IT Management  >   Systems Operations  >   Security  >  

Spyware Threats

RSS Feed   
Spyware Threats Reports
 
Attacking and Defending a Distributed Workforce
sponsored by ServiceNow
WHITE PAPER: The shift to a distributed, remote workforce has exposed businesses to new attack vectors, including confidentiality threats, remote business process threats and availability threats, all of which alter company risk profiles. What does this mean for network professionals and risk management? Read this white paper to get the answer.
Posted: 11 Nov 2020 | Published: 11 Nov 2020

ServiceNow

Remote Work Demands a Zero-Trust Approach for Both Apps and Users
sponsored by Citrix
RESOURCE: The newly remote workforce made company networks much more vulnerable and open to attacks. Implementing a modern zero-trust approach helps secure the workforce by continuously reauthenticating users. Click on this resource to read up on how AI and ML greatly enhances the zero-trust model.
Posted: 19 Nov 2020 | Published: 19 Nov 2020

Citrix

Business Continuity Management: Planning, Disaster Recovery & Crisis Response
sponsored by ServiceNow
PRODUCT OVERVIEW: Business continuity management (BCM) tools are an effective way for organizations to ensure crisis preparation and disaster recover plans are in place prior to an unforeseen disruption. This solution brief highlights the key features and capabilities of ServiceNow’s BCM tool – read on for more information.
Posted: 12 Nov 2020 | Published: 12 Nov 2020

ServiceNow

Webinar 6 – MITRE ATT&CK as a Framework for Cloud Threat Investigation
sponsored by McAfee
WEBCAST: In the continuous hunt for elusive cyberthreats, the most vulnerable assets – in this case, the cloud – must be considered. As it stands, most organizations have a low number of experts dedicated to cloud threats, and so technology must pick up the slack. Watch this webcast to learn how the MITRE ATT&CK framework can help to mitigate cloud attacks.
Posted: 11 Nov 2020 | Premiered: Nov 11, 2020

McAfee

2020 Payment Security Report
sponsored by Verizon
RESEARCH CONTENT: Each year, Verizon releases a Payment Security Report, which aggregates findings across a number of security and compliance subject areas into valuable insights designed to help CISOs understand and overcome key security pitfalls, operational challenges and compliance roadblocks – read on for this year’s report.
Posted: 11 Nov 2020 | Published: 11 Nov 2020

Verizon

Modernize Your Video Security Solution with AI and Analytics
sponsored by Motorola, Inc.
WHITE PAPER: Within the next 5 years, there will be around 45 billion cameras on Earth. This abundance of information and data far outweighs our ability to process and analyze all this information on our own. In this white paper, learn about Motorola’s Avigilon, an assistive AI technology that helps security operators to detect critical events.
Posted: 06 Nov 2020 | Published: 06 Nov 2020

Motorola, Inc.

Market Guide For Crisis/Emergency Management Solutions
sponsored by ServiceNow
RESEARCH CONTENT: The 2020 pandemic has led security and IT leaders to reevaluate their current crisis/emergency management (C/EM) programs and consider making alterations based on what they’ve learned from COVID-19. This Gartner Market Guide provides an overview of top C/EM tools, required capabilities and strategic recommendations – read on to get started.
Posted: 10 Nov 2020 | Published: 21 Aug 2020

ServiceNow

Endpoint Protection Best Practices to Block Ransomware
sponsored by Sophos
WHITE PAPER: Ransomware attacks are becoming increasingly costly – in fact, the average global cost to remediate an attack is over $700,000. One of the best ways to protect against ransomware attacks is with properly configured endpoint protection. Read on to discover best practices for configuring your endpoint protection against ransomware.
Posted: 20 Nov 2020 | Published: 20 Nov 2020

Sophos

The Evolution of Evidence Collection
sponsored by Aptible
EBOOK: Evidence collection is mundane & exhausting, and what’s worse is that it can happen once a quarter or more. But despite its time-consuming nature, evidence collection is critical to passing an audit & proving compliance. By reading this guide, you can learn how to leverage automation to make evidence collection a bit less painful.
Posted: 16 Nov 2020 | Published: 16 Nov 2020

Aptible

Securing Azure Environments: Insights from PetSmart, Microsoft & Barracuda
sponsored by Barracuda
VIDEO: Microsoft Azure plays an important role in many organizations’ digital transformation initiatives. As such, it becomes critical to understand the capabilities, limitations and potential benefits of Azure. Watch this webinar to gain insights into Azure from experts at PetSmart, Microsoft and Barracuda.
Posted: 23 Nov 2020 | Premiered: 23 Nov 2020

Barracuda
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info