IT Management  >   Systems Operations  >   Security  >  

Virus Threats

RSS Feed   
Virus Threats Reports
 
The Top 5 Open Source Vulnerabilities in Technology Companies
sponsored by Sonatype
WHITE PAPER: The tech industry relies on open source technology as a competitive advantage to enable their teams to bring products to market quickly. However, this increased speed also comes with risks. In this white paper, explore the top five areas of vulnerability plaguing organizations in the tech industry today.
Posted: 11 May 2020 | Published: 11 May 2020

Sonatype

To Enable Zero Trust, Rethink Your Firewall Strategy
sponsored by VMware
ANALYST REPORT: IT organizations are spending more to secure their networks however, these investments are not always paying off. To better understand the challenges that businesses are facing in securing their internal network’s east-west traffic, VMware commissioned Forrester Consulting to conduct a survey. Download this report to explore key findings.
Posted: 20 May 2020 | Published: 29 Feb 2020

VMware

Beginners Guide – Securing Legacy Devices
sponsored by NetLib Security
RESOURCE: Medical devices often have lifespans averaging around 15 years. However, these aging devices are still required to meet the data protection benchmarks outlined by HIPAA. This article overviews how organizations with legacy devices can ensure data protection and meet compliance requirements. Read on to learn more.
Posted: 14 May 2020 | Published: 14 May 2020

NetLib Security

Equifax and the 147 Million: One Individual’s Story from behind the Headlines
sponsored by Auth0
VIDEO: What is it like to have your data compromised or your identity stolen? In this video, sit down with one of the 147 million victims of the notorious 2017 Equifax data breach as they share their experience regarding the long-term impacts of this incident and their struggle to seize back control from identity thieves.
Posted: 20 May 2020 | Premiered: 30 Mar 2020

Auth0

Mobile Management Solutions are not Security
sponsored by Checkpoint Software Technologies
WHITE PAPER: Explore why mobile management solutions are not built to protect fleets of mobile devices from threats and how to implement a Zero Trust, comprehensive mobile security strategy to remain protected from the ever-evolving mobile threat landscape.
Posted: 15 May 2020 | Published: 15 May 2020

Checkpoint Software Technologies

The Problem with CVSS Scores & What It Means for Vulnerability Management
sponsored by Vulcan
RESOURCE: While CVSS scores are a helpful way to demonstrate and share information about the severity of a vulnerability, it’s not viable as a standalone prioritization tool. In this article, observe an overview of the shortcomings of CVSS scoring as a risk management tool and best practices for using it appropriately.
Posted: 21 May 2020 | Published: 02 May 2019

Vulcan

Combating Threats & Protecting Enterprise Data Across the Modern Workspace
sponsored by VMware International Unlimited Company
DATA SHEET: According to experts, attacks involving “island hopping”, which bypass security tactics with lateral movement within a network, are becoming increasingly troublesome. So, what can organizations do to counter this threat? This data sheet explores a potential answer. Read on to learn more.
Posted: 13 May 2020 | Published: 13 May 2020

VMware International Unlimited Company

The Ultimate Guide to: AWS, Azure, and GCP Cloud Asset Visibility
sponsored by Orca Security
WHITE PAPER: As organizations continue to embrace cloud migration, IT and security teams should reevaluate their current ability to view and analyze their cloud assets. The following guide explores current tactics and unveils a next-generation visibility and security tool designed to enable agentless visibility into AWS, Azure and GCP. Read on to learn more.
Posted: 11 May 2020 | Published: 11 May 2020

Orca Security

Duo for Device Trust
sponsored by Duo Security
PRODUCT OVERVIEW: As organizations continue to enable employees to work remotely and interact within their own devices, mobile security becomes an increasingly critical piece of the security strategy. In this solution brief discover how Duo’s zero trust approach offering can help organizations meet their security and compliance goals.
Posted: 06 May 2020 | Published: 06 May 2020

Duo Security

2019 CrowdStrike Global Security Attitude Survey
sponsored by CrowdStrike
WHITE PAPER: Each year, CrowdStrike conducts a Global Security Attitude Survey to better understand the current state of incident detection and response. The industry ideal is set at the 1-10-60 rule: 1 minute to detect, 10 minutes to understand, and 60 minutes to contain. Read the research results and see how close organizations came to this benchmark.
Posted: 14 May 2020 | Published: 14 May 2020

CrowdStrike
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info