Your Guide to Threat Intelligence, AI & Incident Response
sponsored by Dell SecureWorks
EGUIDE:
Organizations must now go beyond automating reactive measures. Cybersecurity now requires infosec professionals to work toward proactive detection to preemptively avoid or thwart threats. In this e-guide, find everything you need to know about threat intelligence platforms, AI in cybersecurity, and incident response planning.
Posted: 27 Mar 2020 | Published: 27 Mar 2020
|
|
|
Biometrics in the enterprise: An opportunity or an ethical minefield?
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Is biometric technology ready for use in the enterprise to help improve IT security? IT leaders need to be aware of the concerns. In this e-guide we take a look at some of the potential – as well as the risks.
Posted: 17 Jan 2020 | Published: 17 Jan 2020
|
|
|
Create an Effective Email Phishing Test in 7 Steps
sponsored by Cisco Umbrella
EGUIDE:
In this expert guide, find out how you can create an effective email phishing test in 7 steps to see how vulnerable your organization really is.
Posted: 03 Sep 2019 | Published: 03 Sep 2019
|
|
|
Cybersecurity: The Latest Battleground for MSPs
sponsored by SkOUT
EGUIDE:
Our experts share their knowledge of the managed security services market in the following guide, so read on to learn how your organization can capitalize on the opportunities therein.
Posted: 03 Jul 2019 | Published: 01 Jul 2019
|
|
|
Expert Guide to DNS, SME Security, and Zero-Day Attacks
sponsored by Avast Software
EGUIDE:
Get up to speed fast on means and methods for reducing or eliminating security-related issues in DNS, an integral service upon which the internet depends.
Posted: 11 Apr 2019 | Published: 03 Apr 2019
|
|
|
Cloud Networking: What Every IT Pro Needs To Know
sponsored by TechTarget Networking
EBOOK:
Speed or security? Cloud networking often requires balancing the two. Read this handbook to learn how you can have both speed and security.
Posted: 10 Sep 2018 | Published: 14 Sep 2018
|
|
|
Healthcare Security: How You Can Ward Off Insider Threats
sponsored by Cisco Umbrella
EGUIDE:
One of the greatest healthcare security threats comes from users within an organization. In this expert handbook, John Nye shares recommendations for technologies that healthcare organizations can use to fight against insider security threats.
Posted: 05 Sep 2018 | Published: 04 Sep 2018
|
|
|
6 Ways to Prevent Ransomware in Health IT
sponsored by Cisco Umbrella
EGUIDE:
With so much at risk for healthcare organizations, IT must implement proactive steps to help mitigate their risks and keep attacks at bay. In this e-guide, you'll uncover the ins and outs of 6 ransomware prevention tips healthcare organizations should include as part of their ongoing security strategy.
Posted: 12 Jul 2018 | Published: 12 Jul 2018
|
|
|
Cloud Security Pros Finding their Voice
sponsored by Cavirin
EGUIDE:
Find out how the DevSecOps and the NIST Cybersecurity Framework both put the long-lost co-worker, the security pro, front and center.
Posted: 21 Jun 2018 | Published: 11 Jun 2018
|
|
|
Information Security: Companies Aren't the Only Ones Migrating to Cloud
sponsored by TechTarget Security
EZINE:
Hackers are embracing all advantages of the cloud, launching lucrative attacks like malicious cryptomining, DDoS, and ransomware. In this issue of Information Security magazine, editor Kathleen Richards looks at cloud security in 2018 and reveals strategies to protect sensitive data from new internal and external threats.
Posted: 03 Apr 2018 | Published: 03 Apr 2018
|
|
|
Exploring Two New Ways of Getting Insight into the Cybersecurity Landscape
sponsored by Juniper Networks, Inc.
EGUIDE:
This e-guide sheds some light on 2 technologies changing the insight we have on our IT security infrastructures. First, explore how to evaluate the machine learning offerings in the cybersecurity market. Then find out what boons shared cloud security assessments can have on your organization.
Posted: 01 Dec 2017 | Published: 28 Nov 2017
|
|
|
SIEM Analyst Research Bundle
sponsored by AT&T Cybersecurity
WHITE PAPER:
No matter the company size, a properly executed SIEM strategy is difficult to achieve as resources become constrained. Explore this white paper to uncover the key factors leading to a successful SIEM purchase and deployment for your organization.
Posted: 19 Oct 2017 | Published: 19 Oct 2017
|
|
|
What does a CISO do now? It's a changing, increasingly vital role
sponsored by TechTarget Security
EBOOK:
What does a CISO do now, with risks proliferating and the most-needed security skills in short supply? Learn why the CISO role is more vital than ever.
