By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Threat management and prevention News
April 21, 2017
EiQ Networks and Bay Dynamics are the latest in the growing list of cybersecurity vendors expanding their relationships with channel partner companies.
April 14, 2017
Security researchers discovered a new reflection attack method using CLDAP that can be used to generate destructive but efficient DDoS campaigns.
March 28, 2017
Throughout the MSPWorld 2017 conference, speakers looked to drive home the message that MSPs must focus on security issues and protect customer data.
February 22, 2017
One expert warned there can be a disconnect between what security remediation means to CISOs and what researchers announce because of divergent objectives.
Threat management and prevention Get Started
Bring yourself up to speed with our introductory content
Client education, advanced endpoint protection and image-based backups are some of the steps channel partners can encourage customers to take to thwart ransomware. Continue Reading
Expert Ed Tittel describes how threat intelligence platforms work to help in the proactive defense of enterprise networks. Continue Reading
As ransomware attacks continue to escalate, should organizations make employees an integral part of their ransomware detection and prevention strategy? Continue Reading
Evaluate Threat management and prevention Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
User behavior analytics can be used for a number of different objectives within an enterprise. Expert Ajay Kumar examines some of the most important features and capabilities. Continue Reading
Expert Ed Tittel examines the top threat intelligence services to understand how they differ from one another and address various enterprise security needs. Continue Reading
Expert Fernando Gont explains how Internet Control Message Protocol version 6 can be used by threat actors to stage a simple, yet effective, denial-of-service attack. Continue Reading
Manage Threat management and prevention
Learn to apply best practices and optimize your operations.
Could using dedicated security teams that focus on one area of risk help reduce the attack surface for enterprises? Expert Steven Weil looks at the pros and cons of that approach. Continue Reading
Concerned about DevOps security? Learn three key steps to embedding security into the software development process, including how to improve automation. Continue Reading
As companies struggle to protect constantly expanding attack surfaces, virtual containers could quickly become essential to companies' endpoint security strategy. Continue Reading
Problem Solve Threat management and prevention Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
The scriptless Linux exploit deviates from usual methods that security tools recognize as attacks. Expert Nick Lewis explains how the exploit works and how to prevent it. Continue Reading
IPv6 atomic fragments can be dangerous for enterprises. Expert Fernando Gont explains their relation to a new denial-of-service attack vector and how to mitigate the threat. Continue Reading
Reporting ransomware attacks to law enforcement can pose potential risks to the targeted organization. Expert Mike O. Villegas discusses the key aspects of disclosing an attack. Continue Reading