All resources sponsored by:

SearchSecurity.com

1 - 25 of 551 Matches
Windows Shopping: Will 8.1 Meet Your Security Needs?
sponsored by SearchSecurity.com
EBOOK:Microsoft Windows 8.1 attempts to respond to a demand for new security features for network endpoints and user devices. This technical guide offers a concise review of its security features and whether MS Windows 8.1 fills its promises.
Posted: 12 Sep 2014 | Published: 12 Sep 2014
Get This Now


Information Security Magazine: September 2014
sponsored by SearchSecurity.com
EZINE:Open source software vulnerabilities have security executives worried. Lower your risk by revisiting application security policy and enforcing development best practices.
Posted: 02 Sep 2014 | Published: 02 Sep 2014
Get This Now


Security School: Defending Against DDoS Attacks
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT:This Security School lesson reviews recent cases of DOS attacks, what happened and why, and the lessons you can learn in devising the best DoS defense.
Posted: 15 Aug 2014 | Premiered: 15 Aug 2014
Get This Now


Countering Cyber-Crime with a Sharp Eye and a Clear Plan
sponsored by SearchSecurity.com
EBOOK:Bigger, more diverse networks mean a bigger attack surface for hackers. Today's networking pros must assess and update network security strategies to account for new vulnerabilities and respond to inevitable attacks.
Posted: 14 Aug 2014 | Published: 11 Aug 2014
Get This Now


Mobile Security: Overcoming Obstacles, Reducing Risk
sponsored by SearchSecurity.com
VIRTUAL TRADESHOW:Join ISACA, SearchCompliance.com, SearchSecurity.com and thousands of your fellow IT peers from around the world for a live virtual seminar, taking place on September 17th 2014, on how to secure your mobile workplace without sacrificing the business needs of end users.
Posted: 14 Aug 2014 | Premieres: Sep 17, 2014
Get This Now


Securing the Internet of Things
sponsored by SearchSecurity.com
EBOOK:In this Insider Edition, InfoSec pros will learn all about securing the Internet of Things, from determining the nature of the threats to creating an effective IoT security policy.
Posted: 13 Aug 2014 | Published: 12 Aug 2014
Get This Now


Information Security Magazine – July/August 2014
sponsored by SearchSecurity.com
EZINE:Big data and security with non-relational data management platforms are too often an afterthought. Here's what you need to get started with NoSQL security.
Posted: 31 Jul 2014 | Published: 01 Aug 2014
Get This Now


Vulnerability Management Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT:How do you win a losing battle—in this case, the battle of vulnerability management? Whether it's Java or Adobe or something you never previously heard of, let's face it: the battle against system vulnerabilities is a losing one.
Posted: 14 Jul 2014 | Premiered: 15 Jul 2014
Get This Now


Is UTM Ready for the Big Leagues?
sponsored by SearchSecurity.com
EBOOK:This Technical Guide reviews advanced UTM and what elements make for a truly enterprise-class UTM device.
Posted: 10 Jul 2014 | Published: 10 Jul 2014
Get This Now


Information Security ASEAN July 2014
sponsored by SearchSecurity.com
EZINE:This issue looks at the state of the Personal Data Protection Act in Singapore and Malaysia?
Posted: 27 Jun 2014 | Published: 27 Jun 2014
Get This Now


Information Security ANZ July 2014
sponsored by SearchSecurity.com
EZINE:This ezine looks at how will new privacy laws impact IT departments in Australia?
Posted: 27 Jun 2014 | Published: 27 Jun 2014
Get This Now


Information Security E-Zine – June 2014
sponsored by SearchSecurity.com
EZINE:Global threat intelligence services have continued to evolve and play more of role in SIEM and endpoint security products. How can threat intelligence benefit risk scenarios?
Posted: 02 Jun 2014 | Published: 02 Jun 2014
Get This Now


Integrating SIEM and Incident Response Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT:This Security classroom explores how to enhance and extend SIEM technology to effectively support incident response.
Posted: 14 May 2014 | Premiered: 14 May 2014
Get This Now


