IT Management  >   Systems Operations  >   Security  >  

Spyware Threats

RSS Feed   
Spyware Threats Reports
 
The State of Detection Report 2019
sponsored by Fidelis
ANALYST REPORT: Cybersecurity hasn't gotten any easier. That should hardly be a revelation to security professionals in the field, who every year are seeing their cyber terrain grow larger and larger. In The State of Threat Detection Report 2019, explore Fidelis' findings from a survey of 300 cybersecurity professional on key cybersecurity challenges.
Posted: 24 Sep 2019 | Published: 24 Sep 2019

Fidelis

The Business Guide to Ransomware
sponsored by Datto, Inc.
EBOOK: Download this e-book for several tactics to protect, avoid, and recover both you and your customers from ransomware attacks, as well as an examination of how today’s ransomware operates and 10 common strains to watch out for.
Posted: 15 Oct 2019 | Published: 15 Oct 2019

Datto, Inc.

Small Organizations Still Need Big Security
sponsored by Blackberry Cylance
WHITE PAPER: Damage to a company's reputation is a major concern, so all companies, large and small, seek brand protection in every medium. Where small and large enterprises diverge is in resources to combat these threats. In this white paper, learn about cybersecurity strategies that small business can implement to help secure their organization.
Posted: 20 Sep 2019 | Published: 31 Jul 2019

Blackberry Cylance

Cybercrime The New Downtime Threat to SMBs
sponsored by Avast Software
RESOURCE: A growing number of small to medium-sized businesses are falling victim to cybercrime. However, not all SMBs are aware of the risks and implications. In this infographic, learn why SMBs need a proactive security strategy that includes services that protect data, devices and people to eliminate gaps in protection.
Posted: 11 Oct 2019 | Published: 11 Oct 2019

Avast Software

Manufacturing Solution Brief
sponsored by enSilo
PRODUCT OVERVIEW: The manufacturing industry has been heavily targeted by cyberattacks in recent years. Download this solution brief to learn how enSilo delivers a complete endpoint protection platform that is able to uniquely meet the security and operational needs of the manufacturing industry.
Posted: 20 Sep 2019 | Published: 20 Sep 2019


Security Podcast: Is Fax the Achilles Heel of Your Compliance and Cybersecurity Plan
sponsored by J2 Cloud Services
PODCAST: Today, many organizations have little to no security and compliance strategies for fax machines, printers or services. This represents a very real vulnerability. In this podcast, Aaron Goldberg, CEO of Content 4 IT and Brad Spannbauer, Senior Director of Product Management at J2 Cloud Services, discuss 5 fax security disasters in the making.
Posted: 23 Sep 2019 | Premiered: Sep 23, 2019

J2 Cloud Services

Make Sure Your Organization is Mature Enough for SOAR
sponsored by IBM
ANALYST REPORT: A SOAR platform is a valuable tool for organizations who have made appropriate investments in their security operations processes. This recent research from Gartner looks at the necessary preparations that security leaders need to make so that the deployment of a SOAR solution will improve the efficiency of their incident response.
Posted: 25 Sep 2019 | Published: 27 Mar 2019

IBM

VMs vs. containers: Which is better for security?
sponsored by ComputerWeekly.com
EGUIDE: Practitioners are mandated to make technology risk decisions, and many of those decisions involve one or both of virtualization and containerization technologies. When comparing VMs vs. containers, it is natural to ask, which is more secure? Find out in this e-guide.
Posted: 02 Oct 2019 | Published: 02 Oct 2019

ComputerWeekly.com

Observations From the Front Lines of Threat Hunting
sponsored by Crowdstrike
WHITE PAPER: This mid-year report provides a summary of OverWatch’s threat hunting findings from the first half of 2019. Download now to review intrusion trends during that time frame, insights into the current landscape of adversary tactics and delivers highlights of notable intrusions OverWatch identified.
Posted: 11 Oct 2019 | Published: 11 Oct 2019


Web Application Firewall Vendor Comparison Report
sponsored by Barracuda
ANALYST REPORT: The following vendor-agnostic Gartner report provides a comprehensive overview of the web application firewall (WAF) market and dissects the strengths and drawbacks of 12 WAF vendors. Download now to use this exclusive resource to decide for yourself which solution provides the best fit for your enterprise.
Posted: 14 Oct 2019 | Published: 17 Sep 2019

Barracuda
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement