IT Management  >   Systems Operations  >   Security  >  

Software Security Threats

RSS Feed   
Software Security Threats Reports
 
Securing Your SWIFT Environment Using Micro-Segmentation
sponsored by Illumio
WHITE PAPER: All SWIFT customers must self-attest to their compliance with the SWIFT Customer Security Program (CSP). The program is designed to respond to the wave of cybercrime targeting SWIFT installations. In this white paper, explore 3 challenges that prove especially difficult for SWIFT customers looking to achieve compliance.
Posted: 25 Oct 2019 | Published: 25 Oct 2019

Illumio

The Essential Cybersecurity Toolkit for SMBs
sponsored by Datto, Inc.
EBOOK: The following e-book demonstrates practical advice and easy tips for training employees on cybersecurity and industry best practices. Download now for guidance on how to spot a cyber-scam, 4 must-haves for a layered cybersecurity approach, and more.
Posted: 14 Oct 2019 | Published: 14 Oct 2019

Datto, Inc.

Efficient Threat Remediation with Check Point and ServiceNow
sponsored by ServiceNow
RESOURCE: Discover how security administrators can create, orchestrate, and efficiently process block list requests for malicious sites using ServiceNow Security Operations and Check Point Next Generation Threat Prevention Gateways.
Posted: 24 Oct 2019 | Published: 24 Oct 2019

ServiceNow

Fighting Retail Fraud: Shut Bad Actors Out and Keep Good Customers Rolling In
sponsored by LexisNexis® Risk Solutions
RESOURCE: The use of the mobile channel for purchasing digital and/or physical goods has grown significantly over the past year. This retail evolution to the mobile channel widens the landscape for fraudsters and brings new challenges specific to the mobile channel. In this infographic, learn about the top 3 mobile channel challenges and how to fight back.
Posted: 24 Oct 2019 | Published: 24 Oct 2019

LexisNexis® Risk Solutions

From readiness to transformation: How to address privacy regulations and keep your data safe
sponsored by IBM
WHITE PAPER: This white paper will provide a high-level overview of key data privacy trends and regulations — both current and soon-to-be enacted — along with conceptual frameworks organizations can reference to begin addressing these changes
Posted: 22 Oct 2019 | Published: 22 Oct 2019

IBM

Think your Business is Too Small to be at Risk of a Security Breach? Think Again.
sponsored by PortSys
RESOURCE: Find out how SMBs on a budget can encrypt data and more effectively control access to it without having to decimate their IT budget to do so.
Posted: 16 Oct 2019 | Published: 16 Oct 2019

PortSys

5 Reasons You Should Automate Cybersecurity Incident Response
sponsored by Ayehu
EBOOK: Making security automation a core element of enterprise IT defense schemes isn’t just a dreamy vision of the future. It’s a reality that’s available & working today. In this e-book, discover the top 5 reasons you should automate your organizations’ responses to cybersecurity.
Posted: 06 Nov 2019 | Published: 06 Nov 2019

Ayehu

Securing Cloud-Native Kubernetes Applications
sponsored by Radware
WHITE PAPER: When businesses look to optimize and accelerate application development life cycles and deliver their applications in public clouds, security becomes a greater challenge. In this white paper, learn how to ensure the timely development and deployment of secure applications across hybrid computing environments.
Posted: 23 Oct 2019 | Published: 23 Oct 2019

Radware

GandCrab Ransomware Analysis Report
sponsored by Versa Networks
WHITE PAPER: A recent ransomware which has become viral since January 2018 is named GandCrab. The developers have been continuously updating and releasing improved versions, with approximately 6 variants observed to date. This white paper will take a quick look into these variants and provide insightful into how they are impacting users.
Posted: 16 Oct 2019 | Published: 16 Oct 2019

Versa Networks

DevSecOps and the Problem of Machine-Scale Data
sponsored by Ionic Security
RESOURCE: The amount of data being created daily is growing exponentially, and manual processes can’t scale. With data growth comes increasing complexity and higher importance for security to be integrated into the SDLC. Discover the opportunities and threats of machine-scale data, how to maintain agility, and the implications this has for DevSecOps.
Posted: 01 Nov 2019 | Published: 08 Oct 2019

Ionic Security
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement