IT Management  >   Systems Operations  >   Security  >  

Web Threats

RSS Feed   
Web Threats Reports
 
Internet Security Threat Report: February 2019
sponsored by Symantec
RESEARCH CONTENT: Understanding the latest facts, figures and trends is essential when making adjustments and improvements to your enterprise security strategy. This 2019 research report looks at topics such as formjacking, cryptojacking and ransomware to see how they have trended over the last year.
Posted: 05 Mar 2019 | Published: 28 Feb 2019

Symantec

Why Corelight Is Your Best Next Move in Enterprise Security
sponsored by Corelight
WHITE PAPER: The most sophisticated enterprises continue to be breached, attacked, and compromised. Most large organizations have deployed endpoint security solutions, but often times are still not enough. As a result, many companies are adding network-wide visibility for protection. In this white paper, learn about the benefits of Corelight Sensors.
Posted: 27 Feb 2019 | Published: 27 Feb 2019

Corelight

Data Protection by the Numbers
sponsored by Veeam Software
EBOOK: It is critical for companies to gain an understanding of and a formulaic approach to quantifying technical recovery capabilities, business impacts, and financial concerns related to data protection. In this eBook, learn about the 3 different "languages" of data protection.
Posted: 25 Feb 2019 | Published: 25 Feb 2019

Veeam Software

The Beginners' Guide to Hacker-Powered Security
sponsored by HackerOne
WHITE PAPER: Leveraging the wisdom and power of the vast white-hat hacker community is a new security expectation. In this white paper, learn the best practices for starting and running effective disclosure and bug bounty programs, and how to integrate hacker-powered security into your organization.
Posted: 11 Mar 2019 | Published: 11 Mar 2019

HackerOne

2018-2019 Global Application & Network Security Report
sponsored by Radware
RESEARCH CONTENT: This 2018-2019 global application & network security report highlights the major themes shaping cybersecurity of late. Explore the report to help your organization keep its finger on the pulse of the rapidly evolving and increasingly dangerous cybersecurity landscape.
Posted: 12 Mar 2019 | Published: 12 Mar 2019

Radware

Back to the Basics: What is Cyber Risk and How Can We Measure It?
sponsored by CyberGRX
RESOURCE: Cyber-risk is a hot topic these days, but, it is often misunderstood or conflated with other cybersecurity and privacy concerns. This resource offers a definition of cyber-risk and outlines a model of measuring cyber-risk.
Posted: 28 Feb 2019 | Published: 21 Feb 2019

CyberGRX

Insider Threats Part 1: Identifying and Responding with Fidelis EDR Technology
sponsored by Fidelis
WEBCAST: Sometimes the biggest threat to your sensitive data is one of your own employees. In this webcast, Fidelis' Lucas Chumley and Louis Smith will demonstrate how to minimize the risk posed by an insider threat. Also, see how Fidelis technology can help identify and provide initial notification of a probable threat and then automate response.
Posted: 20 Feb 2019 | Premiered: Feb 20, 2019

Fidelis

Managing Non-Microsoft Security Updates
sponsored by Flexera Software
WHITE PAPER: Overlooking patches for vulnerabilities on non-Microsoft software is a great security risk for businesses. Despite the awareness of risk, organizations still struggle to identify, prioritize and deploy such patches. In this white paper, learn how to get the right patch management capabilities in place.
Posted: 14 Mar 2019 | Published: 14 Mar 2019

Flexera Software

Splunk Security Use Case Detecting Unknown Malware and Ransomware
sponsored by Splunk Services UK Ltd
WHITE PAPER: This white paper will take users on a step-by-step journey through how to detect malware activity and early signs of compromise in a Windows environment.
Posted: 20 Feb 2019 | Published: 20 Feb 2019

Splunk Services UK Ltd

Endpoint Sensor: Understand the source, impact, and spread of advanced threats with endpoint detection and response (EDR)
sponsored by Trend Micro, Inc.
RESOURCE: Malware can manifest itself in your enterprise networks, bypassing traditional security technology. Fortunately, Trend Micro's Endpoint Sensor gives insight to detections by allowing threat investigators to explore detections and hunt for new threats. In this resource, learn more key features of Endpoint Sensor.
Posted: 05 Mar 2019 | Published: 05 Mar 2019

Trend Micro, Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement