All resources sponsored by:

SearchSecurity.com

1 - 25 of 565 Matches
Insider Edition: Seeking Security in the Cloud, through STAR
sponsored by SearchSecurity.com
EBOOK:Improved capabilities for logging and reporting cloud-based activity are now available, as are new ways for cloud providers to certify and communicate their security postures. This Insider Edition looks at efforts such as the STAR certification and the recently announced CloudTrust protocol.
Posted: 21 Nov 2014 | Published: 21 Nov 2014
Get This Now


Identity and Access Management
sponsored by SearchSecurity.com
EBOOK:This Tech Guide on identity and access management (IAM) from SearchSecurity.com outlines the issues associated with IAM programs, how to build an effective strategy, why privilege creep has become such a challenge, and more!
Posted: 17 Nov 2014 | Published: 17 Nov 2014
Get This Now


Security University: Mobile Security
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT:Lisa Phifer explores innovative approaches to achieve secure mobility, from EMM and BYOA to enterprise cloud and dual persona.
Posted: 11 Nov 2014 | Premiered: 14 Nov 2014
Get This Now


Information Security Magazine – November 2014
sponsored by SearchSecurity.com
EZINE:The votes are tallied. More than 1,700 security practitioners participated in our Security Readers' Choice Awards 2014. Did your tools make the cut?
Posted: 07 Nov 2014 | Published: 07 Nov 2014
Get This Now


Buyer's Essential: What to Look for In Web Application Firewall Products
sponsored by SearchSecurity.com
EBOOK:If you're in the market for Web application firewalls, find out what features are essential before you purchase one.
Posted: 07 Nov 2014 | Published: 07 Nov 2014
Get This Now


Endpoint protection: Whitelisting and Beyond
sponsored by SearchSecurity.com
EBOOK:Application whitelisting is a valuable security tool but it's riddled with complexity. This handbook takes a look at whitelisting capabilities, with an eye to the NIST cybersecurity framework and suggests best practices for implementing or managing a whitelist in your enterprise.
Posted: 05 Nov 2014 | Published: 05 Nov 2014
Get This Now


Information Security ASEAN November 2014
sponsored by SearchSecurity.com
EZINE:High profile Cyber security breaches in Singapore and Malaysia have focused minds and budgets on developing IT security skills.
Posted: 03 Nov 2014 | Published: 03 Nov 2014
Get This Now


Information Security ANZ November 2014
sponsored by SearchSecurity.com
EZINE:Australia's traditional teaching pathways are struggling to produce candidates with the right skills for today's rapidly-changing cyber-security climate.
Posted: 03 Nov 2014 | Published: 03 Nov 2014
Get This Now


Evolving Security for a Maturing Cloud
sponsored by SearchSecurity.com
VIRTUAL SEMINAR:Join ISACA and TechTarget for a virtual seminar on December 9th and come away with insight into the risks, strategies, and solutions that comprise the current cloud security landscape.
Posted: 22 Oct 2014 | Premieres: 09 Dec 2014
Get This Now


Devices, data and how enterprise mobile management reconciles the two
sponsored by SearchSecurity.com
EBOOK:In this Insider Edition, InfoSec pros will learn about enterprise mobile management, or EMM, the new approach to security in the BYOD age, which focuses on security data rather than devices.
Posted: 15 Oct 2014 | Published: 15 Oct 2014
Get This Now


Putting Security on Auto-Pilot: What Works, What Doesn't
sponsored by SearchSecurity.com
EBOOK:As with many human endeavors, the impulse to automate the pen test is seemingly irresistible. But is it a good idea? This technical guide examines the pros, cons and unknowns of automated pen testing.
Posted: 14 Oct 2014 | Published: 14 Oct 2014
Get This Now


Intrusion Detection and Prevention: Decision Time
sponsored by SearchSecurity.com
EBOOK:Learn how to evaluate your potential vendor's IDS/IPS product and its ability to meet your specific business requirements.
Posted: 02 Oct 2014 | Published: 02 Oct 2014
Get This Now


Intrusion Detection and Prevention: RFP Technology Decisions
sponsored by SearchSecurity.com
EBOOK:To properly evaluate IDS/IPS products, you must understand vendor offerings and how well they fit with your organization.
Posted: 02 Oct 2014 | Published: 02 Oct 2014
Get This Now


Intrusion Detection and Protection: From Business Problem to Technical Solution
sponsored by SearchSecurity.com
EBOOK:Learn how IDS/IPS help you thwart attacks and mitigate post-attack damage.
Posted: 02 Oct 2014 | Published: 02 Oct 2014
Get This Now


Information Security Magazine – October 2014
sponsored by SearchSecurity.com
EZINE:Continuous monitoring has been part of the information security lexicon for years. So why are so many security professionals still wondering how to get a program started?
Posted: 01 Oct 2014 | Published: 01 Oct 2014
Get This Now


Data Loss Prevention: Decision Time
sponsored by SearchSecurity.com
EBOOK:This expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.
Posted: 25 Sep 2014 | Published: 25 Sep 2014
Get This Now


Data Loss Prevention: RFP Technology Decisions
sponsored by SearchSecurity.com
EBOOK:This expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.
Posted: 25 Sep 2014 | Published: 25 Sep 2014
Get This Now


Data Loss Prevention: From Business Problem to Technical Solution
sponsored by SearchSecurity.com
EBOOK:This expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.
Posted: 25 Sep 2014 | Published: 25 Sep 2014
Get This Now


TechGuide: Adopting New Threat Detection Techniques for Advanced Attacks
sponsored by SearchSecurity.com
EBOOK:Check out this informative guide on the latest threat detection technologies to protect your company from advanced persistent threats today.
Posted: 18 Sep 2014 | Published: 18 Sep 2014
Get This Now


Windows Shopping: Will 8.1 Meet Your Security Needs?
sponsored by SearchSecurity.com
EBOOK:Microsoft Windows 8.1 attempts to respond to a demand for new security features for network endpoints and user devices. This technical guide offers a concise review of its security features and whether MS Windows 8.1 fills its promises.
Posted: 12 Sep 2014 | Published: 12 Sep 2014
Get This Now


Security School: Defending Against DDoS Attacks
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT:This Security School lesson reviews recent cases of DOS attacks, what happened and why, and the lessons you can learn in devising the best DoS defense.
Posted: 15 Aug 2014 | Premiered: 15 Aug 2014
Get This Now


Information Security Magazine – July/August 2014
sponsored by SearchSecurity.com
EZINE:Big data and security with non-relational data management platforms are too often an afterthought. Here's what you need to get started with NoSQL security.
Posted: 31 Jul 2014 | Published: 01 Aug 2014
Get This Now


Vulnerability Management Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT:How do you win a losing battle—in this case, the battle of vulnerability management? Whether it's Java or Adobe or something you never previously heard of, let's face it: the battle against system vulnerabilities is a losing one.
Posted: 14 Jul 2014 | Premiered: 15 Jul 2014
Get This Now


Securing Enterprise Networks with a Sharp Eye and a Clear Plan
sponsored by SearchSecurity.com
EGUIDE:Enterprise networks are increasing in size and complexity, creating a larger attack surface for hackers. This TechGuide walks you through gaining visibility into your network and devising an effective security strategy.
Posted: 14 Aug 2014 | Published: 11 Aug 2014
Get This Now


Securing the Internet of Things
sponsored by SearchSecurity.com
EBOOK:In this Insider Edition, InfoSec pros will learn all about securing the Internet of Things, from determining the nature of the threats to creating an effective IoT security policy.
Posted: 13 Aug 2014 | Published: 12 Aug 2014
Get This Now


1 - 25 of 565 Matches
Page: 2 3 4 5 6 7 8 9 10 11 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement