IT Management  >   Systems Operations  >   Security  >  

Threats

RSS Feed   
Threats Reports
 
7 Experts on Transitioning to MDR
sponsored by GoSecure
EBOOK: Managed detection and response (MDR) can help you quickly identify and mitigate cyberattacks. But it’s not always clear when a company should move to MDR, nor is it clear how to get the greatest value from an MDR service. In this e-book, hear from 7 security experts as they offer advice to organizations considering MDR.
Posted: 02 Mar 2021 | Published: 02 Mar 2021

GoSecure

Transforming risk Why digital transformation depends on integrated risk management
sponsored by ServiceNow
EBOOK: Embarking on a digital transformation without considering risk management is like doing a massive home remodel on top of a crumbling foundation – which is why IT and non-IT leaders are embracing integrated risk management (IRM) as part of their transformation. Read this e-book to learn more about IRM and it’s role in digital transformation.
Posted: 28 Jan 2021 | Published: 28 Jan 2021

ServiceNow

Cybersecurity Infrastructure for the Future
sponsored by Verizon
RESOURCE: The rapid pivot to a remote workforce has refocused budgets, priorities and resources. Learn how businesses are addressing the increased attack surface and the amplified level of technical complexity required to keep organizations secure.
Posted: 12 May 2021 | Published: 12 May 2021

Verizon

Supercharge Incident Response With DDI Visibility
sponsored by Infoblox
WHITE PAPER: Companies are looking for ways to improve their incident response mechanisms – but some avenues often go unexplored. DDI is the shorthand of DNS, DHCP (Dynamic Host Configuration Protocol) and IPAM (IP Address Management). Access this SANS report to learn how DDI visibility can aid in incident response.
Posted: 16 Feb 2021 | Published: 30 Nov 2020

Infoblox

Simulating The Latest Threats and Techniques with The MITRE ATT&CK Matrix
sponsored by Cymulate
EBOOK: Organizations that don’t actively simulated advanced persistent threats (APTs) take a serious gamble each time they are faced with a serious cyberthreat. The MITRE ATT&CK Matrix aims to provide you with the knowledge and tactics needed to understand, simulate and prepare for today’s APTs – read this e-book to learn more.
Posted: 12 Feb 2021 | Published: 12 Feb 2021

Cymulate

Bitdefender Managed Detection & Response Service
sponsored by Bitdefender
DATA SHEET: Today’s cyberthreats are growing in their volume and sophistication, and security teams are facing increased pressure to address these threats while their resources to do so diminish – so what can be done to remedy this? Read this datasheet to learn more about the benefits of MDR and discover the key features of Bitdefender’s MDR offering.
Posted: 09 Feb 2021 | Published: 09 Feb 2021

Bitdefender

Changing the paradigm of security testing
sponsored by Cymulate
VIDEO: According to the SANS institute, half of organizations test their security controls once a year or less. At this cadence, most organizations will be ill-prepared for today’s dynamic cyberthreats. Watch this video to learn about the value of attack and breach simulation, and how to get started at your organization.
Posted: 08 Feb 2021 | Premiered: 08 Feb 2021

Cymulate

Protecting Healthcare Data with Removable Media Container Encryption
sponsored by WinMagic
CASE STUDY: To better manage and protect patient data, healthcare organizations are embracing encryption capabilities. In this use case, explore the common pain points and challenges that have led to the rise of encryption and discover the potential business benefits of adopting a Removable Media Container Encryption (RMCE).
Posted: 01 Feb 2021 | Published: 01 Feb 2021

WinMagic

Security Observability: Why Tracing?
sponsored by Traceable
WHITE PAPER: Cyberattacks can cost affected organizations as much as $13 million per year. What if you could reduce the time to detect a cyberattack all the way down to zero? How much could you save by detecting and stopping an attack while it’s still happening? Leverage this white paper to learn the 4 pillars of security observability.
Posted: 22 Feb 2021 | Published: 22 Feb 2021

Traceable

Advanced cybersecurity fraud and how to fight it
sponsored by SearchSecurity.com
EBOOK: Fraud is as ancient as time, but cybersecurity fraud is hitting heights of sophistication the ancient Greeks never imagined. Learn the latest cyberfraud scams and how to thwart them with a combination of processes, tools and education.
Posted: 02 Mar 2021 | Published: 02 Mar 2021

SearchSecurity.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences