IT Management  >   Systems Operations  >   Security  >  

Software Security Threats

RSS Feed   
Software Security Threats Reports
The 2020 State of Security Operations
sponsored by Palo Alto Networks
RESEARCH CONTENT: As a result of siloed and overly-complicated security operations, analysts are left to process a massive volume of alerts – leading to fatigue and subpar security outcomes. To better understand the state of SecOps, Palo Alto Networks commissioned Forrester to conduct a study. Read on to unlock your copy.
Posted: 17 Nov 2020 | Published: 17 Nov 2020

Palo Alto Networks

Next Generation Endpoint Protection
sponsored by Claranet
WHITE PAPER: Traditional cybersecurity is no match for today’s endpoint security threats – so does that mean antivirus (AV) is dead? This buyer’s guide provides an overview of why traditional tactics – like AV – aren’t working, a new approach to endpoint security, and an evaluation of next-generation endpoint protection vendors – read on to get started.
Posted: 23 Nov 2020 | Published: 23 Nov 2020


Case Study: Protecting Trusted Insiders
sponsored by Dtex
CASE STUDY: Recently, a slew of invoice-themed malicious phishing emails were found to have penetrated a customer’s network at a large energy company. What was worse? They had very limited visibility into the attack. Read this case study to learn how this organization was able to identify, understand and mitigate future targeted phishing attacks.
Posted: 23 Nov 2020 | Published: 23 Nov 2020


The Role of Biometrics in Multi-Factor Security
sponsored by BIO-key International
EGUIDE: Biometrics offers organizations an additional method of authentication – therefor adding to their security. However, there are limitations to consider. Read this e-guide for a closer look at these concern areas and how to address them.
Posted: 12 Nov 2020 | Published: 28 Oct 2020

BIO-key International

Data Security Drives Tallaght University Hospital’s Digital Transformation
sponsored by VMware International Unlimited Company
CASE STUDY: Tallaght University Hospital (TUH) is one of the largest capital investments in healthcare ever undertaken by the Irish Government. Through micro-segmentation, TUH has strengthened its security, protecting patient data and corporate reputation through a stable platform. Read the full case study to get a look at how TUH found their partner.
Posted: 17 Nov 2020 | Published: 31 Mar 2020

VMware International Unlimited Company

Taking Control of Your Post-COVID-19 Budget
sponsored by DomainTools
WEBCAST: With attackers taking advantage of the pandemic, threat surfaces increasing with remote work and budgets being reduced or postponed, security teams face a trifecta of challenges in maintaining or obtaining the resources they need to defend their organization. Watch this webcast featuring a CISO to learn how to make the most of the tools you have.
Posted: 25 Nov 2020 | Premiered: Nov 25, 2020


5 Ways a CISO Can Tackle the Cybersecurity Skills Shortage Now
sponsored by Claranet
WHITE PAPER: Every CISO knows that finding skilled security staff these days is not only hard but getting harder. In this white paper, uncover 5 practical steps you can take to help you tackle the cybersecurity skills shortage now.
Posted: 24 Nov 2020 | Published: 24 Nov 2020


Stopping BEC and EAC: Email Security in 2020
sponsored by Proofpoint
EBOOK: Email continues to be the leading vector in successful cyberattacks, leaving CISOs with the increasingly difficult responsibilities of protecting employee inboxes and stopping potential threats. Read this eBook for a comprehensive guide to stopping Business email compromise (BEC) and email account compromise (EAC) attacks.
Posted: 19 Nov 2020 | Published: 19 Nov 2020


Access & Protect your Data – Anywhere, Anytime
sponsored by HelpSystems
DATA SHEET: In this brief, learn how Titus and Dataguise can help bring together the most comprehensive approach to data protection to enable you to intelligently detect and secure your most valuable and vulnerable data wherever it resides.
Posted: 24 Nov 2020 | Published: 24 Nov 2020


IT Risk Management: Comparing Top Vendors & Offerings
sponsored by ServiceNow
RESEARCH CONTENT: Gartner predicts that by 2025, 50% of global midmarket and large enterprises will depend on risk management tools to address risks in their organizations. This Magic Quadrant report highlights and evaluates the most prominent risk management vendors and offerings in today’s market – read on to unlock the full report.
Posted: 23 Nov 2020 | Published: 11 Aug 2020


About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.


All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info