IT Management  >   Systems Operations  >   Security  >  

Threats

RSS Feed   
Threats Reports
 
Countering Evasive Threats With Moving Target Defense
sponsored by Morphisec, Inc.
WHITE PAPER: Download this white paper to learn about Moving Target Defense (MTD) and how it leverages the tactics used by sophisticated attackers — deception, modification and polymorphism — to level the cybersecurity playing field.
Posted: 11 Sep 2019 | Published: 11 Sep 2019

Morphisec, Inc.

The Role of Breach and Attack Simulation
sponsored by Cymulate
VIDEO: The volume of data breaches and cyberattacks are continuing to rise. As a result, organizations are relying on breach and attack simulation tools to provide more consistent and automated validation of controls. In this video, Tim Ager from Cymulate discusses today's cyberthreats landscape and the rise of breach and attack simulation tools.
Posted: 23 Aug 2019 | Premiered: 23 Aug 2019

Cymulate

The New Age of Fraud
sponsored by Concur Technologies
WHITE PAPER: Today, there is a realization that fraud is an enterprise risk that falls in the same realm as supply chain, disaster and regulatory risks. But how can companies prevent, detect and mitigate this risk? In this white paper, examine how companies are putting a microscope on employee spend to better prevent and detect fraud across their business.
Posted: 18 Sep 2019 | Published: 31 Aug 2019

Concur Technologies

Automating Cybercrime with Sentry MBA
sponsored by Shape Security
RESOURCE: Sentry MBA is an automated attack tool used by cybercriminals to take over user accounts on major websites. In this brief, gain a better understanding of how Sentry MBA works to help you defend against credential stuffing attacks.
Posted: 28 Aug 2019 | Published: 28 Aug 2019

Shape Security

Privileged Access Management in the Modern Threatscape
sponsored by Centrify Corporation
WHITE PAPER: Privileged access remains the preferred vector for attackers, and most organizations aren't taking the very basic steps to secure it. Dive into this 2019 Centrify Privileged Access Management Survey to learn about their findings for securing the modern threatscape with zero trust privilege.
Posted: 04 Sep 2019 | Published: 19 Feb 2019

Centrify Corporation

The Role of Predictive Intelligence in the Fight Against Cyberattacks
sponsored by Cisco Umbrella
RESOURCE: Traditional threat intelligence is reactive, basing security on information gathered only after an attack is successfully carried out. Download this white paper to learn how a predictive intelligence can aid in the fight against cyberattacks.
Posted: 29 Aug 2019 | Published: 29 Aug 2019

Cisco Umbrella

Sophisticated Cyber Attacks and Trends in Online Fraud
sponsored by Shape Security
VIDEO: In this video, listen to Dan Woods, former FBI agent, discuss sophisticated cyberattacks and trends in online fraud.
Posted: 26 Aug 2019 | Premiered: 26 Aug 2019

Shape Security

Considerations for Developing a Cyber Threat Intelligence Team
sponsored by Farsight Security
EGUIDE: In this e-guide, explore the best practices for team location and selection when developing a cyberthreat intelligence team.
Posted: 04 Sep 2019 | Published: 10 Oct 2017

Farsight Security

Cybersecurity Effectiveness Podcast: IJay Palansky
sponsored by Verodin
PODCAST: While appealing new gadgets and innovative products continue to hit the market, legal firms caution organizations about the risks of IoT devices. In this podcast, technology-focused trial litigator IJay Palansky forecasts the impending boom of cyber litigation in the coming years and provides recommendations for avoiding an attack.
Posted: 28 Aug 2019 | Premiered: Aug 28, 2019

Verodin

Ransomware Remediation and Prevention
sponsored by Blackberry Cylance
DATA SHEET: Download this solution brief to learn about BlackBerry Cylance's native AI platform that can help organizations minimize the risksof a ransomware breach by transitioning from a reactive to a prevention first security posture.
Posted: 17 Sep 2019 | Published: 17 Sep 2019

Blackberry Cylance
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement