TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

Understanding and Preventing Social Engineering Attacks

by SlashNextFeb 20, 2019

While cyber attackers continually develop more sophisticated methods for penetrating enterprise computing systems, most exploits begin with a simple step: fooling users into breaking security policy. These "social engineering" attacks ? including phishing, "watering holes", and social network attacks ? are designed to trick your users into giving up passwords, opening malicious email attachments, or installing malware. How can enterprises prevent this sort of attack? Can users be trained


2018 Security Report

by Check Point Software Technologies Ltd.Feb 19, 2019

From the resurgence of destructive ransomware, IoT botnets, data breaches and mobile malware to sophisticated multi-vector technologies, it is clear we are witnessing an inflection point and a transition to the fifth generation of cyber attacks. Arm yourself with all the facts.

  • Check Point Software Technologies Ltd.
  • Security Monitoring
  • Security Management & Analytics
  • Details

Cyber Attack Trends Report

by Check Point Software Technologies Ltd.Feb 19, 2019

Ransomware, last year's breakout attack method, now plays second fiddle to cryptomining malware. Discover which threats are on the uptick and which are declining in this report from Check Point's team of security experts.

  • Check Point Software Technologies Ltd.
  • Security Monitoring
  • Cybersecurity
  • Details

Cyber Security Guide for Executives

by Check Point Software Technologies Ltd.Feb 19, 2019

A guide for c-level executives to better understand the considerations around cybersecurity, how cyberattacks are evolving, and what to be aware of to lead a secure organization. Learn about the latest trends and how cybersecurity is changing from the perspectives of the attackers and the technologies.

  • Check Point Software Technologies Ltd.
  • Cybersecurity
  • Security Monitoring
  • Details

Prevent Data Breaches in 8 Steps

by Check Point Software Technologies Ltd.Feb 19, 2019

Cyber criminals continue to unleash data breach attacks on organizations around the globe. In 2017, the average cost of a breach for a U.S. company was an estimated US$8 million. Such attacks are becoming more targeted, evasive, and lucrative. It's no long a matter of if, but when your organization will suffer a data breach. The good news is that the eight steps outlined in this paper can go far to prevent a targeted data breach.

  • Check Point Software Technologies Ltd.
  • Cybersecurity
  • Security Monitoring
  • Details

Gartner Magic Quadrant for ENFW

by Check Point Software Technologies Ltd.Feb 19, 2019

Completeness of vision and ability to execute are just two reasons why Gartner named Check Point a Leader in the 2018 Magic Quadrant for Enterprise Network Firewalls. Get the details in this new report.

  • Check Point Software Technologies Ltd.
  • Security Management & Analytics
  • Security Monitoring
  • Details

Practical Cyber Defense for Industrial Control Systems

by Nozomi NetworksFeb 14, 2019

Industrial control systems (ICS) environments are being targeted by more sophisticated threats every day; but the security professionals who defend ICS environments face significant limitations. Patching practices and scanning tools that are common in most IT environments are often unacceptable for ICS, which may operate critical infrastructure and require 24/7 uptime. In this Dark Reading webinar, top experts offers insight on the threat posed to ICS systems, and how you can expand your

  • Cybersecurity
  • Security
  • Internet of Things
  • Details

10 Career Moves You Can Make in 2019

by InformationWeekFeb 14, 2019

If you work in IT, chances are pretty good that you are perfectly happy with your current job. But that doesn't mean you should put your career on autopilot. Here are 10 career moves you should consider making in 2019, whether you plan to pursue a new position now or if you simply want to have relevant skills to offer current and future employers.

Image: Pixabay

  • InformationWeek
  • Professional Development and Salary Data
  • Team Building & Staffing
  • Details

Why an Integrated Contact Center is Critical for Customer Experience

by Five9, Inc.Feb 13, 2019

Talk about improving your customer experience is meaningless if you don?t have appropriately integrated systems and applications to deliver that experience. Your agents need Contact Center, CRM, WFO, and UC/collaboration integrated in order to deliver world-class customer service. In this webinar, Sheila McGee Smith and Five9 will help you identify which integrated systems have the most impact on agent performance, and how to make sure your solution is as efficient and effective as possible to

  • Contact Centers
  • CRM
  • Unified Communications
  • Collaboration
  • Details

Security and Privacy vs. Innovation: The Great Balancing Act

by InformationWeekFeb 13, 2019

Emerging technologies like the Internet of Things, artificial intelligence, machine learning, and advanced mobile applications can help a company reap the benefits of better customer relations, operational efficiencies, and increased revenues. However, each of those technologies present security risks to corporate and customer data. They may clash with the demands of best security practices and government and industry regulations.

This InformationWeek IT Trend Report will help you

  • InformationWeek
  • IT Strategy
  • Security
  • Security Management & Analytics
  • Risk Management/Security
  • Strategic CIO
  • Executive Insights & Innovation
  • Details