IT Management  >   Systems Operations  >   Security  >  

Zero Day Threats

RSS Feed   
Zero Day Threats Reports
Is There A Revolution in IT Security ...Or Is It Just Wishful Thinking?
sponsored by Kaspersky Lab
WHITE PAPER: In a recent survey of 5,500 companies across 26 countries, 90% admitted to suffering a security incident, and 46% had lost sensitive data due to a threat. Selecting the right security tool that fits your business needs is a critical process. Download this guide to learn how assess security solutions and separate fact from hype.
Posted: 30 Jun 2020 | Published: 30 Jun 2020

Kaspersky Lab

Threat and Vulnerability Management
sponsored by Coalfire
EBOOK: Learn how Coalfire's Strategy+ framework ensures that your security measures and tactics align with your organization's business objectives. Their threat modeling and attack simulation services move your security posture to the next level of protection.
Posted: 26 Jun 2020 | Published: 26 Jun 2020


Osterman Research: Focusing on the Endpoint as a Key Element of Your Security Infrastructure
sponsored by Trend Micro
WHITE PAPER: In the past, endpoints sat behind a network perimeter, but the growth of remote access to corporate resources makes the endpoint the new perimeter. Phishing, ransomware, malware, and web downloads are all potential threats. Delve into this Osterman Research report to get an in-depth look at these threats and how you can protect against them.
Posted: 26 Jun 2020 | Published: 30 Apr 2020

Trend Micro

Web and Mobile Application Security Testing Solution Brief
sponsored by WhiteHat Security
PRODUCT OVERVIEW: According to the NTT 2020 Global Threat Intelligence Report, 55% of all attacks last year were application specific. Named a leader in a recent Gartner Magic Quadrant report, WhiteHat offers an application security testing bundle – designed to automate testing across the entire DevOps lifecycle. Download this solution brief to learn more.
Posted: 30 Jun 2020 | Published: 30 Jun 2020

WhiteHat Security

Cortex XDR Managed Threat Hunting
sponsored by Palo Alto Networks
DATA SHEET: Get peace of mind knowing your organization is safe with a Managed Threat Hunting Service. Read on to learn all about the benefits of Cortex XDR Managed Threat Hunting.
Posted: 26 Jun 2020 | Published: 26 Jun 2020

Palo Alto Networks

Human Layer Security for Dummies
sponsored by Egress Software Technologies Inc
EBOOK: In order to address the growing risks stemming from human error, organizations are incorporating deliberate practices and establishing human layer security programs. To help you get started, Human Layer Security for Dummies outlines the risks, challenges and best practices for you to consider. Download the e-book to get started.
Posted: 29 Jun 2020 | Published: 29 Jun 2020

Egress Software Technologies Inc

Cortex XSOAR
sponsored by Palo Alto Networks
DATA SHEET: Security teams are often overburdened with a growing volume of threats and security alerts that require manual attention. Download this data sheet for an in-depth look at Cortex XSOAR, a security platform designed to streamline security operation center (SOC) efficiency by empowering teams with enhanced automation and collaboration capabilities.
Posted: 29 Jun 2020 | Published: 29 Jun 2020

Palo Alto Networks

Data Security: Best Practices for Remote Workers
sponsored by TITUS
WEBCAST: How do you tackle the issues associated with securing remote workers (such as easily compromised home Wi-Fi networks)? Tune into this webcast to hear experts walk you through best practices for securing your remote workforce and endpoints in today’s distributed enterprises.
Posted: 26 Jun 2020 | Premiered: Jun 26, 2020


CW APAC, July 2020: Trend Watch: Security
sponsored by
EZINE: In this handbook, Computer Weekly looks at what organisations in the Asia-Pacific region are doing to secure their systems, from adopting a DevSecOps approach, to preparing for cyber attacks and ensuring the privacy of Covid-19 contact-tracing app users.
Posted: 09 Jul 2020 | Published: 09 Jul 2020

BlackBerry Secures 96% of the Enterprise IoT Threat Landscape
sponsored by BlackBerry
ANALYST REPORT: Frost & Sullivan has published an assessment of the cyberthreat landscape and the proportion that BlackBerry’s suite of technologies can protect against. Read on to uncover the results.
Posted: 08 Jul 2020 | Published: 08 Jul 2020


About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.


All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info