IT Management  >   Systems Operations  >   Security  >   Network Security  >  

mSecurity

RSS Feed   
mSecurity Reports
 
Protecting Business and Remote Workers from COVID-19 Email Threats
sponsored by Barracuda
VIDEO: The recent shift to working remotely as a result of the spread of COVID-19 has made organizations more vulnerable to email-based cyberattacks. This webinar breaks down the various methods being used by hackers and offers best practices for protecting your business and workers.
Posted: 21 Apr 2020 | Premiered: 21 Apr 2020

Barracuda

Covid-19 & the New Normal for E-commerce
sponsored by Tala Security
WHITE PAPER: While online shopping has increased dramatically since the beginning of the pandemic, so too have threats targeting shoppers and other users. In fact, Magecart attacks have increased by 20%. Read on to explore how COVID-19 is shifting the e-commerce landscape and discover the long-term implications of these changes.
Posted: 20 Aug 2020 | Published: 20 Aug 2020

Tala Security

The Essential Guide to Secure Web Gateways
sponsored by AT&T Cybersecurity
RESOURCE: Organizations are continuing to incorporate cloud technologies and employ remote workers, but traditional security systems are struggling to protect these expanding networks. Although not a 1:1 replacement for firewalls, Secure Web Gateways (SWGs) may be able to help fill the gaps. Download this white paper to explore the nuances of SWGs.
Posted: 21 Feb 2020 | Published: 13 Jan 2020

AT&T Cybersecurity

WLAN Access Control and Wi-Fi Network Needs
sponsored by SearchSecurity.com
EGUIDE: This white paper discusses the nature of high-density WLAN environments, their relationship to enterprise Wi-Fi, and the benefits of 802.1X authentication. Read on to learn more.
Posted: 10 May 2013 | Published: 01 Apr 2013

SearchSecurity.com

WLAN Planning For BYOD
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchNetworking.com explores the impact BYOD is having on the WLAN and what you need to do to provide a quality experience to your mobile users without compromising security or control.
Posted: 08 Feb 2013 | Published: 08 Feb 2013

SearchSecurity.com

Network Protection and UTM Buyer's Guide
sponsored by Sophos
WHITE PAPER: This white paper explores how this UTM solution can provide the highest standards of network security within the cloud, while integrating multiple security capabilities on a single platform.
Posted: 03 Jul 2014 | Published: 31 Dec 2013

Sophos

Information Security Magazine: August Issue
sponsored by SearchSecurity.com
EZINE: Identity and access management is so complex that many companies have faltered when it comes to securing third-party vendors. With breaches on the rise, vulnerabilities can be costly.
Posted: 03 Aug 2015 | Published: 03 Aug 2015

SearchSecurity.com

IM Wireless Network Assessment
sponsored by Ingram Micro
ASSESSMENT TOOL: The need to protect your data and organization is now even more critical than before. Take a look at this brief white paper to learn how one company can help you secure your business.
Posted: 09 Dec 2013 | Published: 09 Dec 2013

Ingram Micro

Protecting Data on the Go
sponsored by SearchSecurity.com
EBOOK: This guide informs InfoSec pros on the risks to business data carried on or accessed by employees' mobile devices and the best available protections for this business data on the go.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

SearchSecurity.com

Symantec Website Security Threat Report
sponsored by Symantec Corporation
WHITE PAPER: This document is a reference to understanding the threat landscape and how you can protect your company and your infrastructure.
Posted: 09 Sep 2013 | Published: 09 Sep 2013

Symantec Corporation
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info