IT Management  >   Systems Operations  >   Security  >  

Zero Day Threats

RSS Feed   
Zero Day Threats Reports
 
The Hard Truth About Winning Against Cyber Threats
sponsored by Dell SecureWorks
WHITE PAPER: When developing security strategies, today’s organizations make the mistake of being overly reliant on specific tools and technologies rather than focusing on hygiene and culture. This white paper overviews key characteristics of a hygienic security approach, and highlights 5 focus areas for developing a security strategy.
Posted: 30 Mar 2020 | Published: 30 Mar 2020

Dell SecureWorks

Okta + Experian: Validated Sign-Ups: Identity Proofing to Secure Online Registrations
sponsored by Okta
WEBCAST: For organizations that interact with their consumers on digital mediums, identity and trust are critical factors. Fraudsters can disrupt the user experience, causing long-term harm to a brand’s reputation. This webinar focuses on the emerging best practices in identity proofing – validating users to delineate fraudsters from users.
Posted: 27 Mar 2020 | Premiered: Jul 31, 2018

Okta

Trustwave Managed Detection Complete
sponsored by Trustwave
DATA SHEET: The Trustwave Managed Detection Complete service can help quickly and effectively make sense of network data by providing the platform, processes and people to monitor, detect and alert on threats 24x7. View this data sheet to learn more.
Posted: 23 Mar 2020 | Published: 23 Mar 2020

Trustwave

COVID-19: Viral in More Ways Than One
sponsored by Dell SecureWorks
WEBCAST: Watch this webcast to learn how threat actors are exploiting fear during the pandemic of COVID-19.
Posted: 30 Mar 2020 | Premiered: Mar 30, 2020

Dell SecureWorks

A Comprehensive Guide to Securing Data with Database Encryption
sponsored by Thales
WHITE PAPER: Today’s IT security teams are faced with an increasing demand for database encryption but managing this growing challenge can be difficult. In this white paper, discover the key approaches for addressing this uptick in encryption demand and familiarize yourself with Thales’ data protection portfolio.
Posted: 23 Mar 2020 | Published: 23 Mar 2020

Thales

Three Cybersecurity Challenges Every Enterprise Needs to Address
sponsored by Trustwave
RESOURCE: As organizations continue to adopt transformative technologies, they must be careful to place equal importance on the security of their network and its data. This infographic highlights the 3 key cybersecurity challenges organizations need to address. Read on to learn more.
Posted: 25 Mar 2020 | Published: 25 Mar 2020

Trustwave

Skylight Powered Security for Splunk
sponsored by Accedian
DATA SHEET: Skylight powered Security for Splunk provides the data and visibility needed to detect real-time suspicious, malicious and anomalous behaviors. Read on to learn more.
Posted: 01 Apr 2020 | Published: 01 Apr 2020

Accedian

CyberArk Alero Security
sponsored by CyberArk Software, Inc
DATA SHEET: Access management enables organizations to provide the same level of security to users, devices and apps whether they are remote or local. This data sheet takes a closer look at the CyberArk Alero architecture, which combines access management tools into one, unified platform. Read on to discover the features and capabilities of Alero.
Posted: 23 Mar 2020 | Published: 23 Mar 2020

CyberArk Software, Inc

How to Up Level your Defenses with Security Analytics
sponsored by Splunk
EBOOK: If you don’t have actionable insights to detect and respond to emerging and current threats, you’re not reaping the rewards of modern SIEM technology. Find out what you (and your SIEM) are missing and how to harden your defenses.
Posted: 23 Mar 2020 | Published: 23 Mar 2020

Splunk

How Privileged Access Management Protects State and Local Agencies
sponsored by Cyber-Ark Software
PRODUCT OVERVIEW: Ensuring the security of personally identifiable information (PII) is a key responsibility for state and local government agencies. In this solution brief, explore the features and capabilities of the Privileged Access Management platform and discover how agencies are leveraging it to enhance their security posture and protect access to PII.
Posted: 02 Apr 2020 | Published: 02 Apr 2020

Cyber-Ark Software
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info