IT Management  >   Systems Operations  >   Security  >  

Threats

RSS Feed   
Threats Reports
 
Human Factor Report 2018
sponsored by Proofpoint, Inc.
RESEARCH CONTENT: This 2018 Human Factor Report teaches you how to take action against the wide range of advanced threats. View now and learn how to identify and block targeted attacks that travel over email and other threat vectors.
Posted: 31 May 2018 | Published: 31 May 2018

Proofpoint, Inc.

5 Prevalent SIEM Problems
sponsored by Plixer
RESOURCE: Access this resource to learn about 5 SIEM problems and how to address them so you can get the most out of your security strategy.
Posted: 05 Jun 2018 | Published: 10 Nov 2017


Barracuda CloudGen WAF for AWS
sponsored by Barracuda
RESOURCE: This resource explains how the Barracuda CloudGen WAF blocks application layer DDoS and other attack vectors directed at web-facing applications hosted in AWS while protecting against data loss.
Posted: 20 Jun 2018 | Published: 20 Jun 2018

Barracuda

How Symantec Cloud Workload Protection Secures LifeLock on AWS
sponsored by Amazon Web Services
WEBCAST: Listen in on this webcast to learn how LifeLock turned to Symantec and deployed Cloud Workload Protection (CWP) to secure both their corporate and customer data, as well as their intellectual property, in part because CWP's cloud-native design enabled seamless integration with their DevOps workflows and AWS infrastructure.
Posted: 06 Jun 2018 | Premiered: Oct 25, 2017

Amazon Web Services

SSL Attacks on the Rise
sponsored by Radware
EBOOK: Better arm yourself against SSL threats by learning about the different types of encrypted attacks, leading SSL vulnerabilities, your options for SSL protection, and more.
Posted: 21 Jun 2018 | Published: 21 Jun 2018

Radware

Cybercrime by the Numbers
sponsored by Akamai Technologies
RESOURCE: It's likely not a matter of if, but when your company will fall prey to a targeted attack involving malware, ransomware, data exfiltration, or phishing. In fact, 70% of organizations reported a security incident that negatively impacted their business in the past year. Learn more about the realities of cybercrime in today's hyperconnected world.
Posted: 20 Jun 2018 | Published: 20 Jun 2018

Akamai Technologies

Check Point Infinity Architecture: The Cybersecurity Architecture of the Future
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: One of the biggest challenges facing security practitioners is Gen V attacks – aggressive, rapidly evolving multi-vectored mega attacks (such as WannaCry, NotPetya and others) that inflict major damage on businesses and their reputation. This 19-page resource will walk you through keeping all assets protected in today's Gen V attack era.
Posted: 19 Jun 2018 | Published: 19 Jun 2018

Check Point Software Technologies Ltd.

Fundamentals of Endpoint Security: Anti-Malware Protection
sponsored by Citrix
EGUIDE: Access this e-guide to learn about anti-malware protection and how endpoint security technology can prevent malware from infecting end-user computers and corporate networks.
Posted: 29 May 2018 | Published: 29 May 2018

Citrix

Cloud Deployments Demand Cloud Generation Firewalls
sponsored by Barracuda
RESOURCE: When you're building cloud environments, you need a security solution built for the cloud. Find out how cloud generation firewalls are engineered to support specific deployment models and use cases of today's cloud environments.
Posted: 20 Jun 2018 | Published: 20 Jun 2018

Barracuda

Protect Your Data At Every Point Possible
sponsored by Dell EMC and Intel®
WHITE PAPER: To support the accelerating data rise, companies are turning to cloud-based, cost-effective, virtualization-ready data protection solutions. Inside, you'll get an overview of the Dell EMC Data Protection portfolio designed to add agility and cut costs.
Posted: 31 May 2018 | Published: 31 May 2018

Dell EMC and Intel®
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement