IT Management  >   Systems Operations  >   Security  >  

Threats

RSS Feed   
Threats Reports
 
Allure of the threat hunter draws companies large and small
sponsored by SearchSecurity.com
EZINE: Do you need a threat hunter on your analyst team? Threat hunting allows companies to be proactive, rather than wait for attackers to trigger alarms after they have already infiltrated an organization's systems. Yet not every company is ready to employ threat hunting techniques.
Posted: 29 Nov 2018 | Published: 29 Nov 2018

SearchSecurity.com

Inner Workings of Ransomware and Ways to Detect and Respond
sponsored by Arctic Wolf
VIDEO: Ransomware hacks can bypass your perimeter controls and infect your critical systems, brining your business to a halt. Unfortunately, focusing on prevention technologies, with point security products, may not be sufficient enough to fight these key security concerns. This webinar contains key insights on a ransomware cyber kill chain.
Posted: 07 Dec 2018 | Premieres: 31 Dec 2018

Arctic Wolf

Druva Annual Ransomware Report
sponsored by Druva Software
WHITE PAPER: Learn how other organizations, just like yours, are being targeted by ransomware attackers and how they are recovering from these attacks.
Posted: 22 Oct 2018 | Published: 22 Oct 2018

Druva Software

Social Media Account Takeovers
sponsored by Proofpoint, Inc.
WHITE PAPER: Most organizations lack the protective countermeasure or the expertise to mitigate risk and response to social media account takeovers. In this white paper, learn about how takeovers are possible, the complexity of social media accounts and how to prevent an attack from happening.
Posted: 04 Dec 2018 | Published: 04 Dec 2018

Proofpoint, Inc.

Using Splunk Adaptive Response
sponsored by Splunk
WHITE PAPER: Adaptive response enables security analysts – from hunters to less skilled security staff – to better handle threats by speeding the time to make decisions and actions when responding and adapting to them. Read this white paper to learn about the adaptive response framework capabilities and adaptive response initiative partner integrations.
Posted: 17 Dec 2018 | Published: 31 Dec 2018

Splunk

An API Gateway: The Secret to Preventing Under Protected APIs
sponsored by Software AG Government Solutions
WHITE PAPER: Explore 7 key best practices to consider when designing a secure architecture needed to implement a secure API gateway.
Posted: 08 Nov 2018 | Published: 08 Nov 2018

Software AG Government Solutions

You've Got Ransomware. Now What?
sponsored by Druva Software
WHITE PAPER: Find out what to do before and after your company is attacked by checking off the important steps in this checklist.
Posted: 18 Oct 2018 | Published: 18 Oct 2018

Druva Software

Defeating Threats Through User Data: Applying UEBA to Protect your Environment
sponsored by LogRhythm, Inc.
RESOURCE: Learn how to detect and respond to threats faster by focusing on user activity and behavior.
Posted: 13 Nov 2018 | Published: 13 Nov 2018

LogRhythm, Inc.

Application Security and Performance
sponsored by IBM Akamai
WHITE PAPER: Web application and distributed denial of service (DDoS) attacks hit enterprises without warning or reason. Download this resource to discover how to protect against DDoS attacks and prevent operational disruption, loss of confidential data, lost user productivity, reputational harm, and more.
Posted: 26 Oct 2018 | Published: 26 Oct 2018

IBM Akamai

Fast Track Your Transformation to the Digital Workshop
sponsored by Dell
RESOURCE: Learn how you can deploy an end-to-end digital-workspace for your business and obtain performance, scalability, security, simplified management, and more.
Posted: 15 Nov 2018 | Published: 15 Nov 2018

Dell
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement