IT Management  >   Systems Operations  >   Security  >  

Spyware Threats

RSS Feed   
Spyware Threats Reports
Secure Access for the Small Business Owner
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper explains how Fortinet gives IT organizations a choice of WLAN offerings that provide seamless mobility within a single facility or between multiple sites to ensure business-critical apps maintain performance and reliability without impacting security.
Posted: 06 Feb 2018 | Published: 06 Feb 2018

Fortinet, Inc.

Externalized Dynamic Authorization in a MicroServices World
sponsored by Axiomatics
RESOURCE: This 3-part resource describes how your organization can apply Externalized Dynamic Authorization to an API and a microservices architecture that uses OAuth 2.0 flows or OpenID Connect (OIDC).
Posted: 20 Feb 2018 | Published: 20 Feb 2018


Threat Visibility and the Zero-Trust Virtual Data Center
sponsored by McAfee, Inc.
WHITE PAPER: Explore how a network security platform can help make zero-trust networking supremely practical, prevent intrusions, and detect targeted threats.
Posted: 12 Mar 2018 | Published: 12 Mar 2018

McAfee, Inc.

Mobile security moving to a unified approach
sponsored by
EGUIDE: This e-guide offers expert insights into how the current trends in mobile security strategy are showing a move from mobile device management, to enterprise mobile management and unified endpoint management, which indicates a move towards a unified approach to mobile security.
Posted: 28 Feb 2018 | Published: 28 Feb 2018

Cryptocurrencies are the New Frontier of Fraud
sponsored by Digital Shadows
WHITE PAPER: In this white paper, discover the most common methods used by criminal actors, including account takeovers, mining fraud and scams against initial coin offerings (ICOs). Then, learn how to update your security infrastructure to combat the changing cryptocurrency landscape in 2018.
Posted: 06 Feb 2018 | Published: 06 Feb 2018

Digital Shadows

Are You Protected Against Burst Attacks?
sponsored by Radware
RESOURCE: In this resource, get a step-by-step breakdown of burst attack detection and prevention, then learn why a system that combines on-premise and in-the-cloud protection is the best way to defend against burst attacks.
Posted: 06 Mar 2018 | Published: 15 Feb 2018


Governance, Risk, and Compliance: The Business and IT Challenge
sponsored by ServiceNow
RESOURCE: This resource reveals the 6 benefits of the ServiceNow Governance, Risk, and Compliance (GRC) unified platform. Learn how to effectively respond to security risks in real-time through continuous monitoring, prioritization and automation and uncover key use cases.
Posted: 20 Feb 2018 | Published: 20 Feb 2018


2018 Security Predictions
sponsored by Forcepoint
WHITE PAPER: This report predicts that the intersection of people, critical data, and IP will drive major security shifts coming in 2018. Read on to learn the 8 predictions.
Posted: 30 Jan 2018 | Published: 29 Dec 2017


Mitigating the SSL/TLS Cybersecurity Threat
sponsored by Radware
WHITE PAPER: 75% of web traffic will be encrypted by 2019, according to NSS Labs. Utilize this e-book to learn how to combat the growing number of complex encrypted web attacks as well as mitigate SSL/TLS cybersecurity threats.
Posted: 09 Mar 2018 | Published: 09 Mar 2018


Why Deception is Essential to Your Cybersecurity Strategy
sponsored by Illusive Networks
RESEARCH CONTENT: The average time that attackers live inside an enterprise network before being detected is 146 days. This Frost and Sullivan report details how deception security technologies can speed up detection and cause attackers to expose their vulnerabilities.
Posted: 08 Feb 2018 | Published: 28 Feb 2017

Illusive Networks

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement