Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

Web Blocking Software

RSS Feed   
Web Blocking Software Reports
 
Content Filtering: Taming the Wild Web
sponsored by SearchSecurity.com
EGUIDE: Despite the countless opportunities and benefits the Internet provides, it also introduces a number of business risks. In this e-guide, uncover expert advice on how to mitigate risks with content filtering as well as how to balance web control with employee privacy.
Posted: 22 Jun 2012 | Published: 21 Jun 2012

SearchSecurity.com

Spear Phishing: The Targeted Attacks that Aim for Your Business
sponsored by Vade Secure
WHITE PAPER: Phishing and spear phishing are two of the most common types of cyberattacks. In a growing digital economy, technological assets are coming under greater threat from these two very similar attacks. How do you identify a phishing attack, and how can you take a proactive approach? Read this white paper to learn the answers.
Posted: 21 Sep 2020 | Published: 21 Sep 2020


Introducing Cortex XSOAR
sponsored by Palo Alto Networks
VIDEO: Security orchestration, automation and response (SOAR) has become key to effective security strategies. But, like any cybersecurity technology, yesterday’s SOAR capabilities have evolved to reflect the needs of today’s organizations. Watch this webinar to learn more about Palo Alto’s Cortex XSOAR and see how it compares to traditional SOAR.
Posted: 28 Sep 2020 | Premiered: 28 Sep 2020

Palo Alto Networks

Qorus Software Uses Hyperproof to Gain Control Over Its Compliance Program
sponsored by Hyperproof
CASE STUDY: In this case study, follow Qorus, a sales enablement and proposal management provider, as they partner with Hyperproof to address security and compliance issues and achieve flexibility that scales as the organization grows.
Posted: 11 Sep 2020 | Published: 11 Sep 2020

Hyperproof

The State of Cloud Security 2020
sponsored by Sophos
ANALYST REPORT: To understand the balance between flexibility and vulnerability in the public cloud, a survey of 3,251 IT managers across 26 countries was conducted. The study shows the ways in which attackers are changing the rules to find new ways into environments and exposing security gaps that were once unknown. Read the full report to go in-depth.
Posted: 10 Sep 2020 | Published: 31 Jul 2020

Sophos

Enhancing Orchestration Using Threat Intelligence
sponsored by ThreatQuotient
VIDEO: Managing modern risk requires dedicated threat intelligence platforms that equip organizations with the information and guidance needed to identity and thwart potential cyberattacks. Watch this webinar to learn about how threat intelligence can (and should) be used to enhance security orchestration initiatives.
Posted: 21 Sep 2020 | Premiered: 21 Sep 2020

ThreatQuotient

C-Suite Perspectives: Accelerated Cloud Migration But Lagging Security
sponsored by Radware
ANALYST REPORT: By now, “quick acceleration to the cloud compromised by lack of security” is a song you’ve heard 2500 times. But it’s true – businesses have forced their hand when it comes to cloud migration, and the resulting lapse in security has left them vulnerable. Get in the know – read this in-depth report to learn perspectives from C-suite executives.
Posted: 28 Sep 2020 | Published: 28 Sep 2020

Radware

The Three Mega Trends CISOs Need to Watch
sponsored by Hyperproof
EGUIDE: Today’s CISO faces pressure on many fronts – an expanding threat landscape, an exponentially growing volume of data and increasingly stringent data privacy laws. Read this guidebook to discover how CISOs can navigate and manage each of these challenges, and more.
Posted: 08 Sep 2020 | Published: 08 Sep 2020

Hyperproof

Using In-Vehicle Networks to Securely Connect Modern Public Transit Technologies
sponsored by CradlePoint
DATA SHEET: Today, public transportation agencies are finding more ways to use connected devices and applications in vehicles. However, this depends on highly reliable connectivity. In this brief, learn how Cradlepoint’s NetCloud Service for Mobile can help provide the enterprise capabilities that public transit agencies need.
Posted: 14 Sep 2020 | Published: 07 Aug 2020

CradlePoint

Credential Stuffing 2020: Attack Tools and Trends
sponsored by F5 Networks
VIDEO: Recently emerging as one of the most prominent threats targeting web applications, credential stuffing has found its way into news headlines and mainstream media. This webinar provides an overview of the current credential stuffing trends and tactics – highlighting how the threat has evolved over the years.
Posted: 18 Sep 2020 | Premiered: 18 Sep 2020

F5 Networks
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info