IT Management  >   Systems Operations  >   Security  >  

Threat Mitigation

RSS Feed   
Threat Mitigation Reports
Considerations for Developing a Cyber Threat Intelligence Team
sponsored by Farsight Security
EGUIDE: In this e-guide, explore the best practices for team location and selection when developing a cyberthreat intelligence team.
Posted: 04 Sep 2019 | Published: 10 Oct 2017

Farsight Security

Morphisec Plus Defender AV And ATP
sponsored by Morphisec, Inc.
DATA SHEET: In this solution brief, learn about the Morphisec Unified Threat Prevention platform and how it can terminate advanced threats.
Posted: 11 Sep 2019 | Published: 11 Sep 2019

Morphisec, Inc.

Starbucks Combats Credential Stuffing and Account Takeover
sponsored by Shape Security
VIDEO: Starbucks' Director of InfoSec, Mike Hughes, joins the CEO of Shape Security for a conversation regarding the challenges of credential stuffing and account takeover at Starbucks and the industry at large. Tune in to hear about Starbuck's success with Shape Security's Blackfish.
Posted: 27 Aug 2019 | Premiered: 27 Aug 2019

Shape Security

SSL Attacks on the Rise
sponsored by Radware
WHITE PAPER: As is always the trend, mass adoption of certain technologies is followed closely by efforts to exploit its wide use through a number of security threats. SSL is no exception to this rule. Download this white paper, to learn everything you need to know about SSL attacks and how to protect against them.
Posted: 19 Sep 2019 | Published: 19 Sep 2019


Cybersecurity Effectiveness Podcast: IJay Palansky
sponsored by Verodin
PODCAST: While appealing new gadgets and innovative products continue to hit the market, legal firms caution organizations about the risks of IoT devices. In this podcast, technology-focused trial litigator IJay Palansky forecasts the impending boom of cyber litigation in the coming years and provides recommendations for avoiding an attack.
Posted: 28 Aug 2019 | Premiered: Aug 28, 2019


Incident Preparedness and Response Report
sponsored by Verizon
WHITE PAPER: Preparing for and responding to data breaches and cybersecurity incidents is never easy. It takes knowledge of your environment and its unique threats, effective teamwork and, just as importantly, an Incident Response Plan. Download this report to learn how to formulate or improve your own cybersecurity incident mitigation and response efforts.
Posted: 28 Aug 2019 | Published: 28 Aug 2019


Webinar: Latest Fraud Schemes in Retail and Hospitality
sponsored by Shape Security
WEBCAST: Up to 99% of the traffic on retail and e-commerce login forms are due to account takeover (ATO) attempts. In this webinar, Shape Security's Threat Intel Analyst Smriti Kawal Jaggi will explain how attackers use both online and offline methods to target individuals and monetize successful ATOs.
Posted: 29 Aug 2019 | Premiered: Jul 31, 2019

Shape Security

Druva Security Overview: End-to-End Data Security
sponsored by Druva Software
DATA SHEET: Your organization is tasked with ensuring data security, regardless of how or where backup solutions are deployed. In this overview, see how your organization can receive end-to-end data security from Druva.
Posted: 27 Aug 2019 | Published: 27 Aug 2019

Druva Software

Data Security Portfolio Vendors, Q2 2019
sponsored by IBM
ANALYST REPORT: This Forrest Wave report can help you understand and assess the data security solution landscape, and how these solutions can address your business and technology challenges. Read on for an analysis of 13 data security vendors and find out which vendors are leading the pack.
Posted: 29 Aug 2019 | Published: 28 Aug 2019


Protection Inside and Outside the Office: The New State of Cybersecurity
sponsored by Cisco Umbrella
RESOURCE: Download this infographic to explore key findings from the Enterprise Strategy Group's survey of 450 cybersecurity experts on their experience protecting a network without perimeters.
Posted: 05 Sep 2019 | Published: 05 Sep 2019

Cisco Umbrella

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.


All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement