IT Management  >   Systems Operations  >   Security  >  

Threat Mitigation

RSS Feed   
Threat Mitigation Reports
 
Why Web Application Attacks are a Growing Threat to the Cloud
sponsored by Oracle Dyn
ESSENTIAL GUIDE: New research found that web application attacks present a significant threat to cloud environments. Find out what cybersecurity expert, Rob Shapland, has to say as he explains these risks and what enterprises should do about them.
Posted: 07 Sep 2018 | Published: 07 Sep 2018

Oracle Dyn

The SIEM that Gives SIEM a Good Name
sponsored by Empow Cyber Security
RESOURCE: Organizations are purchasing more and more security systems due to the increased volume of advanced cyberattacks. While SIEM systems are supposed to help this problem, some aren't meeting expectations. Read on to learn about a new SIEM platform that is used, and loved, by MIT Media Labs and other innovative companies.
Posted: 11 Sep 2018 | Published: 11 Sep 2018

Empow Cyber Security

Securing Microsoft Office 365: The Inside Track to Threat Protection
sponsored by Proofpoint, Inc.
RESOURCE: In this report, learn about the security risks of cloud-based productivity suites and how your organization can take the necessary steps to avoid them.
Posted: 06 Sep 2018 | Published: 06 Sep 2018

Proofpoint, Inc.

The Managed Security Services Provider Survival Guide
sponsored by MASERGY
WHITE PAPER: In this MSSP survival guide, get tips to help you through the process of evaluating and selecting the right Managed Security Services Provider from amidst the sea of potential providers that have flooded the market.
Posted: 31 Aug 2018 | Published: 31 Aug 2018

MASERGY

SOC-as-a-Service for Cloud Infrastructures and SaaS Applications
sponsored by Arctic Wolf
WHITE PAPER: Find out how to overcome some of the top security challenges facing hybrid cloud architectures – from data exfiltration to insider threats – with a security operations center as a service (SOCaaS).
Posted: 06 Sep 2018 | Published: 06 Sep 2018

Arctic Wolf

BMC Software Relies on Threat X to Protect Its Vast Portfolio of Enterprise Applications and Websites Across a Multi-Cloud Environment
sponsored by ThreatX
CASE STUDY: A premier provider of global IT Management found that their traditional security tools could not effectively support and protect their rapidly evolving cloud application portfolio. Find out how they were able to protect their critical business portfolio applications and websites distributed globally across a hybrid cloud environment.
Posted: 27 Aug 2018 | Published: 27 Aug 2018

ThreatX

5 Top Recommendations for Effective Threat Detection
sponsored by Alert Logic
RESOURCE: If your organization is looking to improve the effectiveness of your threat detection program, uncover the top 5 recommendations for effective threat detection, today.
Posted: 30 Aug 2018 | Published: 30 Aug 2018

Alert Logic

Securing Web Applications
sponsored by Oracle Dyn
EBOOK: Attacks on web applications can circumvent your security and harm your business in myriad ways by creating unwanted downtime, reducing availability and responsiveness, and shattering trust with your customers when data confidentiality and integrity is compromised.
Posted: 04 Sep 2018 | Published: 04 Sep 2018

Oracle Dyn

Recent Ransomware Attacks Got you? Don't Cry; Fight Back!
sponsored by SearchSecurity.com
EBOOK: Recent ransomware attacks may make you WannaCry, but there's no time for that. It's time to learn what you can do to minimize the threat and how to deal if the worst happens. Start here to discover how to fight back against hackers, today.
Posted: 24 Aug 2018 | Published: 24 Aug 2018

SearchSecurity.com

Securing VPN with Multi-Factor Authentication
sponsored by Okta
WHITE PAPER: Learn about an adaptive multi-factor authentication platform that's designed to bring a new level of security to your VPN and the users in your network environment, no matter where they're connecting from.
Posted: 28 Aug 2018 | Published: 28 Aug 2018

Okta
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement