IT Management  >   Systems Operations  >   Security  >  

Web Threats

RSS Feed   
Web Threats Reports
 
Bitdefender Endpoint Detection and Response (EDR)
sponsored by Bitdefender
PRESENTATION: Today’s cyberthreats are becoming increasingly troublesome, and traditional security efforts often lack the unified vision and visibility required to tackle these challenges. Read this presentation for a closer look at today’s advanced threats and discover how Endpoint detection and response (EDR) tools are uniquely positioned to address them.
Posted: 11 Feb 2021 | Published: 11 Feb 2021

Bitdefender

Advanced Threat Detection, Focused Investigation And Effective Response
sponsored by Bitdefender
DATA SHEET: Traditional endpoint security efforts are growing less and less capable of preventing today’s sophisticated cyberthreats – increasing the need for advanced threat detection, investigated and response capabilities, typically in the form of Endpoint Detection and Response (EDR). Read this datasheet to see what Bitdefender offers in terms of EDR.
Posted: 10 Feb 2021 | Published: 10 Feb 2021

Bitdefender

Threat Intelligence Executive Report
sponsored by Dell SecureWorks
RESEARCH CONTENT: The Secureworks Counter Threat Unit (CTU) research team analyzes security threats and helps organizations protect their systems. During November and December 2020, CTU researchers observed notable developments in threat behaviors, the global threat landscape, and security trends, and identified lessons to consider.
Posted: 22 Feb 2021 | Published: 22 Feb 2021

Dell SecureWorks

Saudi Arabia Security Insights Report
sponsored by DWA UK - VMware (Carbon Black)
WHITE PAPER: Read this report to discover how senior cybersecurity professionals plan to adapt to the security challenges of the distributed workplace and evolve defenses to make security intrinsic to infrastructure and operations.
Posted: 11 Jun 2021 | Published: 11 Jun 2021

DWA UK - VMware (Carbon Black)

The Technology Behind Radware Bot Manager for APIs
sponsored by Radware
WHITE PAPER: APIs are seeing massive adoption, and organizations are discovering ways to secure them from potential intrusion and exploitation. One of the most prominent API threats is ‘bad bots,’ and they’ve seen a 30% increase in the past year. To learn how you can protect from automated attacks targeting APIs, get stuck into this white paper by Radware.
Posted: 25 Jan 2021 | Published: 25 Jan 2021

Radware

Leve raging AI to Automate Vulnerability Management
sponsored by Dell SecureWorks
DATA SHEET: Today’s organizations need vulnerability management (VM) solutions that are built to maximize risk reduction. With the power of ML, these same organizations can minimize the manual burden on InfoSec and IT operations teams. Download this data sheet to explore how Secureworks’ VM solution strives to do all this and more.
Posted: 23 Feb 2021 | Published: 23 Feb 2021

Dell SecureWorks

7 Experts on Transitioning to MDR
sponsored by GoSecure
EBOOK: Managed detection and response (MDR) can help you quickly identify and mitigate cyberattacks. But it’s not always clear when a company should move to MDR, nor is it clear how to get the greatest value from an MDR service. In this e-book, hear from 7 security experts as they offer advice to organizations considering MDR.
Posted: 02 Mar 2021 | Published: 02 Mar 2021

GoSecure

Preventing identity theft in a data breach
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, we will explore the links between ransomware attacks, data breaches and identity theft. First, Nicholas Fearn investigates the phenomenon of the double extortion attack, and shares some insider advice on how to stop them, while we'll explore the top five ways data backups can protect against ransomware in the first place.
Posted: 06 May 2021 | Published: 06 May 2021

ComputerWeekly.com

The Evolution of Security Operations and the Contemporary State of Play
sponsored by Kaspersky
ANALYST REPORT: According to IDC research, over half of all global businesses with 2,500+ employees already have a security operations center (SOC) in place, and 72% of those have built these capabilities within the last five years. Examine the full IDC report to follow this trend and to see some of the challenges that come with building a modern SOC.
Posted: 17 Feb 2021 | Published: 31 Aug 2020

Kaspersky

How to Become a Threat Hunter
sponsored by Cisco Systems Inc.
EGUIDE: Much of hunting is instinct, and when it comes to hunting cyberthreats, it’s no different. Threat hunters are good at what do because they aren’t as ‘by-the-book’ as other professionals. But they do have a set of learnable skills that make them successful. Download this e-guide featuring Gartner analyst John Collins to know what these skills are.
Posted: 14 Apr 2021 | Published: 07 Apr 2021

Cisco Systems Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences