IT Management  >   Systems Operations  >   Security  >  

Spyware Threats

RSS Feed   
Spyware Threats Reports
Webinar: Proactively Protect Users with Email Incident Response
sponsored by PhishLabs
WEBCAST: Phishing attacks are growing in their frequency, and the damage caused by these campaigns is increasingly costly. It’s more critical than ever for security leaders to reconsider how they approach phishing detection. In this webinar, discover the key characteristics of an effective program and view a demo of PhishLabs’ Email Incident Response.
Posted: 18 Feb 2020 | Premiered: Feb 18, 2020


Privileged Access Credential Management for Loosely Connected Devices
sponsored by Cyber-Ark Software
DATA SHEET: The rise of privileged access and mobile endpoints has enabled organizations to improve their business operations. However, these accounts are vulnerable to attacks, requiring deliberate security planning. Download this data sheet to take a closer look at the features and benefits of the CyberArk Privileged Access Security Solution.
Posted: 17 Feb 2020 | Published: 17 Feb 2020

Cyber-Ark Software

Third Party Access is a Top 10 Organizational Risk
sponsored by CyberArk Software, Inc
RESOURCE: According to a recent study, as many as 90% of organizations grant critical access to third party vendors in order to maintain and support internal resources. This blog post highlights the results of a recent study into the common approaches and challenges to managing third party vendor access. Read on to unlock the results.
Posted: 26 Feb 2020 | Published: 05 Dec 2019

CyberArk Software, Inc

Bridge The IT/OT Divide to Bolster ICS Cybersecurity
sponsored by Fortinet, Inc.
WHITE PAPER: A growing trend among manufacturers is the digitization of the factory floor. A recent Forrester study sought to explore this trend and discover the common tactics and challenges regarding industrial control system (ICS) security. Download this white paper to uncover the full results from the Forrester study.
Posted: 26 Feb 2020 | Published: 30 Nov 2019

Fortinet, Inc.

Best Practices for Enterprise Phishing Protection
sponsored by PhishLabs
WHITE PAPER: According to the SANS Institute, 95% of data breaches start with phishing attacks. As these attacks become increasingly frequent and difficult to detect, organization’s need to rethink how they reduce the risk of these attacks. Download this white paper to uncover 15 best practices to boost your phishing detection and security.
Posted: 20 Feb 2020 | Published: 20 Feb 2020


Chart Industries Vaporizes Ransomware and Malware
sponsored by Malwarebytes
CASE STUDY: In this case study, follow the journey of Chart Industries, a global manufacturer and distributer, as they partner with Malwarebytes to address the growing risk of malware and phishing attacks targeted at mobile workers and endpoints. Download the report to see the results.
Posted: 13 Feb 2020 | Published: 13 Feb 2020


How to Create a Successful Cybersecurity Plan
sponsored by Malwarebytes
WHITE PAPER: According to a Ponemon Institute study, the average cost of a breach is $3.86 million. Aside from monetary costs, organizations also face potential legal and reputational ramifications. Download this paper to better understand the key areas for consideration to help get you started building a cybersecurity plan.
Posted: 12 Feb 2020 | Published: 31 Jul 2019


Emergency Communications of Southern Oregon
sponsored by Absolute Software Corporation
CASE STUDY: In this case study, discover how Emergency Communications of Southern Oregon (ECSO), an emergency dispatch facility, was able to save lives through their partnership with Absolute by ensuring endpoint visibility and security to increase efficiency and meet CJIS compliance.
Posted: 21 Feb 2020 | Published: 26 Apr 2019

Absolute Software Corporation

2019’s Most Convincing Phishing Emails
sponsored by Inky Technology
RESOURCE: In this blog from INKY, look at the 6 most convincing phishing email examples they found with their Phish Fence in 2019. These examples from believable people and companies can help you and your employees see what to look out for this year.
Posted: 10 Feb 2020 | Published: 10 Feb 2020

Inky Technology

Excessive Permissions Are Your No. 1 Cloud Threat
sponsored by Radware
WHITE PAPER: As organizations continue to migrate their workloads to public cloud environments, they should be mindful that they own the responsibility of safeguarding their data, regardless of who is hosting it. Download this white paper to discover how to address the top cloud migration security challenges.
Posted: 25 Feb 2020 | Published: 31 Mar 2019


About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.


All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info