IT Management  >   Systems Operations  >   Security  >  

Spyware Threats

RSS Feed   
Spyware Threats Reports
 
AWS Security Review by Rackspace and Alert Logic
sponsored by Rackspace
RESOURCE: This infographic provides an overview of Rackspace and Alert Logic’s free cybersecurity review. The goal of the review is to establish a clear understanding of the vulnerabilities within your AWS environment and compare those with industry benchmarks. Read on to learn more about the benefits of participating and find answers to FAQs.
Posted: 04 Jun 2020 | Published: 04 Jun 2020

Rackspace

Learn How to Enhance Visibility and Early Detection by Using the SOC Triad
sponsored by Vectra Networks
WEBCAST: In this podcast, join security experts and business leaders from Cybereason, Vectra and Splunk as they discuss how to enhance visibility and early detection by using the SOC triad. But what is the SOC triad? Give the podcast a listen to discover the 3 components of the SOC triad and learn how to operationalize it.
Posted: 29 May 2020 | Premiered: Apr 24, 2020

Vectra Networks

Application Control and Critical Infrastructure Protection
sponsored by VMware International Unlimited Company
DATA SHEET: Reducing unscheduled downtime of critical systems as a result of a cyberattacks should be at the top of every organization’s security to-do list for this year. VMware Carbon Black wants to help. Read this data sheet to learn about their App Control offering, designed to eliminate unplanned downtime and protect critical systems at scale.
Posted: 18 May 2020 | Published: 27 Jan 2020

VMware International Unlimited Company

What Is DevSecOps and How Should It Work?
sponsored by Acunetix
RESOURCE: Poised to be the successor to DevOps, DevSecOps is a relatively new concept that aims to join the previously separate functions of DevOps and SecOps into a unified environment that provides conditions for secure application development. Read this article to learn more about DevSecOps, its history and how you can get started.
Posted: 03 Jun 2020 | Published: 20 Aug 2019

Acunetix

Keep You and Your Company Digitally Safe at Home
sponsored by HP Inc
WHITE PAPER: While more employees than ever are working from home to stay safe, this has exposed a new vulnerability—malware and cyberattacks. So many employees working from home and away from many IT protections has led to a surge in cyberattacks. Check out these considerations, and 8 work from home best practices, to stay safe online.
Posted: 20 May 2020 | Published: 01 Mar 2020

HP Inc

Executive Brief: The Dark Side of Encryption
sponsored by SonicWall
WHITE PAPER: Encryption plays a key role in providing security for digital interactions. However, these encryption protocols can also serve as a lucrative vector for cybercriminals, allowing them to gain easy access to networks. This white paper explores how (and why) organizations should decrypt traffic in order to identity and mitigate potential threats.
Posted: 01 Jun 2020 | Published: 01 Jun 2020

SonicWall

A cybersecurity professional's guide to securing a remote workforce
sponsored by Forcepoint
EBOOK: Mobile devices and cloud-based applications enable teams to work remotely and improve productivity, agility, and innovation. However, as these environments grow so too do the security challenges. In this e-book, explore today’s security risks and discover how to secure and support today’s remote workforce, along with their devices.
Posted: 28 May 2020 | Published: 28 May 2020

Forcepoint

Building a Successful Cloud Infrastructure Security & Compliance Practice
sponsored by CloudHealth by VMware
WHITE PAPER: In order to implement effective cloud security, various teams and stakeholders across the organization need to work together to overcome the emerging security and compliance challenges. This white paper provides a comprehensive set of guidelines for organizations to streamline their collaboration efforts. Read on to learn more.
Posted: 21 May 2020 | Published: 21 May 2020

CloudHealth by VMware

Vulnerability Remediation in Three Steps
sponsored by Vulcan
RESOURCE: As organizational environments become increasingly complex and security tools more disparate, the teams responsible for vulnerability remediation find themselves dealing with an overwhelming workload. In this article, discover 3 easy steps organizations can take to lower vulnerability risk and improving security posture.
Posted: 20 May 2020 | Published: 28 Nov 2019

Vulcan

IAM Leaders’ Guide to Privileged Access Management
sponsored by Centrify Corporation
RESOURCE: While traditional identity and access management (IAM) tools offer control of standard user access, they fail to manage shared use of privileged accounts or administrator privilege elevation. This Gartner report provides a comprehensive analysis of privileged access management, designed to be the next step in IAM.
Posted: 20 May 2020 | Published: 22 Jul 2019

Centrify Corporation
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info