IT Management  >   Systems Operations  >   Security  >  

Threats

RSS Feed   
Threats Reports
 
Preventing Unknown, Zero-Day Attacks
sponsored by Checkpoint Software Technologies
WHITE PAPER: An organizations ability to win the cybersecurity battle depends on how well they prevent unknown, zero-day threats. In this white paper, learn how threat prevention technology, and a consolidated security architecture can help to protect your organization’s attack vectors.
Posted: 23 Dec 2019 | Published: 23 Dec 2019

Checkpoint Software Technologies

How to Build a Security Operations Center
sponsored by AT&T Cybersecurity
RESOURCE: Regardless of the size or industry of an organization, network monitoring and threat detection are key strategies for maintaining security. SOC teams are critical for meeting this goal, as they aggregate the resources needed for ensuring protection. Read on to uncover the key roles and responsibilities you need to support a SOC.
Posted: 02 Jan 2020 | Published: 02 Jan 2020

AT&T Cybersecurity

Best Practices Award: Email Security Global
sponsored by Mimecast
WHITE PAPER: The trend towards cloud migration for email security adds new levels of complexity for organizations, and the increase in email-based threats means the need for secure email is critical to the protection of sensitive data. Read this research report to explore the top industry challenges and best practices as they relate to email security.
Posted: 12 Dec 2019 | Published: 12 Dec 2019

Mimecast

The Insider’s Guide to Incident Response
sponsored by AT&T Cybersecurity
WHITE PAPER: As an IT security pro, you need all the help you can get when preventing the worst-case scenario from happening. Luckily, The Insider’s Guide to Incident Response gives you all the tips and tricks you need to know. Download the guide now for info on building an incident response team, the different types of security incidents, and much more.
Posted: 03 Jan 2020 | Published: 03 Jan 2020

AT&T Cybersecurity

Catching Modern Threats: InsightIDR Detection Methodologies
sponsored by Rapid7
PRODUCT OVERVIEW: Modern threat detection is a 2-pronged approach: to protect an organization against loss, an IT security team needs to be able to detect the 2 types of threats (common and targeted), and deal with them accordingly. This solution guide highlights the key benefits and features of InsightIDR’s cloud SIEM for modern threat detection.
Posted: 07 Jan 2020 | Published: 07 Jan 2020

Rapid7

Business Email Compromise: The Catalyst for Mailbox Level Email Security
sponsored by Ironscales
WHITE PAPER: As phishing attack grow in sophistication, organizations must establish security protocols to meet these evolving threats. One emerging threat is business email compromise (BEC), which affects more than 500 businesses per day. In this white paper, go in-depth into BEC, what makes it so successful and how organizations can mitigate the risks.
Posted: 13 Jan 2020 | Published: 13 Jan 2020

Ironscales

The Hidden Obstacle in the Consumer Purchase Path: 3PC Cookies and Domain Calls
sponsored by The Media Trust
RESOURCE: When it comes to digital retail, revenue growth is heavily tied to customer experience. And while third-party capabilities enable a personalized experience, they can also expose vulnerabilities. In this article, go in-depth into the risks of third-party capabilities and discover how to identify and remediate risks.
Posted: 13 Jan 2020 | Published: 13 Jan 2020

The Media Trust

Reverse Engineering Still a Serious Problem in 2019
sponsored by Intertrust
WEBCAST: While mobile applications and interconnected devices offer unmatched convenience, they also expose organizations and consumers to cybersecurity risks. This webinar breaks down common mobile application security threats and highlights real-life reverse engineering examples.
Posted: 12 Dec 2019 | Premiered: Nov 8, 2019

Intertrust

How to be a SOAR Winner
sponsored by IBM
RESOURCE: As cyberattacks and malware threats grow increasing sophisticated, implementing an automated and orchestrated security environment is critical for detecting and defecting cyberthreats. Read on to learn about the eight most critical success factors in creating and sustaining an intelligently automated, orchestrated security team.
Posted: 20 Dec 2019 | Published: 20 Dec 2019

IBM

The Fastest, Easiest Way to Secure Your Network
sponsored by Cisco Umbrella
WHITE PAPER: A DNS-layer solution can quickly identify malicious domains even before those domains and IPs are used to launch any type of attack. Read on to learn about Cisco Umbrella today.
Posted: 17 Dec 2019 | Published: 17 Dec 2019

Cisco Umbrella
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info