- Adobe1
- Akeneo1
- Alcatel-Lucent Enterprise9
- Amazon Business5
- Auth06
- AWS8
- CloudFlare6
- Commvault2
- Commvault-Infoniqa2
- Confluent7
- Diligent16
- Easyvista2
- Elastic7
- Esker6
- Fastly2
- Forcepoint2
- Forrester2
- Fortinet15
- Genesys18
- Genesys and Frontline Solutions3
- Genesys and TechneValue3
- Hornetsecurity5
- infoblox1
- Informatica2
- Izertis1
- Juniper1
- Kaspersky2
- Knowmad Mood3
- Kofax1
- LastPass4
- Lookout26
- Mobica4
- NFON2
- NTT DATA1
- Nutanix10
- Okta13
- OneTrust2
- OpenText3
- Outpost244
- Performance One1
- PrestaShop Checkout2
- Qlik1
- Quantum2
- Quest2
- Recorded Future3
- Red Hat9
- Rubrik2
- Salesforce21
- SAP1
- ServiceNow9
- SoftwareOne4
- Specops Software1
- Sprinklr4
- Stormshield6
- Talkdesk8
- Tenable4
- Thales3
- Tungsten Automation1
- Veeam27
- Verint2
- WALLIX5
- WALLIX & Reti S.p.A.1
- Weber2
- Wind River10
- Zoom31
- Zscaler12
Mitigazione proattiva dei ransomware
Scopri la guida Proactive Ransomware Mitigation di Recorded Future, una risorsa essenziale per aiutare le organizzazioni a proteggersi in modo efficace dagli attacchi ransomware. Questo documento offre strategie e best practice per anticipare, rilevare e rispondere alle minacce. Punti chiave trattati: Comprendere il funzionamento del ransomware Identificare le vulnerabilità sfruttate dagli attaccanti Applicare una strategia
Guida all’acquisto della threat intelligence
Scopri la Guida all’Acquisto dell’Intelligence sulle Minacce di Recorded Future, un documento progettato per aiutare le organizzazioni a selezionare la migliore soluzione di intelligence sulle minacce in base alle loro esigenze specifiche. La guida fornisce criteri e raccomandazioni chiave per ottimizzare la strategia di cybersecurity. Punti chiave trattati: Definizione e importanza dell’intelligence sulle minacce Criteri
6 informazioni chiave dal rapporto sullo stato dell’intelligence delle minacce per il 2024
Scopri l’infografica di Recorded Future, che riassume le principali conclusioni di un sondaggio condotto su oltre 550 dirigenti, manager e professionisti della cybersecurity. Il documento offre una panoramica delle tendenze attuali e delle prospettive future dell’intelligence sulle minacce. Punti chiave trattati: Uso strategico dell’intelligence sulle minacce Aumento degli investimenti Maturità dei programmi Giustificazione degli investimenti
The Economics of Penetration Testing for Web Application Security
Web Application Security is a big challenge for developers und cybersecurity experts confronted with the fast pace of DevOps code changes. Penetration tests are among the many tools used for security, which is an authorized simulated cyberattack from a hacker’s perspective. “Pen tests” provide a deep dive look into a web app’s state of security,
Keeping your External Attack Surface Under Control
You can’t stop the expansion of your external attack surface, but you can identify unknown assets and their vulnerabilities to mitigate the security risk. External attack surfaces expand due to modern software development practices, mergers and acquisitions, the adoption of multi-cloud strategies and much more. Many organizations find it difficult to monitor these changes and
[New research] Outpost24 Report Benchmarks Benelux Region’s Attack Surface Security
Download the comprehensive report benchmarking the cybersecurity posture of five key industries in the Benelux region Discover how your organization’s cyber security posture compares across the Benelux region with our latest research in this free PDF whitepaper. Our comprehensive report, utilizing advanced External Attack Surface Management (EASM) data from Outpost24, benchmarks the security landscapes of
The state of observability in 2024: A view from the trenches
Curious about what’s happening in the trenches for SRE and observability teams today? Join the observability experts at Elastic for an honest look at what’s happening in the field — what’s working, what’s not, and how we’re pushing observability forward. We’ll share key details from our 2024 State of Observability report where we surveyed over
Leveraging AI-driven observability to deliver better applications
In this ebook, get an overview of modern observability and learn how today’s distributed applications require platforms enhanced with AI and machine learning. Understand the value of the three pillars of observability along with an emerging fourth signal, profiling. See how unifying and standardizing your operational and telemetry data will provide a foundation for improving
An introduction to APM: The what, why, and how
APM plays a key role in modern observability, acting as a guide to understanding all of your observability data by providing context and improving root cause analysis. Get a jump-start on APM with this ebook covering all the basics and much more. From the impact of APM on IT operations, to how it works and
Smarter observability with AIOps, generative AI, and machine learning
The impact of cloud-native technologies has created challenges around managing the volume, complexity, and pace of change in applications for SREs and operations teams. The emergence of AIOps to help deal with this complexity is a real solution to these real challenges. Take a tour through the world of AIOps for observability in this playbook!