All resources sponsored by:

SearchSecurity.com

1 - 25 of 577 Matches
The Merry-Go-Round of Security Testing
sponsored by SearchSecurity.com
EBOOK:In this Insider Edition of Information Security, InfoSec pros will learn about the pros and cons of RASP, the runtime application self-protection method for secure software delivery.
Posted: 08 Apr 2015 | Published: 08 Apr 2015
Get This Now


Be a Web App Security Superhero
sponsored by SearchSecurity.com
EBOOK:To secure Web applications today means tuning protections using the latest in Web Application Firewalls, Runtime Application Self Protection and other more.
Posted: 07 Apr 2015 | Published: 07 Apr 2015
Get This Now


April Information Security - Defending against the digital invasion
sponsored by SearchSecurity.com
EZINE:In this issue of Information Security magazine, we cover top cyberthreats and countermeasures to help organizations defend against new and evolving attack techniques.
Posted: 01 Apr 2015 | Published: 25 Mar 2015
Get This Now


Making Sign-on Simple and Secure
sponsored by SearchSecurity.com
EBOOK:Single sign-on has a complicated history. This technical guide brings you up to date on how the main protocols for single sign-on -- OpenID and Security Assertion Markup Language (SAML) -- compare and how they can be connected to the pieces you already have. While SAML seems to be winning the field, OpenID shouldn't be ruled out.
Posted: 13 Mar 2015 | Published: 13 Mar 2015
Get This Now

TOPICS:  Security | SSO

Information Security ASEAN March 2015
sponsored by SearchSecurity.com
EZINE:Organizations are faced with the double challenge of having to secure a growing volume of endpoints, and dealing with an increasing number of security threats.
Posted: 05 Mar 2015 | Published: 05 Mar 2015
Get This Now


Information Security ANZ March 2015
sponsored by SearchSecurity.com
EZINE:Experts at Dell and Dimension data in Australia discuss the challenge of securing the end point.
Posted: 05 Mar 2015 | Published: 05 Mar 2015
Get This Now


SIEM Battleground Unfolds Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT:This classroom looks at next-generation security information and event management (SIEM), analytic tools and cloud-based systems designed to help CISOs make sense of security data.
Posted: 05 Mar 2015 | Premiered: 16 Mar 2015
Get This Now


March Information Security – The Hunt for Data Analytics
sponsored by SearchSecurity.com
EZINE:Big data and analytics show promise for better threat detection. Should these technologies be combined with SIEM products, or is it time to move beyond these high alert systems?
Posted: 02 Mar 2015 | Published: 02 Mar 2015
Get This Now


Mobile Security Matures: Managing the new mobile enterprise 2.0
sponsored by SearchSecurity.com
VIRTUAL TRADESHOW:This virtual event, produced jointly by ISACA, SearchSecurity.com, and SearchCompliance.com provides attendees with strategies for effectively adapting and satisfying end-users' growing BYOD demands, while still allowing for enterprise IT to securely control desktop and application delivery, without exposing your organization to security threats.
Posted: 27 Feb 2015 | Premiered: Apr 15, 2015, 08:15 EDT (12:15 GMT)
Get This Now


Web security meets DDoS Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT:John Pescatore explores new DDoS attack vectors and discusses incident response planning (tools and processes) you need to plan for in 2015.
Posted: 18 Feb 2015 | Premiered: 20 Feb 2015
Get This Now


Who's in Your Wallet? Stemming Credit Card Fraud
sponsored by SearchSecurity.com
EBOOK:As online shopping burgeons, so does credit card fraud. We examine the latest credit card scams, and how technology and standards set by the Payment Card Industry can help.
Posted: 13 Feb 2015 | Published: 13 Feb 2015
Get This Now


Securing the Perimeter Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT:This Security School lesson examines how current and future IT trends have affected enterprises' network perimeter strategy and the technology and policy to support it.
Posted: 04 Feb 2015 | Premiered: 09 Feb 2015
Get This Now


Application Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT:Learn about new app security tools you can use to vet open source libraries and manage security vulnerabilities.
Posted: 03 Feb 2015 | Premiered: 02 Dec 2014
Get This Now


Security Magazine: Discover the Latest Security Tips
sponsored by SearchSecurity.com
EZINE:Denial-of-service attacks have caused serious disruptions for years. Yet 40% of enterprises remain unprepared to launch a DDoS defense and recover business services.
Posted: 02 Feb 2015 | Published: 30 Jan 2015
Get This Now


Next-Generation Firewalls: Breaking Through the Hype
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT:This SearchSecurity School cuts through the marketing jargon to help you understand what a next-generation firewall can provide and determine which next-generation firewall features best suit your needs.
Posted: 01 Feb 2015 | Premiered: 10 Dec 2013
Get This Now


Rethinking the Paradigm of Advanced Threats
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT:Peter Sullivan explores why enterprises are failing to detect Regin-style advanced threats, and discusses how to realign people, processes and technology to reduce the risk by giving enterprises a fighting chance.
Posted: 20 Jan 2015 | Premiered: 23 Jan 2015
Get This Now


Resolve to Revitalize Your SIEM Security
sponsored by SearchSecurity.com
EBOOK:It's a new year, with new threats. Here's a thorough examination of four capabilities some new security information and event management (SIEM) products are offering.
Posted: 07 Jan 2015 | Published: 07 Jan 2015
Get This Now


Information Security Magazine: December 2014
sponsored by SearchSecurity.com
EZINE:The winners of Information Security magazine's Security 7 awards are announced. The Security 7 awards honor CISOs, security researchers and others at the top of their profession.
Posted: 01 Dec 2014 | Published: 01 Dec 2014
Get This Now


Security University: Mobile Security
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT:Lisa Phifer explores innovative approaches to achieve secure mobility, from EMM and BYOA to enterprise cloud and dual persona.
Posted: 11 Nov 2014 | Premiered: 14 Nov 2014
Get This Now


What to look for in secure file transfer
sponsored by SearchSecurity.com
EBOOK:This guide provides essential knowledge for enterprise InfoSec pros acquiring tools and products to transfer files efficiently and securely.
Posted: 12 Mar 2015 | Published: 12 Mar 2015
Get This Now


The Transformation of Wireless Network Security
sponsored by SearchSecurity.com
EBOOK:Learn how to integrate Wi-Fi security into your overall network strategy to help maintain security in the age of wireless connectivity.
Posted: 10 Dec 2014 | Published: 10 Dec 2014
Get This Now


Information Security Magazine – November 2014
sponsored by SearchSecurity.com
EZINE:The votes are tallied. More than 1,700 security practitioners participated in our Security Readers' Choice Awards 2014. Did your tools make the cut?
Posted: 07 Nov 2014 | Published: 07 Nov 2014
Get This Now


What to Look for in Web Application Firewall Products
sponsored by SearchSecurity.com
EBOOK:In this buyer's guide, experts explain how a WAF works, describe the features that different WAFs possess, and reveal how to weight these factors in selecting the right WAF to protect your enterprise's sensitive data.
Posted: 07 Nov 2014 | Published: 07 Nov 2014
Get This Now


Endpoint protection: Whitelisting and Beyond
sponsored by SearchSecurity.com
EBOOK:Application whitelisting is a valuable security tool but it's riddled with complexity. This handbook takes a look at whitelisting capabilities, with an eye to the NIST cybersecurity framework and suggests best practices for implementing or managing a whitelist in your enterprise.
Posted: 05 Nov 2014 | Published: 05 Nov 2014
Get This Now


Information Security ASEAN November 2014
sponsored by SearchSecurity.com
EZINE:High profile Cyber security breaches in Singapore and Malaysia have focused minds and budgets on developing IT security skills.
Posted: 03 Nov 2014 | Published: 03 Nov 2014
Get This Now


1 - 25 of 577 Matches
Page: 2 3 4 5 6 7 8 9 10 11 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement