IT Management  >   Systems Operations  >   Security  >  

Threat Mitigation

RSS Feed   
Threat Mitigation Reports
 
Bitdefender Endpoint Detection and Response (EDR)
sponsored by Bitdefender
VIDEO: Data breaches spiked in 2020 – affecting nearly every country and industry vertical. COVID-19 certainly was part of the issue – but outdated and traditional security methods also share the responsibility. Watch this short video to learn about the tools and capabilities required to meet the demands of today’s cyberthreats.
Posted: 11 Feb 2021 | Premiered: 11 Feb 2021

Bitdefender

Supercharge Incident Response with DDI Visibility
sponsored by Infoblox
WHITE PAPER: Companies are looking for ways to improve their incident response mechanisms – but some avenues often go unexplored. DDI is the shorthand of DNS, DHCP (Dynamic Host Configuration Protocol) and IPAM (IP Address Management). Access this SANS report to learn how DDI visibility can aid in incident response.
Posted: 16 Feb 2021 | Published: 30 Nov 2020

Infoblox

Royal Holloway: The Computer Misuse Act and the characteristics of convicted hackers
sponsored by ComputerWeekly.com
RESEARCH CONTENT: In this Royal Holloway article, the authors go beyond the perpetuated stereotypes often found in media surrounding hackers by analysing the characteristics of real-life convicted hackers in the UK, who were charged under the Computer Misuse Act
Posted: 01 Apr 2021 | Published: 07 Apr 2021

ComputerWeekly.com

Managing Cybersecurity Risk in the Supply Chain
sponsored by Clearswift
EGUIDE: Supply chains have become a prime target for cybercriminals – which is illustrated by the rise in third-party vulnerabilities and breaches across 2020. Read this e-guide to discover the emerging supply chain threats, their implications for each industry, and 5 ways organizations can better protect themselves.
Posted: 18 Feb 2021 | Published: 18 Feb 2021

Clearswift

Use Group Rules to Automate & Granularly Manage Access
sponsored by Okta
WEBCAST: Organizations using Okta for IAM know the importance of groups. But managing these groups is a hassle for admins, and it becomes more complicated as the number of users or groups increases, leading to security risks. Watch this webinar to learn how to you can use Okta’s Group Rules to automate app assignments and enforce granular access.
Posted: 01 Mar 2021 | Premiered: Mar 1, 2021

Okta

Solution Brief: Malwarebytes Endpoint Detection and Response
sponsored by Malwarebytes
DATA SHEET: Endpoints have never been under greater threat: Attacks have doubled, false positives are skyrocketing and the complexity of EDR solutions is putting a strain on endpoint security. You can combat these issues with endpoint security that’s integrated, proactive and continuous. Check out this white paper to examine easy, effective, efficient EDR.
Posted: 22 Feb 2021 | Published: 22 Feb 2021

Malwarebytes

Security Observability: Why Tracing?
sponsored by Traceable
WHITE PAPER: Cyberattacks can cost affected organizations as much as $13 million per year. What if you could reduce the time to detect a cyberattack all the way down to zero? How much could you save by detecting and stopping an attack while it’s still happening? Leverage this white paper to learn the 4 pillars of security observability.
Posted: 22 Feb 2021 | Published: 22 Feb 2021

Traceable

Integrated Cybersecurity Model for Your Work-From-Anywhere Environment
sponsored by NWN Corporation
WHITE PAPER: Cybercrime was lucrative across 2020 – the pandemic exposed several security gaps that hackers were eager to exploit. This white paper highlights how the Integrated Cybersecurity Model can help protect remote workforces from today’s evolving cyberthreats – read on to learn more.
Posted: 17 Feb 2021 | Published: 17 Feb 2021

NWN Corporation

Oracle Communications and Zoom Strategic Partnership
sponsored by Oracle
WHITE PAPER: As remote working has now become the new norm, enterprises are implementing Zoom for their UC needs to promote enhanced productivity. As such, security and seamless migration are top of mind for enterprise IT administrators. Leverage this white paper to see how Oracle’s Session Border Controller (SBC) is playing a major role in this effort.
Posted: 22 Feb 2021 | Published: 22 Feb 2021

Oracle

Aflac Enhances Cyber Threat Intelligence & Integrates Security Ecosystem with Infoblox
sponsored by Infoblox
CASE STUDY: In this case study, discover how Aflac, a major insurance provider in the US, was able to tackle a massive transformation across 3 fronts: cloud, threat intelligence, and cybersecurity. Read on to see why they chose Infoblox as their trusted strategic partner and discover the results of Aflac’s 3 major projects.
Posted: 11 Feb 2021 | Published: 11 Feb 2021

Infoblox
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences