Whitepaper | Security | Firewall IDS IPS
BlueCat

In this report, Gartner breaks down the requirements for the shift from NetOps 1.0 to 2.0, the skills required, and how to forge collaboration between your NetOps, SecOps and DevOps.

Read MorePublished: 17/01/2020
Webinar | Security | Firewall IDS IPS
Skybox Security

Many security teams are being tasked with regaining control of security management in the cloud. Often times, this is happening after the team was bypassed during cloud adoption, making it difficult...

Read MorePublished: 17/01/2020
New Product | Security | SIEM
Solarwinds

Improve your security posture and quickly demonstrate compliance with a lightweight, ready-to-use, and affordable security information and event management solution.

Read MorePublished: 16/01/2020
Whitepaper | Security | Web
Imperva

Join Imperva for a fireside chat with Imperva CTO Kunal Anand and CMO David Gee as they share with you the cybersecurity trends and things to watch for in 2020.

Read MorePublished: 14/01/2020
Whitepaper | Security | Web
Imperva

Written by Jon Collins at Gigaom, “DevSecOps: Shifting Security to the Left to Protect the Enterprise” sets out the thinking behind DevSecOps and explains how to protect data and services, assure...

Read MorePublished: 14/01/2020
Whitepaper | Security | Web
Imperva

Bad bots are on every website with a login page. Even yours.

Hackers and fraudsters use bots to validate sets of login credentials, gain access to credit card data, and sell personally...

Read MorePublished: 14/01/2020
Whitepaper | Security | Web
Imperva

Today, bots are a hot topic; one that affects all web applications. As a result, many vendors are trying to latch onto this trend by claiming to have the ability to identify and mitigate bots. It’s...

Read MorePublished: 14/01/2020
Whitepaper | Security | Identity Management
Akamai

The paper concludes with a brief, real-world example of a leading global pharmaceutical company that deployed a secure, best-in-class CIAM solution to empower its healthcare providers amid data...

Read MorePublished: 14/01/2020
Event | Security | Web
Alibaba Cloud

Organizations rely on technology to differentiate their core capabilities, control costs, and drive sustainable growth. Mapping the best technology strategy to desired business objectives is critical...

Read MorePublished: 13/01/2020
Whitepaper | Security | Web
Syncsort

Each year, Syncsort conducts a survey of IT professionals within the IBM i space to understand their top challenges, strategies, technologies, and best practices regarding the security of the platform...

Read MorePublished: 13/01/2020
Event | Security | Web
Microsoft

The cyberthreat landscape is every-expanding today as revealed by the latest Microsoft Security Intelligence Report (SIR) that was published in late March 2018. Just recently, a Frost & Sullivan study...

Read MorePublished: 13/01/2020
Whitepaper | Security | Email
ESET

In this white paper, we present the analysis of LightNeuron, a backdoor specifically designed to target Microsoft Exchange mail servers.

Read MorePublished: 10/01/2020
Whitepaper | Security | EUC Anti-virus
ESET

Machine learning-based technologies increasingly help fight large-scale fraud, evaluate and optimize business processes, improve testing procedures and develop new solutions to existing problems.

Read MorePublished: 10/01/2020
Webinar | Security | EUC Anti-virus
Trend Micro

The well-known phrase, “Those who do not learn history are doomed to repeat it”, is extremely important in cybersecurity. In this webinar, I wanted to look at some of the past predictions to help us...

Read MorePublished: 10/01/2020
Webinar | Security | EUC Anti-virus
Trend Micro

The well-known phrase, “Those who do not learn history are doomed to repeat it”, is extremely important in cybersecurity. In this webinar, I wanted to look at some of the past predictions to help us...

Read MorePublished: 10/01/2020
Whitepaper | Security | EUC Anti-virus
Kaspersky Lab

We’re surrounded by embedded systems, and whether we realize it or not, we use them every day. ATMs and POS systems, information kiosks, medical devices and old computers, all these disparate systems...

Read MorePublished: 10/01/2020
Press Release | Security | Email
Mimecast

Mimecast Limited, a leading email and data security company, today announced the acquisition of Segasec, a provider of digital threat protection. With this innovative technology, Mimecast customers...

Read MorePublished: 09/01/2020
Whitepaper | Security | Web
RSA

Learn how security and risk management leaders can work together to minimize the impact of a cyber attack. CISOs and Risk Leaders, learn how to collaborate and get the support you need to mitigate...

Read MorePublished: 09/01/2020
Whitepaper | Security | Web
Proofpoint

We're spending more than ever on cybersecurity. But attacks are still getting through, jeopardizing the confidential data, assets, and brand reputation of businesses around the globe.

The core...

Read MorePublished: 07/01/2020
Whitepaper | Security | Unified Threat Management
Tenable

Prioritizing which vulnerabilities to fix first is key to reducing your organization’s cyber exposure; however, there are different approaches to determine which vulnerabilities and which assets are...

Read MorePublished: 07/01/2020
Show More..
Top
ITUpdate loading
Loading...