IT Management  >   Systems Operations  >   Security  >  

Virus Threats

RSS Feed   
Virus Threats Reports
 
Top 9 Security Trends in 2020
sponsored by Palo Alto Networks
ANALYST REPORT: The quick pace of digital business and ongoing transition to cloud are challenging traditional security approaches. Acting on these developments, security and risk management leaders can improve resilience, better support business objectives and elevate their organizational standing. Read this Gartner report to learn more.
Posted: 17 Nov 2020 | Published: 27 Feb 2020

Palo Alto Networks

Stopping BEC and EAC: Email Security in 2020
sponsored by Proofpoint
EBOOK: Email continues to be the leading vector in successful cyberattacks, leaving CISOs with the increasingly difficult responsibilities of protecting employee inboxes and stopping potential threats. Read this eBook for a comprehensive guide to stopping Business email compromise (BEC) and email account compromise (EAC) attacks.
Posted: 19 Nov 2020 | Published: 19 Nov 2020

Proofpoint

Spotting a Denial-of-Service (DoS) Attack
sponsored by Farsight Security
RESOURCE: DoS attacks are an increasingly serious threat to today’s businesses, capable of rendering organizations virtually invisible online and cutting off interaction with customers. They can last for hours, days or even longer and cost organizations significant time, money and resources. View this infographic to see how to mitigate these attacks.
Posted: 24 Nov 2020 | Published: 24 Nov 2020

Farsight Security

Plenty of Phish: Why We Need a New Approach to Email Security
sponsored by Darktrace
VIDEO: The shift towards remote workforces has introduced a series of new phishing and other email security threats. Unfortunately, inbox gateways and other traditional email security methods no longer cut it. Watch this webinar for a closer look at these new challenges and discover Darktrace’s Immune System Approach to email security.
Posted: 18 Nov 2020 | Premiered: 18 Nov 2020

Darktrace

Webinar 8 - Banking on the Cloud: Real-World Use and Challenges Across Financial Services
sponsored by McAfee
WEBCAST: The Cloud Security Alliance (CSA) recently conducted global research around cloud adoption in financial services. What do their findings mean for the real world? Watch this webinar to see analysis of cloud usage of financial institutions across three main areas of interest: security concerns, regulatory requirements and governance aspects.
Posted: 12 Nov 2020 | Premiered: Nov 12, 2020

McAfee

Your Guide to DNS Security
sponsored by TechTarget
RESOURCE: Which of the following web and application security technologies is your company planning to purchase within the next 12 months? Secure application development and testing, web security, or application and container security? Let us know in our Web & Application Security Survey. As a thank you, you'll receive our expert guide.
Posted: 23 Nov 2020 | Published: 23 Nov 2020

TechTarget

Endpoint Protection Best Practices to Block Ransomware
sponsored by Sophos
WHITE PAPER: Ransomware attacks are becoming increasingly costly – in fact, the average global cost to remediate an attack is over $700,000. One of the best ways to protect against ransomware attacks is with properly configured endpoint protection. Read on to discover best practices for configuring your endpoint protection against ransomware.
Posted: 20 Nov 2020 | Published: 20 Nov 2020

Sophos

Finding the Disconnect: Security Perceptions and Behaviors of Today’s Enterprise Employees
sponsored by Dtex
EBOOK: As the modern enterprise acknowledges cyber risks as critical business risks, the nature of enterprise security discussions is quickly moving from the technical and operational to the strategic. This has created a new reality in which security decisions can turn a user into a trusted ally... or a liability. Read this guide to learn more.
Posted: 23 Nov 2020 | Published: 23 Nov 2020

Dtex

Case Study: Protecting Trusted Insiders
sponsored by Dtex
CASE STUDY: Recently, a slew of invoice-themed malicious phishing emails were found to have penetrated a customer’s network at a large energy company. What was worse? They had very limited visibility into the attack. Read this case study to learn how this organization was able to identify, understand and mitigate future targeted phishing attacks.
Posted: 23 Nov 2020 | Published: 23 Nov 2020

Dtex

See and Defend Cloud Workloads
sponsored by AWS & CrowdStrike
WEBCAST: In this webcast, learn how the combination of AWS and Crowdstrike, can help defend your architecture and meet risk requirements for your applications and services running in the cloud. In addition, watch how to gain API visibility of your public cloud environment while mapping back to compliance and mitigating shadow IT exposures from attackers.
Posted: 26 Nov 2020 | Premiered: Nov 1, 2020

AWS & CrowdStrike
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info