Coming at You: How to Deal with the Latest DDoS Attacks
sponsored by SearchSecurity.com
EBOOK:Diversity. Usually it's a good thing, but not with distributed denial-of-service attacks, which are getting more varied and more lethal. Here's what to do about that.
Posted: 14 May 2014 | Published: 15 May 2014
Get This Now


Information Security – May 2014
sponsored by SearchSecurity.com
EZINE:The online authentication protocols proposed by the Fast Identity Online Alliance face a reality check. As FIDO-ready products ship, what are the implications for enterprises?
Posted: 30 Apr 2014 | Published: 30 Apr 2014
Get This Now


Information Security Magazine – April 2014
sponsored by SearchSecurity.com
EZINE:In this issue, we help you assess your mobile security strategy in the face of emerging threats and attackers' use of mobile devices to carry out attacks.
Posted: 01 Apr 2014 | Published: 01 Apr 2014
Get This Now


What’s the Best Focus for MDM Strategy Now?
sponsored by SearchSecurity.com
EBOOK:This guide provides expert advice on how to craft a mobile device security strategy that safeguards enterprise assets and prevents minor security issues from becoming major security disasters.
Posted: 12 Mar 2014 | Published: 12 Mar 2014
Get This Now


Technical Guide on Application Security
sponsored by SearchSecurity.com
EZINE:This expert Tech Guide from SearchSecurity.com offers insight on today's application security threat environment, as well as key recommendations and challenges with implementing the latest defense tools.
Posted: 06 Mar 2014 | Published: 31 Dec 2012
Get This Now


Insider Edition: Antimalware Technologies and Techniques to the Rescue
sponsored by SearchSecurity.com
EZINE:In this special edition of Information Security, our experts examine the recent advances in anti-malware detection and prevention, and which ones can tip the scale in your favor in the fight against malware.
Posted: 05 Mar 2014 | Published: 05 Mar 2014
Get This Now


TechTarget's Annual Salary and Careers Survey Results
sponsored by SearchSecurity.com
EBOOK:The results of TechTarget's 2013 IT Salary and Careers Survey chart the compensation, job satisfaction and project priorities of 1,711 IT professionals, including hundreds of senior IT leaders.
Posted: 11 Jun 2014 | Published: 11 Jun 2014
Get This Now

TOPICS:  Careers | Security

TechTarget's 2013 Annual Salary and Careers Infographic
sponsored by SearchSecurity.com
EBOOK:TechTarget's 2013 Annual Salary and Careers Survey polled 1,711 IT professionals on their 2013 compensation, anticipated future earnings and technology priorities in 2014.
Posted: 11 Jun 2014 | Published: 11 Jun 2014
Get This Now

TOPICS:  Careers | Security

Secure File Transfer: Send it Fast, but Send it Safely
sponsored by SearchSecurity.com
EBOOK:FTP gets big files to colleagues and clients fast, but as the headlines remind us, the threat of electronic break-in is real. This guide to secure file transfer show how best to cure that sense of FTP insecurity.
Posted: 16 Apr 2014 | Published: 14 Apr 2014
Get This Now


Information Security ASEAN March 2014
sponsored by SearchSecurity.com
EZINE:This ezine looks at the security challenges facing IT security professionals in the ASEAN region with a look at threats and industry trends.
Posted: 18 Mar 2014 | Published: 18 Mar 2014
Get This Now


Information Security ANZ March 2014
sponsored by SearchSecurity.com
EZINE:This issue looks at the security challenges facing IT security professionals in the Australia/New Zealand region.
Posted: 18 Mar 2014 | Published: 18 Mar 2014
Get This Now


Insider Edition: Antimalware Technologies and Techniques to the Rescue
sponsored by SearchSecurity.com
EZINE:In this special edition of Information Security, our experts examine the recent advances in anti-malware detection and prevention, and which ones can tip the scale in your favor in the fight against malware.
Posted: 03 Mar 2014 | Published: 05 Mar 2014
Get This Now


1 - 25 of 551 Matches
Page: 2 3 4 5 6 7 8 9 10 11 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement