All resources sponsored by:

SearchSecurity.com

1 - 25 of 556 Matches
Information Security Magazine – October 2014
sponsored by SearchSecurity.com
EZINE:Continuous monitoring has been part of the information security lexicon for years. So why are so many security professionals still wondering how to get a program started?
Posted: 01 Oct 2014 | Published: 01 Oct 2014
Get This Now


Data Loss Prevention: Decision Time
sponsored by SearchSecurity.com
EBOOK:This expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.
Posted: 25 Sep 2014 | Published: 25 Sep 2014
Get This Now


Data Loss Prevention: RFP Technology Decisions
sponsored by SearchSecurity.com
EBOOK:This expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.
Posted: 25 Sep 2014 | Published: 25 Sep 2014
Get This Now


Data Loss Prevention: From Business Problem to Technical Solution
sponsored by SearchSecurity.com
EBOOK:This expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.
Posted: 25 Sep 2014 | Published: 25 Sep 2014
Get This Now


MobileIron Resource Booth
sponsored by SearchSecurity.com
VIRTUAL TRADESHOW:Almost every enterprise is now building out a mobile apps program. Many first generation mobile apps were not well designed, readily adopted by users, or built for supportability. This booth contains MobileIron assets that will cover lessons learned over the last two years of mobile app development as well as information on their MAM solutions.
Posted: 22 Sep 2014 | Premiered: Sep 22, 2014
Get This Now

TOPICS:  Security

TechGuide: Adopting New Threat Detection Techniques for Advanced Attacks
sponsored by SearchSecurity.com
EBOOK:Check out this informative guide on the latest threat detection technologies to protect your company from advanced persistent threats today.
Posted: 18 Sep 2014 | Published: 18 Sep 2014
Get This Now


Windows Shopping: Will 8.1 Meet Your Security Needs?
sponsored by SearchSecurity.com
EBOOK:Microsoft Windows 8.1 attempts to respond to a demand for new security features for network endpoints and user devices. This technical guide offers a concise review of its security features and whether MS Windows 8.1 fills its promises.
Posted: 12 Sep 2014 | Published: 12 Sep 2014
Get This Now


Information Security Magazine: September 2014
sponsored by SearchSecurity.com
EZINE:Open source software vulnerabilities have security executives worried. Lower your risk by revisiting application security policy and enforcing development best practices.
Posted: 02 Sep 2014 | Published: 02 Sep 2014
Get This Now


Security School: Defending Against DDoS Attacks
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT:This Security School lesson reviews recent cases of DOS attacks, what happened and why, and the lessons you can learn in devising the best DoS defense.
Posted: 15 Aug 2014 | Premiered: 15 Aug 2014
Get This Now


Countering Cyber-Crime with a Sharp Eye and a Clear Plan
sponsored by SearchSecurity.com
EBOOK:Bigger, more diverse networks mean a bigger attack surface for hackers. Today's networking pros must assess and update network security strategies to account for new vulnerabilities and respond to inevitable attacks.
Posted: 14 Aug 2014 | Published: 11 Aug 2014
Get This Now


Mobile Security: Overcoming Obstacles, Reducing Risk
sponsored by SearchSecurity.com
VIRTUAL TRADESHOW:Join ISACA, SearchCompliance.com, SearchSecurity.com and thousands of your fellow IT peers from around the world for a live virtual seminar, taking place on September 17th 2014, on how to secure your mobile workplace without sacrificing the business needs of end users.
Posted: 14 Aug 2014 | Premiered: Sep 17, 2014
Get This Now


Securing the Internet of Things
sponsored by SearchSecurity.com
EBOOK:In this Insider Edition, InfoSec pros will learn all about securing the Internet of Things, from determining the nature of the threats to creating an effective IoT security policy.
Posted: 13 Aug 2014 | Published: 12 Aug 2014
Get This Now


Information Security Magazine – July/August 2014
sponsored by SearchSecurity.com
EZINE:Big data and security with non-relational data management platforms are too often an afterthought. Here's what you need to get started with NoSQL security.
Posted: 31 Jul 2014 | Published: 01 Aug 2014
Get This Now


Vulnerability Management Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT:How do you win a losing battle—in this case, the battle of vulnerability management? Whether it's Java or Adobe or something you never previously heard of, let's face it: the battle against system vulnerabilities is a losing one.
Posted: 14 Jul 2014 | Premiered: 15 Jul 2014
Get This Now


Is UTM Ready for the Big Leagues?
sponsored by SearchSecurity.com
EBOOK:This Technical Guide reviews advanced UTM and what elements make for a truly enterprise-class UTM device.
Posted: 10 Jul 2014 | Published: 10 Jul 2014
Get This Now


Information Security ASEAN July 2014
sponsored by SearchSecurity.com
EZINE:This issue looks at the state of the Personal Data Protection Act in Singapore and Malaysia?
Posted: 27 Jun 2014 | Published: 27 Jun 2014
Get This Now


Information Security ANZ July 2014
sponsored by SearchSecurity.com
EZINE:This ezine looks at how will new privacy laws impact IT departments in Australia?
Posted: 27 Jun 2014 | Published: 27 Jun 2014
Get This Now


Information Security E-Zine – June 2014
sponsored by SearchSecurity.com
EZINE:Global threat intelligence services have continued to evolve and play more of role in SIEM and endpoint security products. How can threat intelligence benefit risk scenarios?
Posted: 02 Jun 2014 | Published: 02 Jun 2014
Get This Now


Integrating SIEM and Incident Response Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT:This Security classroom explores how to enhance and extend SIEM technology to effectively support incident response.
Posted: 14 May 2014 | Premiered: 14 May 2014
Get This Now


Coming at You: How to Deal with the Latest DDoS Attacks
sponsored by SearchSecurity.com
EBOOK:Diversity. Usually it's a good thing, but not with distributed denial-of-service attacks, which are getting more varied and more lethal. Here's what to do about that.
Posted: 14 May 2014 | Published: 15 May 2014
Get This Now


Insider Edition: There's No Room for Either/Or When It Comes to Cloud and Security
sponsored by SearchSecurity.com
EBOOK:Improved capabilities for logging and reporting cloud-based activity are now available, as are new ways for cloud providers to certify and communicate their security postures. This Insider Edition looks at efforts such as the STAR certification and the recently announced CloudTrust protocol.
Posted: 14 May 2014 | Published: 15 May 2014
Get This Now


Information Security – May 2014
sponsored by SearchSecurity.com
EZINE:The online authentication protocols proposed by the Fast Identity Online Alliance face a reality check. As FIDO-ready products ship, what are the implications for enterprises?
Posted: 30 Apr 2014 | Published: 30 Apr 2014
Get This Now


TechTarget's Annual Salary and Careers Survey Results
sponsored by SearchSecurity.com
EBOOK:The results of TechTarget's 2013 IT Salary and Careers Survey chart the compensation, job satisfaction and project priorities of 1,711 IT professionals, including hundreds of senior IT leaders.
Posted: 11 Jun 2014 | Published: 11 Jun 2014
Get This Now

TOPICS:  Careers | Security

TechTarget's 2013 Annual Salary and Careers Infographic
sponsored by SearchSecurity.com
EBOOK:TechTarget's 2013 Annual Salary and Careers Survey polled 1,711 IT professionals on their 2013 compensation, anticipated future earnings and technology priorities in 2014.
Posted: 11 Jun 2014 | Published: 11 Jun 2014
Get This Now

TOPICS:  Careers | Security

Secure File Transfer: Send it Fast, but Send it Safely
sponsored by SearchSecurity.com
EBOOK:FTP gets big files to colleagues and clients fast, but as the headlines remind us, the threat of electronic break-in is real. This guide to secure file transfer show how best to cure that sense of FTP insecurity.
Posted: 16 Apr 2014 | Published: 14 Apr 2014
Get This Now


1 - 25 of 556 Matches
Page: 2 3 4 5 6 7 8 9 10 11 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement