IT Management  >   Systems Operations  >   Security  >  

Threats

RSS Feed   
Threats Reports
 
Data Protection is a Business Challenge
sponsored by Veritas
RESOURCE: Outages and data losses can have terrible business consequences. They are not simply short-time events; they cause significant, lasting disruptions. Direct loss of revenue is just the beginning of the potential negative outcomes from outages and data loss. In this infographic, learn about the data protection challenges that organizations face.
Posted: 19 Mar 2019 | Published: 31 Dec 2018

Veritas

Crowdstrike Falcon Complete:How To Achieve Instant Cybersecurity Maturity For Organizations Of All Sizes
sponsored by CrowdStrike
WHITE PAPER: The shortage of cybersecurity resources and expertise can lead organizations to struggle with implementing the security technology they acquire. In this white paper, learn how CrowdStrike Falcon Complete can solve these challenges by combining Falcon endpoint protection platform with a dedicated team of security professionals.
Posted: 06 Mar 2019 | Published: 06 Mar 2019

CrowdStrike

Game Changing Defensive Strategies for 2019
sponsored by Fidelis
WEBCAST: Security boundaries have extended to cloud service provider environments where perimeters no longer exist. Therefore, organizations cannot defend themselves with the same strategies they did. In this webcast, learn how organizations can evolve their security approach to defend them from the threats of today.
Posted: 20 Feb 2019 | Premiered: Feb 20, 2019

Fidelis

Security and Efficiency Benefits Realized With HP MPS and HP Access Control
sponsored by HP
CASE STUDY: Security experts are advising and clients are demanding that law firms protect their confidential data with the highest level of IT security solutions. In this case study, learn how one legal firm chose to enhance print management and security through a HP Managed Print Services solution.
Posted: 13 Mar 2019 | Published: 31 Jan 2017

HP

Trust But Verify: Mobile App Protection Best Practices
sponsored by Arxan
WEBCAST: This webcast explores how to evolve app security to face modern day threats and stop them before they can spread across your network. Discover a set of best practices for app security and threat mitigation, plus learn about Arxan's comprehensive app protection and alerting capabilities.
Posted: 15 Feb 2019 | Premiered: Feb 15, 2019

Arxan

Malicious Power Shell Usage
sponsored by Symantec
WEBCAST: In living-off-the-land attacks, attackers take advantage of common tools living in your network. One common type of a living-off-the-land attack is a PowerShell attack. This webcast shows how PowerShell attacks take place and how your organization can avoid being a target.
Posted: 05 Mar 2019 | Premiered: Mar 5, 2019

Symantec

Back to the Basics: What is Cyber Risk and How Can We Measure It?
sponsored by CyberGRX
RESOURCE: Cyber-risk is a hot topic these days, but, it is often misunderstood or conflated with other cybersecurity and privacy concerns. This resource offers a definition of cyber-risk and outlines a model of measuring cyber-risk.
Posted: 28 Feb 2019 | Published: 21 Feb 2019

CyberGRX

Cybersecurity for Connected Maintenance Apps
sponsored by Irdeto
EBOOK: In the age of Industry 4.0, connected maintenance apps play an important role in creating a thriving service & maintenance business. However, deploying mobile apps in a hostile environment where they can be easily reverse engineered may have quite the opposite effect. In this eBook, learn what a good application security strategy looks like.
Posted: 25 Feb 2019 | Published: 25 Feb 2019

Irdeto

Overcoming Payment Declines
sponsored by Riskified
WHITE PAPER: In the cutthroat eCommerce environment, any overlooked leak in the payment funnel can be devastating. In this white paper, learn more about payment declines including what they are, why it's hard to measure their impact and where they are most likely to occur.
Posted: 14 Mar 2019 | Published: 14 Mar 2019

Riskified

2018 Security Implications of Digital Transformation Report
sponsored by Fortinet, Inc.
RESEARCH CONTENT: While the potential of digital transformation is exciting from a business perspective, changes stemming from it can create anxiety for the cybersecurity team. In Fortinet's 2018 Security Implications of Digital Transformation Survey, examine the state of cybersecurity in organizations around the world from the lens of digital transformation.
Posted: 01 Mar 2019 | Published: 01 Mar 2019

Fortinet, Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement