IT Management  >   Systems Operations  >   Security  >  

Threat Mitigation

RSS Feed   
Threat Mitigation Reports
 
The Evolving Role of SaaS and IT Outsourcing in SMB IT Security
sponsored by Kaspersky Lab
WHITE PAPER: For SMBs, getting the maximum use out of every resource is critical to long term success and profitability. However, SMBs are not immune to the security risks that come from embracing evolving IT capabilities. Download this white paper to learn more about the security challenges, threats and opportunities as they relate to SMBs.
Posted: 01 Jul 2020 | Published: 01 Jul 2020

Kaspersky Lab

Using Secure Email Gateway to enhance data security in Microsoft Office 365
sponsored by Clearswift
PRODUCT OVERVIEW: This solution brief examines the common areas of concern when it comes to securing Office 365 and explores how Clearswift’s SEG may be able to help organizations address these concern areas and ensure protection and visibility across their platform.
Posted: 10 Jul 2020 | Published: 10 Jul 2020

Clearswift

7 Ways AI Can Automate and Improve Vulnerability Management Operations
sponsored by Delve
WHITE PAPER: Although under-utilized, AI has the potential to streamline operations through automation while reducing vulnerability risk for vulnerability management operations. Read this white paper to discover 7 ways AI can automate and enhance traditional or stagnant vulnerability management operations.
Posted: 06 Jul 2020 | Published: 06 Jul 2020

Delve

Driving Resiliency and Security in the Financial Services Industry
sponsored by BMC
WHITE PAPER: Resiliency is critical to the long-term success of the financial services industry. This is due to the amount of sensitive personal and financial data they manage that have attracted increasingly sophisticated cyberattack methods. Read on to discover best practices for ensuring security and resiliency of t financial services organizations.
Posted: 08 Jul 2020 | Published: 08 Jul 2020

BMC

Data Minimization Challenges
sponsored by BigID
PRODUCT OVERVIEW: As the volume of data to manage grows exponentially, the need for data minimizations in cloud migrations and other cybersecurity endeavors becomes critical. Download this solution brief and discover how BigID can help organization to implement an automated approach to reduce security, compliance and governance risks.
Posted: 06 Jul 2020 | Published: 06 Jul 2020

BigID

Nefilim Ransomware and Mitigating Attacks in the COVID-19 Era
sponsored by BlackBerry
RESOURCE: In Australia, organizations across every sector have been on the receiving end of increasingly frequent and complex malware and ransomware attacks. This article highlights one of the most prominent ransomware attacks, discusses cybersecurity in the COVID-19 era, and more. Read on to get started.
Posted: 30 Jun 2020 | Published: 15 Jun 2020

BlackBerry

Secure Remote Access Readiness: Podcast
sponsored by Pulse Secure
PODCAST: Unplanned remote working can dramatically increase threat exposure, cyberattacks and data leakage risks. That means your organization needs to be prepared in the event of a global crisis. Learn how Pulse Secure enables business continuity and productivity with their secure remote access solution.
Posted: 25 Jun 2020 | Premiered: Jun 25, 2020

Pulse Secure

Auth0’s Approach to Information Security Identity in the Real World
sponsored by Auth0
WHITE PAPER: Identity solutions, like any cybersecurity tool, require more than just strength and ability – they need to be flexible in order to meet the needs of your business environment and fit into your strategy. This white paper takes a closer look at the role of extensibility and practicality for identity solutions, read on to learn more.
Posted: 02 Jul 2020 | Published: 02 Jul 2020

Auth0

Wavefront Secures DevOps Environments at Scale with Lacework
sponsored by Lacework
CASE STUDY: Due to the continually changing nature of their public cloud environment, Wavefront was facing visibility and security issues related to detecting and tracking vulnerabilities and threats. Download this white paper to see what led to their partnership with Lacework, as well as the results.
Posted: 08 Jul 2020 | Published: 08 Jul 2020

Lacework

How to Implement Zero Trust Security in Europe
sponsored by Okta
WEBCAST: Zero Trust has come a long way since its inception in 2009, but many still have questions. What should Zero Trust look like? How does it affect workloads, networks, people and devices within an organization? How can I begin to implement my own Zero-Trust model? Watch this webcast for answers to these questions and more from Forrester & Okta.
Posted: 01 Jul 2020 | Premiered: Sep 26, 2019

Okta
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info