16 Results for:zero day

What Is The Next Step For Next-Gen Antivirus?

sponsored by Palo Alto Networks Published: 05 Jan 2021 White Paper

Enterprises need new strategies and more intelligent investments to holistically protect their valuable data from adversaries today and in the future. Get the paper today and protect your organization against ...

View Now

Attack Observations Since the Russian Invasion of Ukraine

sponsored by Nexum Published: 01 Apr 2022 Blog

Due to ongoing geopolitical events, zero-day exploits have become more of a concern for organizations around the globe. Tap into this blog article to learn 10 tips for reducing risk to your organization.

View Now

Top 10 Ways to Automate Your SOC

sponsored by Palo Alto Networks Published: 29 Apr 2023 White Paper

Within your SOC, how much time a day is spent dealing with repetitive tasks? Automating these repetitive, low-skill activities can free up valuable time so you can focus on the critical threats, and proactively ...

View Now

Race Against Time

sponsored by Palo Alto Networks Published: 02 Jun 2023 Webcast

Picture this: A known vulnerability has been discovered in your network, but there is no known exploit code. You are now facing a race against time to remediate this emerging threat before it does considerable ...

View Now

Securing Internet infrastructure in the age of zero-day exploits

sponsored by Superloop Published: 05 Dec 2023 Blog

Why should you work to minimize your organization’s internet infrastructure footprint? Because hackers often search the internet for vulnerable devices to exploit. Along with delving into that issue, this blog maps...

View Now

3 WAYS CONTRAST HELPS SAFEGUARD THE SOFTWARE SUPPLY CHAIN

sponsored by Contrast Security Published: 01 Feb 2022 eBook

The massive cyberattack on SolarWinds in 2020 was a wake-up call for organizations years to come to prioritize application security for all parts of their software supply chain. Download this e-book to learn how ...

View Now

Proactive Security: Software vulnerability management and beyond

sponsored by TechTarget ComputerWeekly.com Published: 17 May 2019 eGuide

In this e-guide we discover why modern security professionals are moving to a more pro-active approach to cyber defence, and how managing vulnerabilities is a key element of that.

View Now

CW ASEAN, November 2018: Blockchain is no 'magic wand' for security

sponsored by TechTarget ComputerWeekly.com Published: 07 Nov 2018 Ezine

Blockchain is all the rage, although the technology is so much more than just about bitcoin and cryptocurrencies. In this issue of CW ASEAN, we examine how blockchain is being applied in cyber security, and whether...

View Now

AI-driven Cyberstorage: Protecting Organizations’ Most Valuable Asset

sponsored by Deep Instinct Published: 17 Nov 2023 eBook

Data is the lifeblood of the modern enterprise. A data breach – whether through ransomware, a zero-day, or other malware attacks – can be catastrophic. Safeguarding these repositories – whether they're in Network ...

View Now

Proactive Cybersecurity: 6 Critical Tasks to Mitigate Risk

sponsored by Google Published: 19 Mar 2024 White Paper

This paper details 6 key cybersecurity tactics to reduce risk. It offers advice on comprehending attack surfaces, fortifying endpoints, limiting external protocols, enforcing robust MFA, boosting monitoring, and ...

View Now