IT Management  >   Systems Operations  >   Security  >  

Zero Day Threats

RSS Feed   
Zero Day Threats Reports
 
Defeating Threats Through User Data: Applying UEBA to Protect your Environment
sponsored by LogRhythm, Inc.
RESOURCE: Learn how to detect and respond to threats faster by focusing on user activity and behavior.
Posted: 13 Nov 2018 | Published: 13 Nov 2018

LogRhythm, Inc.

CloudSOC and Email Security.cloud for Microsoft Office 365
sponsored by Symantec
RESOURCE: With email as the #1 attack vector, learn how you can keep your Office 365 safe from end-to-end and how you can protect confidential data, today.
Posted: 13 Nov 2018 | Published: 13 Nov 2018

Symantec

Critical Watch Report: The State of Threat Detection 2018
sponsored by Alert Logic
RESEARCH CONTENT: High-profile data breaches continue to make headlines, but the real news is the dramatic increase in volume and the intensity of cyberattacks it now affecting organizations of all sizes and types. Learn how your organization can keep up with the fast-moving threat landscape with 5 key security insights.
Posted: 29 Nov 2018 | Published: 29 Nov 2018

Alert Logic

4 Critical Features of a Cyber-Resilient Architecture
sponsored by Dell EMC and Microsoft
RESOURCE: To protect your servers against cyber-attacks throughout their lifecycle, industry analysts recommend implementing four practices into your hardware security strategy. Keep reading to learn all 4.
Posted: 04 Dec 2018 | Published: 04 Dec 2018

Dell EMC and Microsoft

SOC-as-a-Service versus DIY SOC
sponsored by Arctic Wolf
WHITE PAPER: Security operation centers are very useful in monitoring, detecting and responding to cyberthreats. However, they can be very expensive to build and extremely difficult to manage. Download this Frost and Sullivan report to evaluate the costs and features of SOC-as-a-service and DIY SOC to make an informed decision for your organization.
Posted: 10 Dec 2018 | Published: 31 Dec 2018

Arctic Wolf

Encrypted Traffic: Making What's Vulnerable More Visible
sponsored by F5 Networks
WHITE PAPER: This white paper explores how to update your SSL/TLS strategy for the increasing payload of encrypted attacks. Get tips on how to improve your cryptographic posture so that you can make sure your SSL/TLS strategy is able to decrypt and encrypt traffic while routing it intelligently across security inspection devices.
Posted: 03 Dec 2018 | Published: 03 Dec 2018

F5 Networks

The Security Leader's Guide to Multi-Factor Authentication
sponsored by Ping Identity Corporation
WHITE PAPER: Multi-factor authentication is a more advanced tool than single-factor authentication and 2-factor authentication. But is it right for you? Inside, learn how to choose the right authentication method for your enterprise, and why you should consider a number of factors including cost, ease of use, and compliance.
Posted: 10 Dec 2018 | Published: 31 May 2017

Ping Identity Corporation

Your Organization is Moving to Office 365. Now What?
sponsored by Symantec
RESOURCE: Download this security checklist to guide you through the multiple dimensions of your Office 365 migration.
Posted: 13 Nov 2018 | Published: 13 Nov 2018

Symantec

Identity Architect Ground Rules: Ten IAM Design Principles
sponsored by WSO2, Inc.
WHITE PAPER: Download this white paper for 10 design principles an IAM architect should consider when building an IAM infrastructure from the ground-up.
Posted: 08 Nov 2018 | Published: 31 Dec 2017

WSO2, Inc.

Detecting Account Takeovers and Defending Your Users
sponsored by Signal Sciences
WHITE PAPER: In this white paper, learn about account takeover (ATO) attacks and how to defend your users against them.
Posted: 16 Oct 2018 | Published: 31 Dec 2017

Signal Sciences
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement