IT Management  >   Systems Operations  >   Security  >   Network Security  >  

mSecurity

RSS Feed   
mSecurity Reports
 
Fayolle Preempts Cyberattacks and Persistent Threats
sponsored by Malwarebytes
CASE STUDY: In this case study, follow the story of Fayolle, a French engineering and construction company, as they partner with Malwarebytes to address the rise in cyberattacks as a result of a cloud environment transition. Download the study now to uncover Fayolle’s results.
Posted: 13 Feb 2020 | Published: 13 Feb 2020

Malwarebytes

Mimecast Mobile: The Experience Employees Want With the Control You Need
sponsored by Mimecast
DATA SHEET: Access to information from anywhere is critical to increasing employee's productivity. However, without the appropriate security and controls in place, this can increase your risk of a breach. In this data sheet, learn how Mimecast Mobile allows employees to securely access the information they need.
Posted: 21 Jun 2019 | Published: 21 Jun 2019

Mimecast

Best Practices for Protecting Against Phishing, Ransomware and Email Fraud
sponsored by DomainTools
WHITE PAPER: Security teams and the organizations they support live in difficult times: they increasingly are the targets of sophisticated threats. In this white paper, learn about the top concerns of decision makers, the growing success of cyberthreats, security's need to improve and best practices to consider.
Posted: 10 Jan 2019 | Published: 30 Apr 2018

DomainTools

The Cost of a Data Breach in Healthcare
sponsored by Absolute Software Corporation
WHITE PAPER: Today’s healthcare organizations are facing constant threats from hackers attempting to steal PHI. Security teams are tasked with protecting patient data while facilitating an increasingly mobile workforce. In this white paper, take a closer look at the threats within the healthcare industry by reviewing some unfortunate breaches.
Posted: 10 Feb 2020 | Published: 08 Jan 2019

Absolute Software Corporation

Buyer’s Guide Digital Identity Verification
sponsored by Mitek Systems, Inc.
WHITE PAPER: Much of today’s customer interaction is done via digital interactions. As this trend continues to grow, organizations need to ensure that they balance customer experience with security. This buyer’s guide provides an overview of current identity verification tools as well as an evaluation workbook to steer you towards an informed decision.
Posted: 20 Jan 2020 | Published: 31 May 2019


Core - DNS - Employees Like to Use Unsanctioned Apps - and Don’t Plan to Stop
sponsored by Cisco Umbrella
WHITE PAPER: It’s an unfortunate truth that employees are going to download unsanctioned apps. While these apps may boost productivity, they also expose your network to risk. Don’t wait for threats to strike – download this white paper and discover a new approach to network security that means no more playing defense.
Posted: 06 Feb 2020 | Published: 06 Feb 2020

Cisco Umbrella

Mobile Payments Using Host Card Emulation with NFC
sponsored by ComputerWeekly.com
RESEARCH CONTENT: In this article from our Royal Holloway security series, we present a set of risks associated with using smartphones for contactless payment transactions.
Posted: 11 May 2018 | Published: 11 May 2018

ComputerWeekly.com

The 5 Most Dangerous New Attack Techniques: Are They Evolving?
sponsored by RSA Conference
WEBCAST: Each year at RSAC, SANS Institute reveals the most dangerous new attack techniques. On the list for 2019 were smartphone attacks, DNS manipulation, domain fronting, cloud-on-cloud attacks, CPU flaws and more. Watch this RSAC webcast to see the full—and accurate—list, plus the best methods to defeat these attacks.
Posted: 22 Jan 2020 | Premiered: Nov 19, 2019

RSA Conference

Network Protection and UTM Buyer's Guide
sponsored by Sophos
WHITE PAPER: This white paper explores how this UTM solution can provide the highest standards of network security within the cloud, while integrating multiple security capabilities on a single platform.
Posted: 03 Jul 2014 | Published: 31 Dec 2013

Sophos

Mastering the Top Enterprise Mobility Challenges
sponsored by Microsoft
EGUIDE: Mobility is bringing new concerns that didn't exist with desktops. Protecting company data while staying compliant is a new challenge for IT admins. This e-guide explores how to handle the top five issues in today's mobile world.
Posted: 14 Jun 2016 | Published: 08 Jun 2016

Microsoft
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info