IT Management  >   Systems Operations  >   Security  >  

Threat Mitigation

RSS Feed   
Threat Mitigation Reports
 
Risktech 100 2021
sponsored by MetricStream
RESEARCH CONTENT: Changes in the risk and compliance landscape were accelerated last year, likely due to the spread of COVID-19 – So what will the technology trends, security threat types and emerging offerings in this landscape look like in 2021? Read this exclusive RiskTech 100 research report to find out.
Posted: 19 Jan 2021 | Published: 19 Jan 2021

MetricStream

Simulating The Latest Threats and Techniques with The MITRE ATT&CK Matrix
sponsored by Cymulate
EBOOK: Organizations that don’t actively simulated advanced persistent threats (APTs) take a serious gamble each time they are faced with a serious cyberthreat. The MITRE ATT&CK Matrix aims to provide you with the knowledge and tactics needed to understand, simulate and prepare for today’s APTs – read this e-book to learn more.
Posted: 12 Feb 2021 | Published: 12 Feb 2021

Cymulate

Overcoming The Legacy Vpn Dilemma Zero Trust Access With Application Access Cloud
sponsored by Axis Security
WHITE PAPER: Employees are now everywhere, and while staff and integrated third-party remote work models are commonplace, the access tools enabling them are outdated and broken. It’s now worth considering an application-level access solution that uses a zero-trust model. Access this white paper to discover such a solution.
Posted: 12 Jan 2021 | Published: 12 Jan 2021

Axis Security

Why You Should Take Security In The Cloud
sponsored by Splunk
WHITE PAPER: Advanced security attacks are getting harder to detect as hackers are becoming more sophisticated. Organizations can get ahead of these attacks by adopting a cloud analytics-driven security platform. Register for your complimentary copy of “Why You Should Take Security in the Cloud” and learn how to combat changing security threats.
Posted: 13 Apr 2021 | Published: 13 Apr 2021

Splunk

Kaspersky Threat Intelligence
sponsored by Kaspersky
WHITE PAPER: Tracking, analyzing and mitigating evolving IT security threats is no easy feat. Enterprises across all sectors are facing a shortage of the up-to-the-minute, relevant data they need to help them manage the risks associated with IT security threats. View this white paper to see how Kaspersky’s Threat Intelligence strives to alleviate this issue.
Posted: 17 Feb 2021 | Published: 17 Feb 2021

Kaspersky

Protecting Healthcare Data with Removable Media Container Encryption
sponsored by WinMagic
CASE STUDY: To better manage and protect patient data, healthcare organizations are embracing encryption capabilities. In this use case, explore the common pain points and challenges that have led to the rise of encryption and discover the potential business benefits of adopting a Removable Media Container Encryption (RMCE).
Posted: 01 Feb 2021 | Published: 01 Feb 2021

WinMagic

How Cyberattack Simulations Differ From Penetration & Vulnerability Tests
sponsored by Cymulate
WHITE PAPER: Targeted cyberattack simulation, vulnerability scans, penetration testing – which of these is the most effective method of identifying weaknesses within your defenses and ensuring your security capabilities can handle the rigors of today’s cyberthreats? Read this white paper to find out.
Posted: 12 Feb 2021 | Published: 12 Feb 2021

Cymulate

SOLUTION BRIEF Advancing SOC Endpoint Incident Response Practices
sponsored by Malwarebytes
DATA SHEET: Learn how Malwarebytes Incident Response can help you combat sophisticated cyberthreats as well as avoid the damage a successful breach could inflict on your organization’s reputation.
Posted: 12 Mar 2021 | Published: 12 Mar 2021

Malwarebytes

7 Experts on Transitioning to MDR
sponsored by GoSecure
EBOOK: Managed detection and response (MDR) can help you quickly identify and mitigate cyberattacks. But it’s not always clear when a company should move to MDR, nor is it clear how to get the greatest value from an MDR service. In this e-book, hear from 7 security experts as they offer advice to organizations considering MDR.
Posted: 02 Mar 2021 | Published: 02 Mar 2021

GoSecure

Enabling Partners With Simple, Private Application Access
sponsored by Axis Security
WHITE PAPER: Securing and managing third-party access to critical applications is a growing concern for IT teams. This whitepaper offers a closer look at the Axis Security Application Access Cloud, designed to simplify, accelerate and secure third-party application enablement & management – read on to get started.
Posted: 08 Jan 2021 | Published: 08 Jan 2021

Axis Security
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences