IT Management  >   Systems Operations  >   Security  >  

Web Threats

RSS Feed   
Web Threats Reports
 
Market Guide For Security Orchestration, Automation And Response Solutions
sponsored by Palo Alto Networks
RESEARCH CONTENT: SOAR is gaining traction as a way to improve security operations. Security and risk management leaders should evaluate how these tools can support and optimize their broader security operations capabilities. Read this Gartner Marketing Guide to learn more about sifting through the noise and choosing the best-fit SOAR tool for your needs.
Posted: 31 Dec 2020 | Published: 21 Sep 2020

Palo Alto Networks

Addressing Complexity and Expertise in Application Security Testing
sponsored by WhiteHat Security
RESEARCH CONTENT: The Verizon’s 2020 DBIR indicated that 43% of data breaches begin by targeting a web application. This discovery has begun to shift the cybersecurity paradigm from focusing on on-premise infrastructures to protecting their web apps with application security testing (AST). Read this 451 Research brief to learn more about AST.
Posted: 23 Nov 2020 | Published: 23 Nov 2020

WhiteHat Security

Security Observability: Why Tracing?
sponsored by Traceable
WHITE PAPER: Cyberattacks can cost affected organizations as much as $13 million per year. What if you could reduce the time to detect a cyberattack all the way down to zero? How much could you save by detecting and stopping an attack while it’s still happening? Leverage this white paper to learn the 4 pillars of security observability.
Posted: 22 Feb 2021 | Published: 22 Feb 2021

Traceable

Cyber Security: 2021 Worst in Show
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide: Throughout 2021, there has been a strong focus worldwide on how to combat cyber security attacks for most businesses. In this e-guide we take a look at the best of the worst of those attacks to happen throughout January to June this year and how businesses can learn/adapt from these attacks.
Posted: 09 Jun 2021 | Published: 09 Jun 2021

ComputerWeekly.com

The Technology Behind Radware Bot Manager for APIs
sponsored by Radware
WHITE PAPER: APIs are seeing massive adoption, and organizations are discovering ways to secure them from potential intrusion and exploitation. One of the most prominent API threats is ‘bad bots,’ and they’ve seen a 30% increase in the past year. To learn how you can protect from automated attacks targeting APIs, get stuck into this white paper by Radware.
Posted: 25 Jan 2021 | Published: 25 Jan 2021

Radware

Spear Phishing: Top Threats and Trends Vol. 5
sponsored by Barracuda
RESEARCH CONTENT: As their speedy exploitation of fears around the COVID-19 pandemic show, cybercriminals adapt quickly to current events and new tactics. This in-depth report takes a look at the evolving trends in spear-phishing and the new ways attackers are tricking their victims – read on unlock this exclusive insight.
Posted: 29 Dec 2020 | Published: 29 Dec 2020

Barracuda

Endpoint Prevention and Response: Comparative Report
sponsored by Palo Alto Networks
ANALYST REPORT: Businesses are using endpoint prevention and response (EPR) to detect, prevent, analyze and respond to targeted attacks such as advanced persistent threats (ATPs). In this AV Comparatives report, study a comparison of 9 different EPR platforms and examine whether they took an active or passive response to threats.
Posted: 22 Jan 2021 | Published: 17 Dec 2020

Palo Alto Networks

SOLUTION BRIEF Advancing SOC Endpoint Incident Response Practices
sponsored by Malwarebytes
DATA SHEET: Learn how Malwarebytes Incident Response can help you combat sophisticated cyberthreats as well as avoid the damage a successful breach could inflict on your organization’s reputation.
Posted: 12 Mar 2021 | Published: 12 Mar 2021

Malwarebytes

Zero trust: Taking back control of IT security
sponsored by ComputerWeekly.com
EGUIDE: In this E-Guide we go in-depth to explore the concept of zerotrust. First, Cliff Saran explores some of the basics of zerotrust, exploring how the advent of mobile computing, remote working, and software-as-a-service (SaaS) had already started the shift in security focus away from the perimeter – even before the Covid-19 pandemic.
Posted: 06 Aug 2021 | Published: 06 Aug 2021

ComputerWeekly.com

Stay Ahead of New Ransomware Threats: Protect against data exfiltration and extortion
sponsored by Palo Alto Networks
WHITE PAPER: Recent data shows that threats are developing in two key areas: data exfiltration and extortion. Bad actors are using ransomware as a means to these ends. Organizations must be aptly prepared by knowing what these processes look like. View this white paper to get an in-depth look at an exfiltration-focused attack as well as the extortion phase.
Posted: 22 Jan 2021 | Published: 16 Dec 2020

Palo Alto Networks
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2022, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences