IT Management  >   Systems Operations  >   Security  >  

Threat Mitigation

RSS Feed   
Threat Mitigation Reports
 
Your Email Security is Ineffective, and Getting Worse
sponsored by Ironscales
WHITE PAPER: The impacts of phishing attacks continue to expose the gaps in current email security tactics and highlights why organizations need to adapt their existing approach to meet the requirements of modern threats. Read on to uncover the key data insights from this Aberdeen study into the email security landscape.
Posted: 14 Jan 2020 | Published: 30 Jun 2019

Ironscales

Building supply company boosts endpoint security with Malwarebytes
sponsored by Malwarebytes
CASE STUDY: In this case study, a large US building supply company implemented Malwarebytes’ Endpoint Protection and Response services to establish endpoint resiliency and reduce their remediation time from several days down to minutes or hours.
Posted: 21 Jan 2020 | Published: 21 Jan 2020

Malwarebytes

How to Build a Security Operations Center
sponsored by AT&T Cybersecurity
RESOURCE: Regardless of the size or industry of an organization, network monitoring and threat detection are key strategies for maintaining security. SOC teams are critical for meeting this goal, as they aggregate the resources needed for ensuring protection. Read on to uncover the key roles and responsibilities you need to support a SOC.
Posted: 02 Jan 2020 | Published: 02 Jan 2020

AT&T Cybersecurity

How to be a SOAR Winner
sponsored by IBM
RESOURCE: As cyberattacks and malware threats grow increasing sophisticated, implementing an automated and orchestrated security environment is critical for detecting and defecting cyberthreats. Read on to learn about the eight most critical success factors in creating and sustaining an intelligently automated, orchestrated security team.
Posted: 20 Dec 2019 | Published: 20 Dec 2019

IBM

Panda Labs Annual Report: Cybersecurity Predictions
sponsored by Panda Security
RESEARCH CONTENT: Download this report to see how cybersecurity has evolved since 2017 with cybercrime, attacks, and threats. See how future security trends and threat hunting can help your organization reduce the risk of a vicious attack.
Posted: 31 Dec 2019 | Published: 03 Aug 2018

Panda Security

When the Cloud Rains Phish
sponsored by Area 1 Security
WHITE PAPER: When it comes to phishing attacks, every inbox is a prime target. Hackers are discovering more sophisticated methods for targeting employees that have adapted to overcome world-class defenses. Read this white paper to uncover the modern threats the users encounter and discover how to remedy them.
Posted: 08 Jan 2020 | Published: 08 Jan 2020

Area 1 Security

Security Controls for Effective Micro-Segmentation
sponsored by ShieldX
WHITE PAPER: With cyberattacks becoming increasingly difficult to identify and mitigate, organizations shift towards Forrester’s Zero Trust Model to protect their post-perimeter environments against lateral movements. In this white paper, explore security controls and evaluation criteria for the foundational elements of your zero-trust strategy.
Posted: 23 Jan 2020 | Published: 30 Sep 2017

ShieldX

PandaLabs Annual Report 2018
sponsored by Panda Security
RESEARCH CONTENT: As technology continues to advance, cybercriminals are leveraging new capabilities into more sophisticated cyberattacks. PandaLabs, Panda Security's anti-malware laboratory, tracks threat data in real time and has compiled it into a report. Download the report for highlights of 2018's cybersecurity trends, as well as emerging threats for 2019.
Posted: 31 Dec 2019 | Published: 30 Nov 2018

Panda Security

The Insider’s Guide to Incident Response
sponsored by AT&T Cybersecurity
WHITE PAPER: As an IT security pro, you need all the help you can get when preventing the worst-case scenario from happening. Luckily, The Insider’s Guide to Incident Response gives you all the tips and tricks you need to know. Download the guide now for info on building an incident response team, the different types of security incidents, and much more.
Posted: 03 Jan 2020 | Published: 03 Jan 2020

AT&T Cybersecurity

Beginners Guide to Open Source Intrusion Detection Tools
sponsored by AT&T Cybersecurity
RESOURCE: Intrusion detection systems (IDS) are a set of technologies that enable IT teams network visibility in order to identify and prevent suspicious activity from becoming a breach. Read this beginner’s guide to explore various IDS detection techniques to help you get started with network visibility and security.
Posted: 06 Jan 2020 | Published: 06 Jan 2020

AT&T Cybersecurity
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info