All resources sponsored by:

SearchSecurity.com

1 - 25 of 652 Matches
Security Analysis Principles and Techniques for IT Pros
sponsored by SearchSecurity.com
EBOOK:As a result of the recent developments affecting security analytics, uncover these tips for ensuring you get the most out of your security analytics tool.
Posted: 01 Dec 2017 | Published: 01 Dec 2017
Get This Now


The Tug of War Between UBA and SIEM
sponsored by SearchSecurity.com
EZINE:In this issue of Information Security magazine, we look at SIEM, UBA tools and considerations for effectively implementing user behavior analytics. Additionally, our experts dive into Q&A with John Germain, CISO at Duck Creek Technologies and security research expert, Blaine Burnham.
Posted: 01 Dec 2017 | Published: 01 Dec 2017
Get This Now


The Case for Modern SOCs
sponsored by SearchSecurity.com
EZINE:In this issue of ISM we look at ways to optimize the next-gen SOC and integration and automation strategies that will help you get there. Additionally, our experts dive into Q&A with the Xerox CISO, how companies are using threat intelligence, why companies are failing to manage vulnerabilities in critical systems and applications, and more.
Posted: 02 Nov 2017 | Published: 02 Nov 2017
Get This Now


What does a CISO do now? It's a changing, increasingly vital role
sponsored by SearchSecurity.com
EBOOK:What does a CISO do now, with risks proliferating and the most-needed security skills in short supply? Learn why the CISO role is more vital than ever.
Posted: 11 Oct 2017 | Published: 11 Oct 2017
Get This Now


Security Resilience: Incident Management beyond Ransomware, Zero-Days and even GDPR
sponsored by SearchSecurity.com
VIRTUAL SEMINAR:In this virtual event, produced jointly by ISACA, SearchSecurity.com, and SearchCompliance.com our experts will examine using a more analytic and informed security posture to deal with top-of-mind issues: the growing threat of ransomware and the soon-to-arrive burden of GDPR compliance.
Posted: 09 Oct 2017 | Premiered: 09 Oct 2017
Get This Now


Steps to Protect Your Growing Data
sponsored by SearchSecurity.com
EZINE:The distribution of data and the many ways in which it can be accessed has made handling data protection risks especially challenging. In this issue of Information Security, security experts examine data protection risks and considerations for implementing a data - centric security model.
Posted: 02 Oct 2017 | Published: 02 Oct 2017
Get This Now


Managing Access to Keep Privileged Users' Credentials Secure
sponsored by SearchSecurity.com
EBOOK:Fighting creep through privileged user management is an essential but too often overlooked security practice. Inside this handbook, experts Michael Cobb and Joseph Granneman explain why the fight against privilege creep should be at the top of your security team's to-do list.
Posted: 20 Sep 2017 | Published: 20 Sep 2017
Get This Now


Why Security in DevOps is Essential to Software Development
sponsored by SearchSecurity.com
EBOOK:What is the point of releasing new software that's loaded up with security vulnerabilities? Security is now an essential ingredient in software development. Inside this handbook, experts take a closer look at how IT professionals can fit security into their development process and how they will benefit from doing so.
Posted: 19 Sep 2017 | Published: 19 Sep 2017
Get This Now


Single sign-on service requires a cloud-era update
sponsored by SearchSecurity.com
EBOOK:The best SSO for enterprise use must tackle the complexities that mobility and cloud services like identity as a service present.
Posted: 13 Sep 2017 | Published: 13 Sep 2017
Get This Now


How to Find the Best DDoS Attack Prevention and Detection Tools
sponsored by SearchSecurity.com
EBOOK:Explore this expert handbook on how to evaluate DDoS prevention tools and services to identify the best ones for you.
Posted: 29 Aug 2017 | Published: 29 Aug 2017
Get This Now


Security Analysis Principles and Techniques for IT Pros
sponsored by SearchSecurity.com
EBOOK:As a result of the recent developments affecting security analytics, uncover these tips for ensuring you get the most out of your security analytics tool.
Posted: 25 Jul 2017 | Published: 25 Jul 2017
Get This Now


Cloud access security brokers: Hard to tell what's real
sponsored by SearchSecurity.com
EZINE:In this issue of Information Security, we look at the momentum behind cloud access security brokers and find out how the uses and dangers stack up.
Posted: 01 Jun 2017 | Published: 01 Jun 2017
Get This Now


