IT Management  >   Systems Operations  >   Security  >  

Virus Threats

RSS Feed   
Virus Threats Reports
 
Micro Focus ArcSight: Protecting Security Analytics with an Audit Quality SIEM Platform
sponsored by Micro Focus
WHITE PAPER: In this white paper, discover how ArcSight is protecting security analytics with an audit quality SIEM solution.
Posted: 09 Aug 2019 | Published: 09 Aug 2019

Micro Focus

Industrial Controls System Vulnerabilities
sponsored by Dragos
ANALYST REPORT: In this report, explore key findings from the Dragos Intelligence team's analysis of ICS-specific vulnerabilities. Also discover the impacts, risk and mitigation options for defenders.
Posted: 07 Aug 2019 | Published: 07 Aug 2019

Dragos

Top 10 Security Changes in Red Hat Enterprise Linux 8
sponsored by Red Hat
WEBCAST: In this webinar, see an overview of the most notable enhancements to the many security capabilities in Red Hat Enterprise Linux 8 and how to use them to enhance the security posture of your systems.
Posted: 16 Aug 2019 | Premiered: Aug 16, 2019

Red Hat

The Complete Guide to G Suite Email Protection for IT and Security Leaders
sponsored by Virtru
WHITE PAPER: A mistaken reply all or forward can cost millions. And for executives with more sensitive and valuable information stored in their inboxes, the stakes are even higher.This guide explains the strategic drivers around the need for email encryption and outlines the best available options for organizations that use G Suite. Read on to learn more.
Posted: 09 Aug 2019 | Published: 09 Aug 2019

Virtru

Top 3 Telecom Provider Secures Mobile Accounts
sponsored by Shape Security
CASE STUDY: A Top 3 US Telecom Provider needed to secure its mobile accounts from credential stuffing attackers targeting them to commit various fraud schemes. In this case study, learn how the company was able to stop upgrade theft, 2FA bypass, and virtual calling with Shape Enterprise Defense.
Posted: 19 Aug 2019 | Published: 19 Aug 2019

Shape Security

Privacy by Design: The Key to Unlock Your Compliance Strategy
sponsored by Immuta, Inc
WHITE PAPER: Privacy by Design (PbD), and its EU version Data Protection by Design (DPbD), aim to implement privacy controls from the outset. In this white paper, explore the beginnings of a framework for operationalizing PbD.
Posted: 06 Aug 2019 | Published: 06 Aug 2019

Immuta, Inc

Top 10 Reasons Customers Choose Proofpoint to Protect Office365
sponsored by Proofpoint
RESOURCE: For organizations migrating to the cloud, Microsoft Office 365 is a whole new way of working—one that requires a whole new approach to security and compliance. Dive into this infographic to discover the top 10 reasons customers may be choosing Proofpoint to protect Office 365.
Posted: 22 Aug 2019 | Published: 22 Aug 2019

Proofpoint

The Most Common Types of Invoice Fraud and How to Prevent Them
sponsored by AppZen
WHITE PAPER: How can your business prevent falling prey to invoice fraud schemes? Knowing exactly what to look out for is an important first step. Download this e-book to learn about the most common types of invoice fraud and how to prevent them.
Posted: 13 Aug 2019 | Published: 13 Aug 2019

AppZen

Keeping Fraud Detection Software Aligned With the Latest Threats
sponsored by SAS
WHITE PAPER: Fraud and financial crimes weren't considered serious issues until the 1980s. Since then, they have become commonplace. As fraud changes and evolves, organizations must keep anti-fraud software current to detect new and emerging threats. In this white paper, learn how SAS Visual Investigator can help organizations do this.
Posted: 07 Aug 2019 | Published: 07 Aug 2019

SAS

CyberConverged Data Storage
sponsored by RackTop Systems
DATA SHEET: Read the following paper to learn about a CyberConverged network-attached storage (NAS) solution which fuses scalable capacity and performance with advanced data security and compliance capabilities. Details on how it works, benefits, and cost savings are included inside.
Posted: 09 Aug 2019 | Published: 09 Aug 2019

RackTop Systems
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement