Search Results for: security

Resolve Web Security Issues with Industry Experts' Advice
Learn how to bridge the communication divide between app developers and security pros, as well as foster secure coding practices in your enterprise to mitigate the vulnerabilities in your web applications.

Veracode, Inc.

Security-In-Depth Using Integrated Risk-Conscious Controls
This white paper explores how your organization can change the way it protects its critical data, combining preventive, detective and corrective controls to stop breaches from happening, detect threats as they arise, and correct settings that introduce security risk or non-compliance. Read now to learn more.

Tripwire, Inc.

How to Start Building an Enterprise Application Security Program
In this expert e-guide, get a handle on where to start with application security so that you never give attackers a chance.

tCell

Building an Application Security Program: Why Education is Key
Gain insight into what an application security program might look like as it develops and what experts have to say about what it could mean for the future of application development.

tCell

How to Effectively Manage the Cloud Logs of Security Events
Discover the security growing pains created by the growth of cloud file sharing and collaboration services and how they are presenting new problems including "shadow cloud" and alert fatigue.

Splunk

Build a Cohesive, Effective Security Strategy
Discover how to identify redundancy in your security tools in order to cut costs and increase efficiency. Plus, learn how you can effectively integrate global threat intelligence into your strategy to bolster your security arsenal.

Splunk

Focus: Securing for the future
2016 saw the rapid increase in the use of ransomware and a resurgence of distributed denial of service (DDoS) attacks using hijacked devices making up the internet of things (IoT) against a background of new and newly-reported breaches of personal information involving an ever-increasing number of online user accounts.

TechTarget ComputerWeekly.com

CW ANZ: Fix the weak links
In this edition of CW ANZ, we look at how Australia is securing its industrial control systems and how it is bridging the security gap between IT and OT teams. Read the issue now.

TechTarget ComputerWeekly.com

How do you solve a problem like security training?
In this E-Guide, we will the tricky topic of security awareness training. Firstly, we try to answer the burning question of how to get employees to pay attention to training and take it seriously. Then, we take a look at some security awareness best practices that you can use to craft training your users will actually benefit from.

TechTarget ComputerWeekly.com

Top Mobile Security Threats: Insight Into Threats and Attackers
Discover how IT can tackle the top modern mobile security threats by identifying vulnerabilities, integrating successfully with the cloud, and more.

Lookout