IT Management  >   Systems Operations  >   Security  >  

Web Threats

RSS Feed   
Web Threats Reports
 
Duo for Device Trust
sponsored by Duo Security
PRODUCT OVERVIEW: As organizations continue to enable employees to work remotely and interact within their own devices, mobile security becomes an increasingly critical piece of the security strategy. In this solution brief discover how Duo’s zero trust approach offering can help organizations meet their security and compliance goals.
Posted: 06 May 2020 | Published: 06 May 2020

Duo Security

Knock, Knock: Is This Security Thing Working?
sponsored by VMware
WHITE PAPER: 2020 is close to its halfway mark, so now is the perfect time to reflect on the current progress of cybersecurity initiatives, as well as your security posture as a whole. This whitepaper provides a closer look at key issues and emerging trends in the cybersecurity landscape, in order to help gauge your progress and guide your planning.
Posted: 22 May 2020 | Published: 31 Mar 2020

VMware

Passwordless Experience for A More Secure and Productive Workforce
sponsored by Entrust, Inc.
PRODUCT OVERVIEW: Passwords are quickly becoming an outdated security tool, set to be replaced by passwordless authentication methods. In this solution brief, take a closer look at the key features and capabilities of Entrust Datacard’s passwordless authentication offering, designed to increase productivity, unify access and reduce password-related risks.
Posted: 08 May 2020 | Published: 08 May 2020

Entrust, Inc.

Ransomware Realities for Small and Medium-Sized Businesses
sponsored by CrowdStrike
WHITE PAPER: Contrary to the belief that ransomware only targets large organizations, small and medium-sized businesses (SMBs) are on the receiving end of a breach nearly 43% of the time. But without the resources of a large business, what can SMBs do to protect themselves? Read on to find out.
Posted: 20 May 2020 | Published: 20 May 2020

CrowdStrike

Automating Your Vulnerability Remediation Process
sponsored by Vulcan
WHITE PAPER: The vulnerability management lifecycle is a time-consuming set of tasks, making it a perfect candidate for integrating automation into the process. But how should organizations go about this? This whitepaper provides a set of examples and uses cases for what to do. Read on to get started.
Posted: 15 May 2020 | Published: 30 Jun 2019

Vulcan

Cool Vendors in Cloud Office Security
sponsored by Armorblox
RESOURCE: As organizations continue to embrace the operational benefits of cloud office suites, security leaders need to ensure that data protection isn’t overlooked. In this Gartner report, take an in-depth look at four key vendors and their innovative approaches to cloud office security, email and collaboration.
Posted: 11 May 2020 | Published: 01 May 2020

Armorblox

Justify Your Vulnerability Management Program
sponsored by Vulcan
WHITE PAPER: In this white paper, Vulcan compiled the results from several vulnerability management studies, conducted by organizations like Gartner, Ponemon, Verizon and more, to provide readers with a comprehensive set of key statistics and figures. Read on to unlock the findings.
Posted: 15 May 2020 | Published: 15 May 2020

Vulcan

Vulnerability Remediation in Three Steps
sponsored by Vulcan
RESOURCE: As organizational environments become increasingly complex and security tools more disparate, the teams responsible for vulnerability remediation find themselves dealing with an overwhelming workload. In this article, discover 3 easy steps organizations can take to lower vulnerability risk and improving security posture.
Posted: 20 May 2020 | Published: 28 Nov 2019

Vulcan

How to Combat Island Hopping
sponsored by VMware International Unlimited Company
WHITE PAPER: Island hopping is a cyberattack strategy in which a hacker targets a smaller organization in order to leverage their affiliation with larger organizations as a point of entry for an attack. This white paper takes a closer look at island hopping tactics and methods for identifying and mitigating them. Read on to learn more.
Posted: 08 May 2020 | Published: 08 May 2020

VMware International Unlimited Company

The Ultimate Guide to: AWS, Azure, and GCP Cloud Asset Visibility
sponsored by Orca Security
WHITE PAPER: As organizations continue to embrace cloud migration, IT and security teams should reevaluate their current ability to view and analyze their cloud assets. The following guide explores current tactics and unveils a next-generation visibility and security tool designed to enable agentless visibility into AWS, Azure and GCP. Read on to learn more.
Posted: 11 May 2020 | Published: 11 May 2020

Orca Security
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info