Posted: 11 Oct 2017 | Published: 11 Oct 2017
|
|
|
SIEM Analysis for Security Professionals
sponsored by LogRhythm, Inc.
EDITORIAL RESOURCE GUIDE:
This expert e-guide explores why it's important that SIEM systems have an analysis interface for security professionals, as well as how advanced security analytics can safeguard your enterprise.
Posted: 20 Sep 2017 | Published: 14 Sep 2017
|
|
|
GDPR Breach Notification Rule Could Complicate Compliance
sponsored by Lepide Software
EGUIDE:
Find out what GDPR compliance will entail, and what you can do to avoid the massive fine for failure to comply. Then, explore how the regulation's "breach notification rule" will prompt not just European companies, but those based in the US as well, to more promptly report a data breach.
Posted: 15 Sep 2017 | Published: 12 Sep 2017
|
|
|
IT Security Trends to Know
sponsored by Cisco Umbrella
EGUIDE:
The 2017 TechTarget IT Priorities Survey reports a number of key IT security trends about where enterprises and infosec professionals place their time and resources. In this expert e-guide, get the results from this survey and see how 971 IT pros plan to focus their cybersecurity efforts.
Posted: 06 Sep 2017 | Published: 29 Aug 2017
|
|
|
4 Tech Disruptors that Could Radically Change Security Operations
sponsored by TechTarget Security
EZINE:
Many information security programs are not on track to handle the internet of things and other technology disruptors. We help you dust off your crystal ball and get prepared for the near future.
Posted: 01 Aug 2017 | Published: 01 Aug 2017
|
|
|
A Look at the Shared Responsibility Model for Cloud Providers
sponsored by SolarWinds, Inc.
EGUIDE:
Click inside this expert guide by Dave Shackleford, founder of Voodoo Security, to learn how the shared responsibility business model is currently understood and used by MSPs, as well as one of its major blind-spots.
Posted: 26 Jul 2017 | Published: 20 Jul 2017
|
|
|
Six Criteria for Buying Data Loss Prevention Products
sponsored by InteliSecure
EGUIDE:
Discover 6 steps your organization can take when thinking about what data loss prevention means to your security posture and what to look for to shore up your own defenses.
Posted: 12 Jun 2017 | Published: 07 Jun 2017
|
|
|
Introduction to Data Loss Prevention Tools
sponsored by InteliSecure
EGUIDE:
In this e-guide discover what it means for security for data to be in use, in motion, and at rest; how DLP works in a standalone vs. integrated context; the DLP learning curve; and more.
Posted: 12 Jun 2017 | Published: 07 Jun 2017
|
|
|
How IoT is Changing The Security Landscape
sponsored by Fortinet, Inc.
EGUIDE:
In this expert-guide, learn more about the possible dangers of IoT, as well as some ideas on how you can redesign your security network to better combat hackers that would take advantage of this young technology.
Posted: 07 Jun 2017 | Published: 01 Jun 2017
|
|
|
The Security Risks of IoT
sponsored by Fortinet, Inc.
EGUIDE:
In this expert guide, learn the 3 questions every security administrator should be asking themselves in preparation of the IoT boom. Then, read on to discover what's contributing to this massive growth in devices, and how you can take steps to reduce the risk they pose.
Posted: 07 Jun 2017 | Published: 31 May 2017
|
|
|
SSL: Get the Best for You and Mitigate Vulnerabilities
sponsored by A10 Networks
EGUIDE:
Inside this e-guide industry experts uncover how security professionals can overcome SSL security issues. Access now to discover how to approach SSL security, tactics to choose the best SSL for your business, 7 steps to overcome SSL vulnerabilities and more.
Posted: 05 Jun 2017 | Published: 30 May 2017
|
|
|
Your IIoT Security Plan: Risks in Manufacturing
sponsored by Bayshore Networks
EGUIDE:
In this e-guide learn how to get smart about industrial IoT security risks in manufacturing, as well as how to map out an industrial IoT plan to create a smooth-running, smart factory.
Posted: 02 Jun 2017 | Published: 26 May 2017
|
|
|
Doxware: New Ransomware Threat, or Just Extortionware Rebranded?
sponsored by Fortinet, Inc.
EGUIDE:
Ransomware is on the rise, and businesses are starting to understand how they can combat it, but new threats appear every day. Inside this guide, learn whether or not doxware is a worrying new ransomware trend or a rebranding of extortionware.
Posted: 31 May 2017 | Published: 26 May 2017
|
|