IT Management  >   Systems Operations  >   Security  >   Security Management  >  


RSS Feed   
Vulnerabilities Reports
Black Hat 2018 Hacker Survey Report
sponsored by Thycotic
RESEARCH CONTENT: Discover the hacker perspective on vulnerabilities and attack vectors they find easiest to exploit and better understand how to protect your organization.
Posted: 27 Sep 2018 | Published: 27 Sep 2018


2018 Cyberthreat Defense Report
sponsored by Gigamon
RESEARCH CONTENT: 77% of organizations have been victimized by at least 1 successful cyberattack, according to a survey of over 1,200 IT security pros conducted by CyberEdge Group.
Posted: 29 Jun 2018 | Published: 29 Jun 2018


Vulnerability Review 2018: Global Trends
sponsored by Flexera Software
RESEARCH CONTENT: Download this report for key figures and facts on vulnerabilities from a global information security perspective.
Posted: 04 Sep 2018 | Published: 04 Sep 2018

Flexera Software

2018 Application Security Statistics Report
sponsored by WhiteHat Security
WHITE PAPER: This application security statistics report provides an analysis of the state of application security, brings to the forefront evolutionary trends, and highlights best practices that result in better application security over time. The report also presents challenges and opportunities to secure the applications.
Posted: 07 Dec 2018 | Published: 31 Dec 2018

WhiteHat Security

2018: Cyberthreat Predictions & Security Strategy
sponsored by Aruba Networks
VIDEO: With major breaches exposing a vast amount of personal information and disruptive ransomware attacks shaking the world, it is critical to examine the lessons learn from these events to shape a strategy. In this webinar, listen to a panel of security experts as they discuss.
Posted: 10 Aug 2018 | Premiered: 02 Aug 2018

Aruba Networks

Modern-Day Security Tales
sponsored by Cisco Umbrella
RESOURCE: Read through this creative security storybook and discover the many anxieties that can plague you and other security professionals. If you share some of these feelings, you may want to consider a new security tool.
Posted: 07 Sep 2018 | Published: 07 Sep 2018

Cisco Umbrella

The SIEM Buyer's Guide
sponsored by Splunk
RESOURCE: How have SIEM platforms evolved? This SIEM Buyer's Guide reveals the differences between modern SIEM and legacy SIEM and offers 9 technical capabilities of a modern SIEM strategy and how it can improve your overall security.
Posted: 31 Jan 2018 | Published: 31 Jan 2018


It's Time for a Smarter Approach: Threat-Centric Vulnerability Management
sponsored by Skybox Security
WHITE PAPER: Access this white paper to learn how threat-centric vulnerability management (TCVM) offers a smarter approach for your organization as the threat landscape continues to evolve.
Posted: 02 May 2018 | Published: 02 May 2018

Skybox Security

Cryptocurrencies are the New Frontier of Fraud
sponsored by Digital Shadows
WHITE PAPER: In this white paper, discover the most common methods used by criminal actors, including account takeovers, mining fraud and scams against initial coin offerings (ICOs). Then, learn how to update your security infrastructure to combat the changing cryptocurrency landscape in 2018.
Posted: 06 Feb 2018 | Published: 06 Feb 2018

Digital Shadows

10 Things to Get Right for Successful DevSecOps
sponsored by Tenable
RESEARCH CONTENT: Gartner reports that by 2021, DevSecOps practices will be embedded in 80% of rapid development teams, up from 15% in 2017. Take a look at this Gartner report to uncover 10 keys for successful DevSecOps initiatives.
Posted: 09 Mar 2018 | Published: 09 Mar 2018


About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement