IT Management  >   Systems Operations  >   Security  >  

Web Threats

RSS Feed   
Web Threats Reports
 
Cover Your Bases: Best Practices for Protecting Remote Work
sponsored by Okta
EBOOK: You have a network to protect, and this means not compromising when it comes to access management, authentication, onboarding and training. In a remote world, you need contextualized, cloud-first identity control that’s flexible, so you can handle all this and more, no problem. Download this Okta best practice guide for details.
Posted: 19 Jan 2021 | Published: 19 Jan 2021

Okta

Security and Compliance Automation for Financial Services
sponsored by Red Hat and Intel
WHITE PAPER: A SANS Institute survey showed that unauthorized access is the No. 1 concern around cloud environments. This is especially true for businesses in financial services, who must maintain constant compliance amidst grueling regulations. By downloading this white paper, learn how automation can help these businesses remain both secure and compliant.
Posted: 14 Jan 2021 | Published: 14 Jan 2021

Red Hat and Intel

Fighting Hackers & Responding to Ransomware: A How-To
sponsored by Fidelis
EGUIDE: Cyberthreats aren’t going away any time soon. It’s vital that you take steps to ready your organization for any attack that comes your way. In this expert e-guide, explore 5 actionable deception-tech steps for fighting hackers as well as 9 steps for creating a ransomware incident response plan. Open now to put your best security foot forward.
Posted: 20 Jan 2021 | Published: 15 Jan 2021

Fidelis

Online Identity Information for Professionals
sponsored by Pipl
DATA SHEET: Microsoft, IBM, Twitter, BBC, eBay are among the industry leaders that use Pipl in their identity information investigations – but why? This Pipl data sheet provides an overview of Pipl’s mission, key features, strategic capabilities, and more. Read on to unlock the full data sheet.
Posted: 19 Jan 2021 | Published: 19 Jan 2021

Pipl

New rules, risks, and rewards: protecting the future of retail
sponsored by AT&T Cybersecurity and Fortinet
WHITE PAPER: For today’s retailers, gathering valuable insights from customer interactions can be pivotal in enhancing and customizing the user experience – hopefully leading to a purchase and lifetime loyalty. However, these advancements can invite a new wave of cyberthreats. Read this white paper to explore a modern security approach for retailers.
Posted: 19 Jan 2021 | Published: 19 Jan 2021

AT&T Cybersecurity and Fortinet

Automating TLS provisioning with OpenShift Service Mesh
sponsored by Red Hat
VIDEO: Traditional application servers are being replaced by modern application microservices architectures that enable distributed workforces to collaborate. This webinar highlights the importance of using mutual TLS (mTLS) to secure communications between services and overviews some of the nuances about its setup – watch now to get started.
Posted: 21 Jan 2021 | Premiered: 21 Jan 2021

Red Hat

Fortinet FortiGate: Bridging the cloud security gap
sponsored by Fortinet, Inc.
VIDEO: Cloud adoption is on the rise, and organizations need to ensure they’re scaling without compromising efficiency, reliability, security or control. Watch this short video to see how Fortinet is helping organization bridge this gap.
Posted: 14 Jan 2021 | Premiered: 14 Jan 2021

Fortinet, Inc.

How to Secure the Voice and Video Apps Your Workforce Depends On
sponsored by LogMeIn Rescue
WEBCAST: Given there’s no sign organizations will soon return to office-based work, IT teams must focus on providing security for voice and video applications. In this webinar, explore the most common threats, such as VoIP and video attacks, and learn how security teams can best counter them through effective prevention, detection and mitigation strategies.
Posted: 05 Jan 2021 | Premiered: Jan 5, 2021

LogMeIn Rescue

Online Identity and the Digital Economy of Tomorrow
sponsored by Pipl
EGUIDE: Identity verification has evolved from traditional methods – which required the presence of government-issued documents – towards digital, multi-layered methods. Read this e-guide for an in-depth analysis of the challenges of today’s environments and explore the emerging trends shaping the future of identity verification.
Posted: 20 Jan 2021 | Published: 20 Jan 2021

Pipl

California Consumer Privacy Act (CCPA) Compliance
sponsored by Socure
DATA SHEET: While the CCPA aims to protect and empower consumers, it also has the potential to expose businesses (and their customers) to breaches and other kinds of misuse of personal information. Read this data sheet to learn more about the risks related to CCPA and how to protect against them.
Posted: 12 Jan 2021 | Published: 12 Jan 2021

Socure
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info