Hvidbogsarkiv

Seneste emner:

What Legacy Endpoint Security Really Costs

To be competitive, businesses are moving forward with digital transformation projects enabled by cloud services. The number of endpoints operating in these dynamically expanding environments is exploding. According to one esti...

Vis hvidbog

2024 State of Application Security Report

Application security is the practice of protecting and securing applications throughout the software development life cycle. As organizations shift their focus to driving revenue through software, application security (AppSec) ...

Vis rapport

Innovative HR Solutions Provider BIPO Strengthens Security Posture and Bolsters Portfolio of World-class Partners

BIPO is a leading HR services provider with an extensive network of offices located in key gateway cities across the Asia-Pacific region. The company offers a wide range of advanced HR-related technologies, services and outsour...

Vis studie

Globe Telecom Reduces Risk and Gains Immediate Visibility with New Threatbased Operational Security Approach

As the leading telecommunications provider in the Philippines, Globe Telecom serves about over 80 million customers — roughly three-quarters of the country’s population. The company’s leadership sought to transform its cybersec...

Vis studie

South Australian Utility Expands CrowdStrike Protections to Bolster Defence and Address Cybersecurity Skills Shortage

SA Power Networks is South Australia’s sole electricity distributor. The electricity provider was an early adopter of the CrowdStrike Falcon® platform for endpoint detection and response (EDR), replacing a legacy Trend Micro an...

Vis studie

Tabcorp Partners with CrowdStrike to Drive Stronger Security from Endpoint to Cloud

Tabcorp is an Australian betting and entertainment experiences business operating across three main brands: TAB, Australia's biggest multichannel wagering brand; Sky Racing and Sky Sports Radio, which broadcast racing and sport...

Vis studie

Stay One Step Ahead of Identity Thieves

SCATTERED SPIDER is likely an eCrime adversary that conducts targeted social-engineering campaigns primarily against firms specializing in customer relationship management and business-process outsourcing, as well as telecommun...

Vis e-bog

Modern Adversaries & Evasion Techniques

If you take away one thing from this eBook, make it this: Legacy antivirus (AV) is no longer capable of stopping adversaries. Modern endpoint security is required to stop breaches — period. Where did legacy AV go wrong? First, ...

Vis e-bog

KuppingerCole Leadership Compass 2023: Access Management

In Today's Threat Landscape, Identity Security Requires a Leader Learn how CyberArk achieved a distinguished leadership position in the 2023 KuppingerCole Leadership Compass for Access Management report and secured top honors ...

Vis rapport

Reinforce Least Privilege by Rethinking Identity Management

Why It's Time to Rethink Your Identity Management Approach Identities of all types - not just IT team members, but any employees - are gaining access to sensitive data, infrastructure and systems that today’s attackers can eas...

Vis hvidbog
Tilmeld dig vores nyhedsbrev
De vigtigste nyheder gratis via e-mail