IT Management  >   Systems Operations  >   Security  >  

Virus Threats

RSS Feed   
Virus Threats Reports
 
How to Combat Fraud in 3 Easy Steps
sponsored by Onfido
WHITE PAPER: There are countless ways fraudsters can slip through the net. That's why organizations need to be able to recognize and analyze all of them to keep ahead competitively. Download this white paper for 3 simple steps to combat identity fraud today.
Posted: 12 Feb 2019 | Published: 12 Feb 2019

TOPICS: 
Onfido

The Complete Guide to Building Your Vendor Risk Management Program
sponsored by Security Scorecard
WHITE PAPER: Tackling the problem of vendor risk isn't made any easier by the fact that with technology solutions being added by the day, current vendor risk management (VRM) processes are not equipped to handle the growing demand of security risk assessments for new and existing third-parties. In this guide, learn how to improve your VRM program.
Posted: 08 Feb 2019 | Published: 31 Dec 2017

TOPICS: 
Security Scorecard

PandaLabs Annual Report 2018
sponsored by Panda Security
RESEARCH CONTENT: As technology continues to advance, cybercriminals are leveraging new capabilities into more sophisticated cyberattacks. PandaLabs, Panda Security's anti-malware laboratory, tracks threat data in real time and has compiled it into a report. Download the report for highlights of 2018's cybersecurity trends, as well as emerging threats for 2019.
Posted: 29 Jan 2019 | Published: 30 Nov 2018

TOPICS: 
Panda Security

There Are Two Types Of Companies Today: Those that Have Had Security Breaches, And Those That Don't Know they Have.
sponsored by Lenovo & Microsoft
RESOURCE: The number of cyberattacks is rising every day and criminals are constantly developing more sophisticated and creative ways to expose vulnerabilities. Every device is at risk, and companies must rely on technology providers to "out-innovate" the bad guys. In this infographic and Q&A, explore Lenovo's end-to-end security offerings.
Posted: 07 Feb 2019 | Published: 07 Feb 2019

TOPICS: 
Lenovo & Microsoft

Market Guide for Application Shielding
sponsored by Arxan
RESEARCH CONTENT: Protecting applications that run within untrusted environments is crucial as mobile, IoT and modern web applications migrate software logic to the client side. Application shielding is well-suited to protect consumer mobile apps. Download this Gartner research report to learn more about application shielding.
Posted: 14 Feb 2019 | Published: 27 Jun 2018

TOPICS: 
Arxan

Accelerating Security Response
sponsored by ServiceNow
WHITE PAPER: Financial institutions have long been leaders in information security, spending a significant amount of their IT budgets on safeguarding their companies. While they have always been working on reducing threats, new challenges continue to emerge. In this white paper, learn about some of the new challenges financial institutions are facing.
Posted: 12 Feb 2019 | Published: 12 Feb 2019

TOPICS: 
ServiceNow

Build Application Security into the Entire SDLC
sponsored by Micro Focus
WHITE PAPER: 84% of security breaches exploit vulnerabilities at the application layer. And, software security is still an afterthought for developers. In this white paper, discover how Fortify Security Assistant empowers developers to take responsibility for their own code by finding and fixing application security defects during the coding process.
Posted: 29 Jan 2019 | Published: 31 Aug 2018

TOPICS: 
Micro Focus

The Forrester New Wave™: Cybersecurity Risk Rating Solutions, Q4 2018
sponsored by Security Scorecard
RESEARCH CONTENT: According to Forrester's survey, only 14% of respondents are confident that they effectively track all of their third parties. Cybersecurity risk rating solutions can help by automating the collection and analysis of third-party risk data. In this report, Forrester identifies the 9 most significant cybersecurity risk rating solution providers.
Posted: 11 Feb 2019 | Published: 13 Nov 2018

TOPICS: 
Security Scorecard

How to Reach Cybersecurity Maturity in 5 Critical Steps
sponsored by Dell SecureWorks
WHITE PAPER: Security is often stuck in a defensive and preventive state that leaves organizations unable to detect and respond appropriately to cyberattacks and incidents. In this white paper, find out how you can adjust your organizations security maturity level with just 5 key steps and change the state of your security.
Posted: 07 Feb 2019 | Published: 07 Feb 2019

TOPICS: 
Dell SecureWorks

How Cybercriminals are Adapting to Outwit Defenses
sponsored by Dell SecureWorks
WEBCAST: From July 2017 through June 2018, SecureWorks Counter Threat Unit researchers analyzed incident response outcomes and conducted original research to gain insight into threat activity and behavior across 4,400 companies. In this webcast, gain insight on the key findings from the report.
Posted: 06 Feb 2019 | Premiered: Dec 5, 2018

TOPICS: 
Dell SecureWorks
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement