Security Industry Research
-
Your Guide to Threat Intelligence, AI & Incident Response
Sponsored by: Dell SecureWorksOrganizations must now go beyond automating reactive measures. Cybersecurity now requires infosec professionals to work toward proactive detection to preemptively avoid or thwart threats. In this e-guide, find everything you need to know about threat intelligence platforms, AI in cybersecurity, and incident response planning.
-
Biometrics in the enterprise: An opportunity or an ethical minefield?
Sponsored by: TechTarget ComputerWeekly.comIs biometric technology ready for use in the enterprise to help improve IT security? IT leaders need to be aware of the concerns. In this e-guide we take a look at some of the potential – as well as the risks.
-
Create an Effective Email Phishing Test in 7 Steps
Sponsored by: Cisco UmbrellaIn this expert guide, find out how you can create an effective email phishing test in 7 steps to see how vulnerable your organization really is.
-
Cybersecurity: The Latest Battleground for MSPs
Sponsored by: SkOUTOur experts share their knowledge of the managed security services market in the following guide, so read on to learn how your organization can capitalize on the opportunities therein.
-
Expert Guide to DNS, SME Security, and Zero-Day Attacks
Sponsored by: Avast SoftwareGet up to speed fast on means and methods for reducing or eliminating security-related issues in DNS, an integral service upon which the internet depends.
-
Cloud Networking: What Every IT Pro Needs To Know
Sponsored by: TechTarget NetworkingSpeed or security? Cloud networking often requires balancing the two. Read this handbook to learn how you can have both speed and security.
-
Healthcare Security: How You Can Ward Off Insider Threats
Sponsored by: Cisco UmbrellaOne of the greatest healthcare security threats comes from users within an organization. In this expert handbook, John Nye shares recommendations for technologies that healthcare organizations can use to fight against insider security threats.
-
6 Ways to Prevent Ransomware in Health IT
Sponsored by: Cisco UmbrellaWith so much at risk for healthcare organizations, IT must implement proactive steps to help mitigate their risks and keep attacks at bay. In this e-guide, you'll uncover the ins and outs of 6 ransomware prevention tips healthcare organizations should include as part of their ongoing security strategy.
-
Cloud Security Pros Finding their Voice
Sponsored by: CavirinFind out how the DevSecOps and the NIST Cybersecurity Framework both put the long-lost co-worker, the security pro, front and center.
-
Information Security: Companies Aren't the Only Ones Migrating to Cloud
Sponsored by: TechTarget SecurityHackers are embracing all advantages of the cloud, launching lucrative attacks like malicious cryptomining, DDoS, and ransomware. In this issue of Information Security magazine, editor Kathleen Richards looks at cloud security in 2018 and reveals strategies to protect sensitive data from new internal and external threats.
-
Exploring Two New Ways of Getting Insight into the Cybersecurity Landscape
Sponsored by: Juniper Networks, Inc.This e-guide sheds some light on 2 technologies changing the insight we have on our IT security infrastructures. First, explore how to evaluate the machine learning offerings in the cybersecurity market. Then find out what boons shared cloud security assessments can have on your organization.
-
SIEM Analyst Research Bundle
Sponsored by: AT&T CybersecurityNo matter the company size, a properly executed SIEM strategy is difficult to achieve as resources become constrained. Explore this white paper to uncover the key factors leading to a successful SIEM purchase and deployment for your organization.
-
What does a CISO do now? It's a changing, increasingly vital role
Sponsored by: TechTarget SecurityWhat does a CISO do now, with risks proliferating and the most-needed security skills in short supply? Learn why the CISO role is more vital than ever.
-
SIEM Analysis for Security Professionals
Sponsored by: LogRhythm, Inc.This expert e-guide explores why it's important that SIEM systems have an analysis interface for security professionals, as well as how advanced security analytics can safeguard your enterprise.
-
GDPR Breach Notification Rule Could Complicate Compliance
Sponsored by: Lepide SoftwareFind out what GDPR compliance will entail, and what you can do to avoid the massive fine for failure to comply. Then, explore how the regulation's "breach notification rule" will prompt not just European companies, but those based in the US as well, to more promptly report a data breach.
-
IT Security Trends to Know
Sponsored by: Cisco UmbrellaThe 2017 TechTarget IT Priorities Survey reports a number of key IT security trends about where enterprises and infosec professionals place their time and resources. In this expert e-guide, get the results from this survey and see how 971 IT pros plan to focus their cybersecurity efforts.
-
4 Tech Disruptors that Could Radically Change Security Operations
Sponsored by: TechTarget SecurityMany information security programs are not on track to handle the internet of things and other technology disruptors. We help you dust off your crystal ball and get prepared for the near future.
-
A Look at the Shared Responsibility Model for Cloud Providers
Sponsored by: SolarWinds, Inc.Click inside this expert guide by Dave Shackleford, founder of Voodoo Security, to learn how the shared responsibility business model is currently understood and used by MSPs, as well as one of its major blind-spots.
-
Six Criteria for Buying Data Loss Prevention Products
Sponsored by: InteliSecureDiscover 6 steps your organization can take when thinking about what data loss prevention means to your security posture and what to look for to shore up your own defenses.
-
Introduction to Data Loss Prevention Tools
Sponsored by: InteliSecureIn this e-guide discover what it means for security for data to be in use, in motion, and at rest; how DLP works in a standalone vs. integrated context; the DLP learning curve; and more.
-
How IoT is Changing The Security Landscape
Sponsored by: Fortinet, Inc.In this expert-guide, learn more about the possible dangers of IoT, as well as some ideas on how you can redesign your security network to better combat hackers that would take advantage of this young technology.
-
The Security Risks of IoT
Sponsored by: Fortinet, Inc.In this expert guide, learn the 3 questions every security administrator should be asking themselves in preparation of the IoT boom. Then, read on to discover what's contributing to this massive growth in devices, and how you can take steps to reduce the risk they pose.
-
SSL: Get the Best for You and Mitigate Vulnerabilities
Sponsored by: A10 NetworksInside this e-guide industry experts uncover how security professionals can overcome SSL security issues. Access now to discover how to approach SSL security, tactics to choose the best SSL for your business, 7 steps to overcome SSL vulnerabilities and more.
-
Your IIoT Security Plan: Risks in Manufacturing
Sponsored by: Bayshore NetworksIn this e-guide learn how to get smart about industrial IoT security risks in manufacturing, as well as how to map out an industrial IoT plan to create a smooth-running, smart factory.
-
Doxware: New Ransomware Threat, or Just Extortionware Rebranded?
Sponsored by: Fortinet, Inc.Ransomware is on the rise, and businesses are starting to understand how they can combat it, but new threats appear every day. Inside this guide, learn whether or not doxware is a worrying new ransomware trend or a rebranding of extortionware.