020

Area 1 Security

6 Steps to Securing Enterprise Data
sponsored by BigID
WHITE PAPER: Organizations of all sizes need a strong data-centric security policy. Start with these 6 key steps to secure sensitive and personal data across the enterprise.
Posted: 09 Jan 2020 | Published: 09 Jan 2020

BigID

Preventing Unknown, Zero-Day Attacks
sponsored by Checkpoint Software Technologies
DATA SHEET: The increasing reliance of mobile devices to conduct business operations organizations vulnerable to hackers who would look to expose these weaknesses. In this solution brief, learn more about the benefits and features of Check Point SandBlast Mobile and discover how it compares to similar industry offerings.
Posted: 23 Dec 2019 | Published: 23 Dec 2019

Checkpoint Software Technologies

Board Ready Endpoint Resilience in 5 Steps
sponsored by Malwarebytes
EBOOK: The increasing popularity in mobile workspaces and BYOD devices has transformed the way CISOs have to think about security. With cyberattacks on the rise, implementing endpoint resilience has become critical. In this e-book, uncover the 5 essential steps to establishing endpoint security and the recommendations for achieving each step.
Posted: 23 Jan 2020 | Published: 23 Jan 2020

Malwarebytes

ThreatQ for Critical Infrastructure
sponsored by ThreatQuotient
RESOURCE: Critical infrastructure attacks can have long-term impacts on vital industries like power, healthcare, defense, food production and more. In this edition of ThreatQuotient’s Industry Brief, take an in-depth look into the challenges and key statistics surrounding critical infrastructure security.
Posted: 20 Jan 2020 | Published: 20 Jan 2020

ThreatQuotient
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info