Security Threats Research
-
Buyers Guide: Network Security Management
Sponsored by: Palo Alto NetworksWhen it comes to network security, organizations often repeat processes. In this buyers guide, access 10 features your network security management should include and the benefits of network security management. As an added bonus, quiz yourself to determine if it's time to move to network security management.
-
Guide to Early Application Testing and Understanding Dev and Ops Responsibilities
Sponsored by: IBMExplore the importance of early application security testing. Learn from Owen Garrett, Head of Products for NGINX Inc., while he explains the security risks with containers and developing microservices.
-
How to Think like a Hacker to Stop Application Security Threats
Sponsored by: IBMFind out how applying the hacker mindset when setting application security standards can help uncover flaws that vulnerability scanners might not recognize.
-
How to Increase Security for your Login on Mobile Applications
Sponsored by: IBMIn this expert e-guide, learn techniques to improve security for your mobile login information and messaging applications to help stop unauthorized users from accessing your personal data.
-
IT Security Trends to Know
Sponsored by: Cisco UmbrellaThe 2017 TechTarget IT Priorities Survey reports a number of key IT security trends about where enterprises and infosec professionals place their time and resources. In this expert e-guide, get the results from this survey and see how 971 IT pros plan to focus their cybersecurity efforts.
-
Could the WannaCry Decryptor Work on Other Ransomware Strains?
Sponsored by: Cisco UmbrellaAfter the global outbreak of the WannaCry ransomware, researchers created decryptor tools that could save affected files. In this guide, expert Matthew Pascucci explains how the tools work and if they work on other ransomware strains.
-
Add-ons Secure Office 365 from Advanced Attacks
Sponsored by: OPSWAT incMicrosoft has added new features to secure Office 365 against advanced threats, such as email phishing attempts and malicious attachments. In this expert e-guide, learn more about the new layers of protection.
-
Antimalware Protection and the Fundamentals of Endpoint Security
Sponsored by: OPSWAT incIn this expert e-guide, uncover the key features of endpoint antimalware protection, as well as how to deploy/manage endpoint antimalware tools.
-
How to Bolster Endpoint Security Protection
Sponsored by: SymantecThis expert e-guide examines a Symantec platform that is designed to protect its users with security for both physical and virtual endpoints. Learn how to enhance endpoint security with key features like anti-malware, firewalls, and more.
-
The Risks and Flaws of Open Source Security
Sponsored by: Flexera SoftwareIs open source software too much of a risk for enterprises? Before using open source software, you should consider (and understand) the risks involved. In this expert e-guide, featuring tips from industry pros Mike O. Villegas and Michael Cobb, learn what you need to watch out for when it comes to open source security.
-
Ransomware and Cloud Security: Keys to Stop the Threat
Sponsored by: Cisco UmbrellaHighly complex threats are targeting corporate assets and resources every day. In this e-guide, security expert Kevin Beaver reveals 5 ways to prevent a ransomware infection through network security and assistant editor Kathleen Casey explores 5 ways to fend off cloud security threats.
-
Securing DNS: What to Do, and What to be Aware of
Sponsored by: Cisco UmbrellaIn order to understand how DNS attacks work, it is important to understand DNS security weaknesses. In this e-guide, security pros Peter Wenham and Vladimir Jirasek reveal best practices and recommendations for securing DNS and staying ahead of its vulnerabilities.
-
Why Businesses Need a More Enlightened Approach to Phishing Attacks
Sponsored by: PhishMeDiscover why your enterprise needs to take phishing seriously, 6 tactics these types of attacks utilize, how to teach your employees to recognize phishing, and security measures to take after an employee clicks on a malicious link.
-
Six Criteria for Buying Data Loss Prevention Products
Sponsored by: InteliSecureDiscover 6 steps your organization can take when thinking about what data loss prevention means to your security posture and what to look for to shore up your own defenses.
-
Introduction to Data Loss Prevention Tools
Sponsored by: InteliSecureIn this e-guide discover what it means for security for data to be in use, in motion, and at rest; how DLP works in a standalone vs. integrated context; the DLP learning curve; and more.
-
How the Basics of Network Security Have Evolved
Sponsored by: Fortinet, Inc.In this e-guide, networking expert Andrew Froehlich explores some of the fundamental shifts in network security – drilling down into how modern tools work better together, replacing yesterday's isolated, autonomous components. Learn about 4 cutting-edge security tools that every enterprise network should be evaluating in the coming months.
-
How IoT is Changing The Security Landscape
Sponsored by: Fortinet, Inc.In this expert-guide, learn more about the possible dangers of IoT, as well as some ideas on how you can redesign your security network to better combat hackers that would take advantage of this young technology.
-
The Security Risks of IoT
Sponsored by: Fortinet, Inc.In this expert guide, learn the 3 questions every security administrator should be asking themselves in preparation of the IoT boom. Then, read on to discover what's contributing to this massive growth in devices, and how you can take steps to reduce the risk they pose.
-
Your Guide to Combatting Ransomware's Domination of 2017
Sponsored by: CyberArkLearn how to boost your ransomware security awareness in this expert e-guide. Additionally, discover why ransomware continues to be a major threat and what ransomware prevention tools can help you win the battle.
-
SSL: Get the Best for You and Mitigate Vulnerabilities
Sponsored by: A10 NetworksInside this e-guide industry experts uncover how security professionals can overcome SSL security issues. Access now to discover how to approach SSL security, tactics to choose the best SSL for your business, 7 steps to overcome SSL vulnerabilities and more.
-
Your IIoT Security Plan: Risks in Manufacturing
Sponsored by: Bayshore NetworksIn this e-guide learn how to get smart about industrial IoT security risks in manufacturing, as well as how to map out an industrial IoT plan to create a smooth-running, smart factory.
-
7 Steps to Overcome SSL Security Issues and Vulnerabilities
Sponsored by: Fortinet, Inc.As SSL technology evolves and changes, new vulnerabilities begin to cause problems. Inside this guide, industry expert Rob Shapland explains how security professionals can overcome these SSL security issues with 7 key steps.
-
Doxware: New Ransomware Threat, or Just Extortionware Rebranded?
Sponsored by: Fortinet, Inc.Ransomware is on the rise, and businesses are starting to understand how they can combat it, but new threats appear every day. Inside this guide, learn whether or not doxware is a worrying new ransomware trend or a rebranding of extortionware.
-
How to Resolve a Web Application Security Vulnerability
Sponsored by: Veracode, Inc.Discover the importance of application security testing and Web application firewalls (WAFs) in the delivery of modern web-based application deployments.
-
Application Development Security Requires Forethought
Sponsored by: Veracode, Inc.Learn how RASP, or runtime application self-protection, could be the answer to prevent vulnerabilities from slipping through the web app review process and block new, unforeseen threats.