Use a web app firewall to halt app attacks
sponsored by SearchSecurity.com
EBOOK:Web application firewalls are more essential than ever when it comes to halting app attacks. Learn what features and functions you should look for when choosing a new WAF.
Posted: 07 Feb 2017 | Published: 05 Feb 2017
Get This Now


Getting Ahead of Cyber Threats in 2017
sponsored by SearchSecurity.com
EZINE:In this issue of Information Security magazine, we look at new ways that attackers may approach cybersecurity attacks and how to bolster your defenses.
Posted: 01 Feb 2017 | Published: 01 Feb 2017
Get This Now


Web Security: Now What?
sponsored by SearchSecurity.com
EZINE:In this handbook, experts dive into the ongoing issues related to TLS security and HTTPS inspection. Uncover more about the journey of computer worms and how they play a role in advanced persistent threats.
Posted: 01 Sep 2017 | Published: 01 Sep 2017
Get This Now


4 Tech Disruptors that Could Radically Change Security Operations
sponsored by SearchSecurity.com
EZINE:Many information security programs are not on track to handle the internet of things and other technology disruptors. We help you dust off your crystal ball and get prepared for the near future.
Posted: 01 Aug 2017 | Published: 01 Aug 2017
Get This Now


Is the Endpoint Security Nightmare Ending?
sponsored by SearchSecurity.com
EBOOK:In our Insider Edition of Information Security Magazine, experts Mike Chapple, Michael Heller and David Geer dive into the newest approaches in endpoint security, keys to maturing your mobile security strategy, and more.
Posted: 17 Jul 2017 | Published: 17 Jul 2017
Get This Now


Cybersecurity Careers Soar
sponsored by SearchSecurity.com
EZINE:In the security field, certifications and degrees are nevera substitute for on-the-job experience. In this month's Information Security magazine, we look at cybersecurity careers. Should your company invest in first-time CISOs, threat hunters and more diversity?
Posted: 01 May 2017 | Published: 01 May 2017
Get This Now


Information Security magazine Insider Edition, April 2017
sponsored by SearchSecurity.com
EZINE:Managing IAM is more critical than ever to corporate security; Your IAM policy must be updated to reflect the current risks and IT advances. Discover how to tackle changes in the "identity layer" and consider other factors affecting your IAM policy. Also delve into multifactor authentication and the specific risks to cloud-based IAM tools.
Posted: 19 Apr 2017 | Published: 10 Apr 2017
Get This Now


Ransomware Detection and Prevention Tools You Need Now
sponsored by SearchSecurity.com
EBOOK:Fighting today's malware threats requires a range of ransomware prevention tools. Learn how to tweak the tools you have and identify what new tools you need.
Posted: 13 Apr 2017 | Published: 05 Mar 2017
Get This Now


How to Find the Best DDoS Attack Prevention and Detection Tools
sponsored by SearchSecurity.com
EBOOK:In this handbook, one expert reveals how to select tools that will best strengthen your defense against DDoS attacks. Uncover 4 key questions to ask as you begin your DDoS defense strategy.
Posted: 10 Apr 2017 | Published: 05 Apr 2017
Get This Now


The Evolving Role of Managed Security Service Providers
sponsored by SearchSecurity.com
EZINE:In this issue of Information Security, we look at the evolution of the managed security provider and why services are the fastest-growing part of security.
Posted: 03 Apr 2017 | Published: 03 Apr 2017
Get This Now


Artificial Intelligence and Machine Learning: Cybersecurity Advances
sponsored by SearchSecurity.com
EZINE:In this issue of Information Security magazine, we look at machine learning in security and how recent advances may bolster your defenses.
Posted: 01 Mar 2017 | Published: 01 Mar 2017
Get This Now


Get Smart About Threat Intel Tools and Services
sponsored by SearchSecurity.com
EBOOK:Learn how threat intelligence tools can improve enterprise security and where they should fit into the broader security scheme.
Posted: 27 Feb 2017 | Published: 20 Feb 2017
Get This Now


Crafting an Insider Threat Program: Why and How
sponsored by SearchSecurity.com
EBOOK:Tackling IT threats is even harder when the breach -- malicious or inadvertent -- originates in the company. Learn how to handle insider threats.
Posted: 23 Jan 2017 | Published: 20 Jan 2017
Get This Now


1 - 25 of 652 Matches
Page: 2 3 4 5 6 7 8 9 10 11 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement