IT Management  >   Systems Operations  >   Security  >  

Zero Day Threats

RSS Feed   
Zero Day Threats Reports
 
How to Capitalize on the Multi-billion Dollar Market for Managed Security Services
sponsored by IBM
WEBCAST: Tune into this webcast to discover the advantages of partnering with IBM Security to capitalize on the managed security services market opportunities and multi-billion dollar revenue therein.
Posted: 13 Jun 2019 | Premiered: Jun 13, 2019

IBM

Avoid the Breach With Effective Application Security Testing
sponsored by HackerOne
WEBCAST: Security is a top priority for e-commerce giant Shopify. Join Shopify's Vice President of Security Engineering and IT, Andrew Dunbar in this webcast as he discusses best practices for testing and securing your cloud-based web applications. The session will also cover how you can scale application security for high-growth DevOps organizations.
Posted: 04 Jun 2019 | Premiered: Jun 4, 2019

HackerOne

Containing Security Incident Response Costs
sponsored by enSilo
WHITE PAPER: Of the many challenges security leaders face, one big issue that can often be downplayed is budgeting. While the cost of a breach is well documented, the costs of managing a security team, that can prevent attacks, are not. In this white paper, learn how enSilo can help solve the problem of uncontained and unexpected incident response costs.
Posted: 23 May 2019 | Published: 05 Mar 2018


Digital Transformation Executive Report
sponsored by Dell SecureWorks
WHITE PAPER: Businesses are more dependent on technology than ever before. While digital transformation brings about opportunity, it also introduces large amounts of risk. In this white paper, learn how organizations can create a decentralized security partnership approach between security, IT and citizen developers.
Posted: 23 May 2019 | Published: 23 May 2019

Dell SecureWorks

How to Simplify Security and Shrink the Attack Surface
sponsored by VMware and Intel
WHITE PAPER: Modern applications are dynamic and distributed – and the attack surface keeps growing as a result. To secure your business, you need security integrated into your infrastructure, not bolted-on. Download the eBook to learn how to reduce the attack surface and simplify security.
Posted: 23 May 2019 | Published: 31 Aug 2018

VMware and Intel

Open Source Network Security Tools for Beginners
sponsored by AT&T Cybersecurity
RESOURCE: In this white paper, get an overview of some of the leading open source tools as well as tips on how to use them for network security.
Posted: 10 May 2019 | Published: 10 May 2019

AT&T Cybersecurity

5 Best Practices for Managing your Network Security in the Age of Digital Transformation
sponsored by Verizon
RESOURCE: Digital transformation is impacting every industry and it's making network security more important than ever. In this blog, explore 5 things you should consider for your security strategy as you embrace digital transformation, so you can navigate the minefield of evolving threats.
Posted: 29 May 2019 | Published: 24 Oct 2018

Verizon

Why 56% of Large Businesses are Turning to SDN for Cybersecurity
sponsored by Verizon
RESOURCE: Cybersecurity is a critically important issue for companies. In this resource, learn how software-defined networking (SDN) can enable organizations to virtualize and automate their network operations which, offers businesses a valuable new means to enhance their security.
Posted: 22 May 2019 | Published: 10 Jul 2018

Verizon

Endpoint Protection Buyers Guide
sponsored by CrowdStrike
WHITE PAPER: Endpoint security is one of the most critical components of a cybersecurity strategy. Unfortunately, for those responsible for protecting their organizations' endpoints, it has never been more challenging to select the best solution for the job. In this white paper, discover an evaluation of endpoint protection platforms based on 5 key elements.
Posted: 04 Jun 2019 | Published: 04 Jun 2019

CrowdStrike

The Basics of Auditing and Securing Your Network Perimeter with SIEM
sponsored by ManageEngine
WHITE PAPER: To thwart network attacks, you first need to be on top of critical security events occurring in your network. But due to the high volume of events, auditing these events in real time can be challenging, if not impossible. In this white paper, learn about the basics of auditing and securing your network perimeter by leveraging SIEM.
Posted: 10 May 2019 | Published: 10 May 2019

ManageEngine
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement