IT Management  >   Systems Operations  >   Security  >  

Virus Threats

RSS Feed   
Virus Threats Reports
 
IBM Security Guardium Analyzer Overview Demo
sponsored by IBM
WEBCAST: Public sentiment is changing around data privacy. In this video, see how IBM Security Guardium Analyzer can help organizations efficiently address regulated data risk through data discovery, data classification, vulnerability scanning and database risk scoring for on-premises and cloud databases.
Posted: 28 Oct 2019 | Premiered: Feb 26, 2019

IBM

10 Must-Ask Questions When Choosing a SOAR Solution
sponsored by Siemplify
RESOURCE: With an increasing number of SOAR solutions in the market, each with a different approach, asking the correct questions to get the right platform is key. Dive into this brief infographic to discover the 10 questions you should ask when selecting the best SOAR platform for your organization.
Posted: 05 Nov 2019 | Published: 05 Nov 2019

Siemplify

Cloud Security Analytics and Policy Management
sponsored by Fortinet, Inc.
WHITE PAPER: When it comes to securing public cloud resources, integration of security controls helps organizations protect data, prevent intrusions, fight threats, and satisfy auditors. Discover 5 key use cases faced by security teams tasked with securing their public cloud infrastructure.
Posted: 30 Oct 2019 | Published: 26 Sep 2019

Fortinet, Inc.

Five Major Bot Threats to Holiday E-commerce and How to Stop Them
sponsored by PerimeterX
WHITE PAPER: With the holiday season approaching, it’s essential that online retail companies ensure they are prepared for the cybersecurity threats they face. This white paper highlights 5 major types of attacks companies need to be vigilant of and defensive capabilities for addressing these threats. Read on to make sure your organization is ready.
Posted: 11 Dec 2019 | Published: 11 Dec 2019

PerimeterX

Preparing for a Data Breach: Not If, But When
sponsored by A-Lign
WHITE PAPER: When it comes to preparing for data breaches, companies should think in terms of “when” instead of “if” to ensure cybersecurity preparedness. In this white paper, Petar Besalev, Senior VP of Cybersecurity and Privacy Services at A-Lign, provides an overview of strategies and best-practices to help you prepare for a data breach.
Posted: 11 Dec 2019 | Published: 11 Dec 2019

A-Lign

Mobile Phishing: Myths and Facts Facing Every Modern Enterprise Today
sponsored by Lookout
WHITE PAPER: Traditional phishing protection methods don’t apply to mobile devices, and cyberattackers are taking exposing this vulnerability. In fact, the rate at which people are falling for phishing attacks on mobile has increased 85% annually since 2011. In this white paper, dissect the myths and facts around mobile phishing.
Posted: 21 Nov 2019 | Published: 21 Nov 2019

Lookout

User Lifecycle Management Proves Costly to IT
sponsored by Okta
WHITE PAPER: An IDG survey reveals that manual processes drain productivity and increase security risks. Read on to learn more about the differences between manual versus automated lifecycle management.
Posted: 09 Dec 2019 | Published: 09 Dec 2019

Okta

Discover Hidden API Security Vulnerabilities and How to Defend Against Them
sponsored by Ping Identity Corporation
WHITE PAPER: Already an attractive target for bad actors, APIs are predicted to soon become the top attack vector. And while APIs may hold the key to compliance with regulations like GDPR, PSD2 and CDR, they also expose potential vulnerabilities. Read this white paper to gain a deeper visibility into your API activity today.
Posted: 13 Nov 2019 | Published: 13 Nov 2019

Ping Identity Corporation

Network Security Made Simple
sponsored by Cisco Umbrella
EBOOK: The volume and sophistication of attacks are intensifying relentlessly — and it’s clear that conventional defenses are not enough. In this e-book, discover challenges facing today’s security professionals and explore some simple actions you can take to reduce malware, simplify security and improve network performance.
Posted: 06 Nov 2019 | Published: 06 Nov 2019

Cisco Umbrella

Tanium for Detection and Response: Effectively Address and Remediate Incidents
sponsored by Tanium
WHITE PAPER: Endpoint detection response (EDR) tool effectiveness can be measured by 3 key attributes: the scope of data it provides, its performance and scalability, and its flexibility. In this solution brief, dive deeper into each of the features that distinguish effective EDR tools. Continue reading to learn more.
Posted: 15 Nov 2019 | Published: 15 Nov 2019

Tanium
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement