IT Management  >   Systems Operations  >   Security  >  

Software Security Threats

RSS Feed   
Software Security Threats Reports
 
Bust Threats or Risk Getting Busted
sponsored by Cisco Umbrella
WEBCAST: In this webcast, learn the latest trends on top threats and best practices you can use to protect against threats in your organization. The webcast also reviews steps you can take to improve your threat detection, prevention and remediation efforts.
Posted: 02 May 2019 | Premiered: Mar 31, 2019

Cisco Umbrella

Naked Data
sponsored by Armor
WHITE PAPER: There have been many examples where organizations exposed files including sensitive consumer data. The exposures raised the specter of the cloud having no tolerance for innocent mistakes. However, cloud security posture management tools can help you avoid being another example of what can go wrong. Download this white paper to learn how.
Posted: 29 Apr 2019 | Published: 30 Apr 2019

Armor

Armor Monitored Web Application Firewall
sponsored by Armor
PRODUCT OVERVIEW: In this resource, learn about the Armor monitored WAF and how it gives you control over which traffic to allow or block to your web applications by defining customizable web security rules to stop OWASP Top 10 application attacks including SQL injections (SQLi), XML external entity (XXE) attacks, and cross-site scripting (XSS) attacks.
Posted: 02 May 2019 | Published: 02 May 2019

Armor

IDC MarketScape: Worldwide DDoS Prevention Solutions 2019 Vendor Assessment
sponsored by NetScout Systems, Inc.
RESEARCH CONTENT: Distributed denial-of-service (DDoS) attacks are increasingly complex. Even though DDoS prevention technologies are more mainstream than a few years ago, choosing the right vendor or service is challenging. In this research report, explore an assessment of providers offering DDoS prevention and mitigation technologies and services.
Posted: 08 May 2019 | Published: 31 Mar 2019

NetScout Systems, Inc.

Secureworks Red Cloak Threat Detection and Response Application
sponsored by Dell SecureWorks
RESEARCH CONTENT: Threat prevention isn't enough, as cyberthreats can circumvent threat defenses, and compromise IT assets. This is where threat detection and response come into play. The tools used for these tasks are referred to as security analytics and operations. In this research report, explore the state of the security analytics and operations market.
Posted: 21 May 2019 | Published: 31 May 2019

Dell SecureWorks

What is an Ounce of Cybersecurity Prevention Worth?
sponsored by Verizon
RESOURCE: Data breaches and their costs are a major risk to your business. But they are a risk that can be mitigated. Understanding theft tactics based on the experiences of others is critically important. In this resource, explore tactics to help prevent data breaches and security holes in your organization.
Posted: 23 May 2019 | Published: 11 Feb 2019

Verizon

Red Cloak Threat Detection & Response
sponsored by Dell SecureWorks
RESOURCE: Security environments are now frustratingly fragmented. Even the most modern security stacks are a varied mix of vendors and tools. In this resource, learn how with Red Cloak Threat Detection & Response you can take security into your own hands and transform the way your security analysts detect, investigate and respond to threats.
Posted: 22 May 2019 | Published: 22 May 2019

Dell SecureWorks

A Guide to Achieving SaaS Security and Compliance
sponsored by Forcepoint
WHITE PAPER: The nature of today's organizations is being driven by employees' demands for greater flexibility, productivity, and mobility. While SaaS applications fulfill these user demands, they also pose visibility and control challenges for IT. In this white paper, learn how SaaS applications can be effective at meeting users' needs without posing risks.
Posted: 14 May 2019 | Published: 14 May 2019

Forcepoint

Avoid Cyberattacks and Save Money by Holding Less Data
sponsored by Evident
WHITE PAPER: Now more than ever before, data is at the heart of every organization. However, cybercriminals have increasingly targeted data because it's both monetarily lucrative and easier to steal than actual dollars. In this white paper, learn how your company can protect itself from a breach, and how data minimization can reduce the risks of cyberattacks.
Posted: 29 Apr 2019 | Published: 29 Apr 2019

Evident

Introducing The F5 Advanced WAF
sponsored by F5 Networks
WEBCAST: The F5 Advanced Web Application Firewall (WAF) provides a set of security features that can help keep your Web Applications safe from attack. In this webcast, John Wagnon, Senior Solution Developer at DevCentral, outlines many of the key features offered in the F5 Advanced WAF.
Posted: 08 May 2019 | Premiered: Apr 30, 2018

F5 Networks
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement