All resources sponsored by:

SearchSecurity.com

1 - 25 of 642 Matches
Cloud access security brokers: Hard to tell what's real
sponsored by SearchSecurity.com
EZINE:In this issue of Information Security, we look at the momentum behind cloud access security brokers and find out how the uses and dangers stack up.
Posted: 01 Jun 2017 | Published: 01 Jun 2017
Get This Now


Cybersecurity Careers Soar
sponsored by SearchSecurity.com
EZINE:In the security field, certifications and degrees are nevera substitute for on-the-job experience. In this month's Information Security magazine, we look at cybersecurity careers. Should your company invest in first-time CISOs, threat hunters and more diversity?
Posted: 01 May 2017 | Published: 01 May 2017
Get This Now


The Next Security Frontier: Automation, Things and Intelligent Machines
sponsored by SearchSecurity.com
VIRTUAL SEMINAR:Stay on top of the current cybersecurity landscape and join us for this live virtual conference on June 27th.
Posted: 24 Apr 2017 | Premiered: 24 Apr 2017
Get This Now


Information Security magazine Insider Edition, April 2017
sponsored by SearchSecurity.com
EZINE:Managing IAM is more critical than ever to corporate security; Your IAM policy must be updated to reflect the current risks and IT advances. Discover how to tackle changes in the "identity layer" and consider other factors affecting your IAM policy. Also delve into multifactor authentication and the specific risks to cloud-based IAM tools.
Posted: 19 Apr 2017 | Published: 10 Apr 2017
Get This Now


Ransomware Detection and Prevention Tools You Need Now
sponsored by SearchSecurity.com
EBOOK:Fighting today's malware threats requires a range of ransomware prevention tools. Learn how to tweak the tools you have and identify what new tools you need.
Posted: 13 Apr 2017 | Published: 05 Mar 2017
Get This Now


How to Find the Best DDoS Attack Prevention and Detection Tools
sponsored by SearchSecurity.com
EBOOK:In this handbook, one expert reveals how to select tools that will best strengthen your defense against DDoS attacks. Uncover 4 key questions to ask as you begin your DDoS defense strategy.
Posted: 10 Apr 2017 | Published: 05 Apr 2017
Get This Now


The Evolving Role of Managed Security Service Providers
sponsored by SearchSecurity.com
EZINE:In this issue of Information Security, we look at the evolution of the managed security provider and why services are the fastest-growing part of security.
Posted: 03 Apr 2017 | Published: 03 Apr 2017
Get This Now


Get Smart About Threat Intel Tools and Services
sponsored by SearchSecurity.com
EBOOK:Learn how threat intelligence tools can improve enterprise security and where they should fit into the broader security scheme.
Posted: 27 Feb 2017 | Published: 20 Feb 2017
Get This Now


Use a web app firewall to halt app attacks
sponsored by SearchSecurity.com
EBOOK:Web application firewalls are more essential than ever when it comes to halting app attacks. Learn what features and functions you should look for when choosing a new WAF.
Posted: 07 Feb 2017 | Published: 05 Feb 2017
Get This Now


Getting Ahead of Cyber Threats in 2017
sponsored by SearchSecurity.com
EZINE:In this issue of Information Security magazine, we look at new ways that attackers may approach cybersecurity attacks and how to bolster your defenses.
Posted: 01 Feb 2017 | Published: 01 Feb 2017
Get This Now


Crafting an Insider Threat Program: Why and How
sponsored by SearchSecurity.com
EBOOK:Tackling IT threats is even harder when the breach -- malicious or inadvertent -- originates in the company. Learn how to handle insider threats.
Posted: 23 Jan 2017 | Published: 20 Jan 2017
Get This Now


Unleash Your Security Data's Full Potential
sponsored by SearchSecurity.com
EBOOK:Battling today's top cybersecurity threats requires the best in threat intelligence and security tools; learn what your enterprise defense posture needs now.
Posted: 21 Dec 2016 | Published: 21 Dec 2016
Get This Now


Dedicated to Information Security: The High-Stakes Role of the CISO
sponsored by SearchSecurity.com
EZINE:Almost 20 years into its existence, the CISO job is still open to discussion. In this issue of Information Security, we look at the role's influence on broader security initiatives, plus challenges of the job and the changes ahead. Download now and you'll also get tips on implementing cyberthreat intelligence, a CISO Q&A, and more.
Posted: 01 Dec 2016 | Published: 01 Dec 2016
Get This Now


Why DevOps + Security = A Bright Idea
sponsored by SearchSecurity.com
EBOOK:By combining DevOps and security, software developers will be able to produce more secure applications and infrastructures and defeat the long-standing bias that security is an obstacle, not aid, to good software development.
Posted: 22 Nov 2016 | Published: 18 Nov 2016
Get This Now


Security Analytics: Searching for Meaning
sponsored by SearchSecurity.com
EBOOK:This expert e-guide helps clarify how advanced security analysis differs from the threat assessments of the past. Access now for a deeper understanding of how advanced security analytics works and how it can best be used in your organization.
Posted: 21 Nov 2016 | Published: 21 Nov 2016
Get This Now


Minimizing Cyber Risk with Better Threat Detection and Incident Response
sponsored by SearchSecurity.com
EZINE:Today's security incident response must cope with an increasing onslaught of sophisticated attacks. Learn how to automate and collaborate better on your organization's incident response through threat detection, IR tools, and more.
Posted: 16 Nov 2016 | Published: 11 Nov 2016
Get This Now


CW ASEAN November 2016
sponsored by SearchSecurity.com
EZINE:Small businesses in the ASEAN region could unknowingly be allowing hackers to access large corporate networks.
Posted: 01 Nov 2016 | Published: 31 Oct 2016
Get This Now


CW ANZ November 2016
sponsored by SearchSecurity.com
EZINE:With the number of cyber incidents identified by Australian organisations more than doubling in the past year, PwC is using an online game to give enterprises first-hand experience of what it means to face a cyber attack.
Posted: 01 Nov 2016 | Published: 31 Oct 2016
Get This Now


Straddling the Security Divide Between On-Premises and Cloud
sponsored by SearchSecurity.com
EZINE:Legacy security tools designed for data centers don't work well in cloud infrastructures. We help you conquer the divide between on-premises and cloud security in this issue of Information Security.
Posted: 01 Nov 2016 | Published: 01 Nov 2016
Get This Now


Artificial Intelligence and Machine Learning: Cybersecurity Advances
sponsored by SearchSecurity.com
EZINE:In this issue of Information Security magazine, we look at machine learning in security and how recent advances may bolster your defenses.
Posted: 01 Mar 2017 | Published: 01 Mar 2017
Get This Now


The Digital Certificate: How It Works, Which to Buy
sponsored by SearchSecurity.com
EBOOK:If you're in the market to buy digital certificates, read this guide to learn what features are essential and how to evaluate the available options.
Posted: 11 Jan 2017 | Published: 05 Jan 2017
Get This Now


Securing IoT-One, Two, Three
sponsored by SearchSecurity.com
EZINE:Security for IoT requires a policy that includes a comprehensive list of devices that need attention and a system for regular IoT security testing.
Posted: 10 Jan 2017 | Published: 10 Jan 2017
Get This Now


Judging MSSP Options With Care
sponsored by SearchSecurity.com
EBOOK:The managed security services market is both essential and complex. This guide explains how to approach the hunt for a managed security services provider.
Posted: 21 Dec 2016 | Published: 21 Dec 2016
Get This Now


What to Look for in Incident Response Management Tools
sponsored by SearchSecurity.com
EBOOK:Breaches are inevitable, so an effective incident response toolkit is essential. In this buyer's guide, learn the current and upcoming requirements for IR tools and what features are most vital.
Posted: 29 Nov 2016 | Published: 29 Nov 2016
Get This Now


Are You Ready for RASP?
sponsored by SearchSecurity.com
EBOOK:This runtime application self-protection handbook covers the basics and offers advice on RASP implementation for IT security professionals.
Posted: 24 Oct 2016 | Published: 21 Oct 2016
Get This Now


1 - 25 of 642 Matches
Page: 2 3 4 5 6 7 8 9 10 11 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement