IT Management  >   Systems Operations  >   Security  >  

Zero Day Threats

RSS Feed   
Zero Day Threats Reports
 
MDR Evaluator’s Guide
sponsored by AT&T Cybersecurity
RESOURCE: Managed detection and response (MDR) services equip organizations with scalable security and threat intelligence. However, the new market can be difficult to navigate. This evaluator’s guide is designed to help with the decision-making process by offering 10 key elements for considerations and questions to ask potential service providers.
Posted: 07 Jan 2020 | Published: 07 Jan 2020

AT&T Cybersecurity

The Seven Essentials of a Modern Email Security Platform
sponsored by Ironscales
WHITE PAPER: Businesses of all sizes face the risk of data loss from email phishing campaigns, and existing security solutions can’t keep pace with evolving attack methods. In this playbook, uncover the 7 essentials needed to enable email security, and discover why employees are the top method of threat detection.
Posted: 10 Jan 2020 | Published: 10 Jan 2020

Ironscales

A guide to SIEM platforms, benefits and features
sponsored by SearchSecurity.com
EZINE: SIEM systems enable organizations to centralize indecent response, detection and handling, as well as data logging for compliance. This e-guide is a collection of resources highlighting SIEM benefits, criteria and tools. Read on to evaluate which SIEM system is right for you.
Posted: 09 Jan 2020 | Published: 09 Jan 2020

SearchSecurity.com

SIEM for Beginners
sponsored by AT&T Cybersecurity
RESOURCE: Security information and event management (SIEM) is all about observing your network through a wide lens and acting accordingly to mitigate risks and protect your organization. Read this beginner’s guide to help you understand the basics of SIEM and why it’s a critical step towards protecting your business.
Posted: 02 Jan 2020 | Published: 02 Jan 2020

AT&T Cybersecurity

How to Safeguard Against Cross-Site Scripting (XSS) Attacks
sponsored by Tala Security
WHITE PAPER: Cross-site scripting (XSS) attacks are a rising concern for all industries and will continue to be a favored strategy for cybercriminals. With a proactive and strategic approach, your organization can ensure web application security. Read on to learn more.
Posted: 17 Jan 2020 | Published: 17 Jan 2020

Tala Security

Lattes, Lunch, and VPNs: Securing Remote Workers the Right Way
sponsored by Malwarebytes
WHITE PAPER: In this short story, following the journey of Olivia and Luciana as they face the cybersecurity threats associated with remote workers, VPNs and cloud platforms to establish the necessary technologies and employee enablement to overcome these challenges and reshape their security strategy.
Posted: 23 Jan 2020 | Published: 23 Jan 2020

Malwarebytes

Accelerating Detection and Response with ThreatQ
sponsored by ThreatQuotient
CASE STUDY: In this case study, uncover how a US-based financial services organization partnered with ThreatQuotient to streamline their existing resources and accelerate threat detection and response to act in a matter of hours or days.
Posted: 21 Jan 2020 | Published: 21 Jan 2020

ThreatQuotient

ZeroNorth 2019 End of Year Report
sponsored by ZeroNorth
WHITE PAPER: 2019 has been a formative year in cybersecurity – growing security risks and compliance regulations put pressure on organizations to rethink their current strategy. This annual report highlights key statistics to show where the security landscape is trending to help you position yourself for success in 2020.
Posted: 14 Jan 2020 | Published: 14 Jan 2020

ZeroNorth

Mobile Phishing Killchain
sponsored by Lookout Inc.
RESOURCE: To an attacker looking to execute a phishing attack, mobile devices are an easy target. Continue to this infographic, which follows the lifecycle of a mobile phishing attack from inception to data breach and discover the security measures that could’ve been taken.
Posted: 09 Jan 2020 | Published: 09 Jan 2020

Lookout Inc.

Next-Generation Data Classification
sponsored by BigID
WHITE PAPER: Traditional approaches to data classification relied on manual entries, which fail to meet the scalability needs of today’s ever-expanding environments. In this white paper, discover BigID’s next-generation data classification approach, which builds on the success of its predecessors with sustainability and privacy at its core.
Posted: 06 Jan 2020 | Published: 06 Jan 2020

BigID
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info