All resources sponsored by:

SearchSecurity.com

1 - 25 of 607 Matches
Monitoring that Cloudy Network
sponsored by SearchSecurity.com
EBOOK:Security pros using continuous security monitoring techniques can learn from federal programs, but must also keep up with technical advances like hybrid cloud.
Posted: 02 Feb 2016 | Published: 29 Jan 2016
Get This Now


Under Attack? 2016 Defenses Escape Compromise
sponsored by SearchSecurity.com
EZINE:In this issue of Information Security magazine, we look at security attack techniques and talk to top security researchers about enterprise threats in 2016.
Posted: 01 Feb 2016 | Published: 01 Feb 2016
Get This Now


Threat intelligence
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT:This security school looks at what a threat intel service can and cannot provide and discusses the status of the new(ish) standards for intelligence exchange.
Posted: 20 Jan 2016 | Premiered: 15 Jan 2016
Get This Now


What to Look for in Multifactor Authentication Tools
sponsored by SearchSecurity.com
EBOOK:In our threat-laden environment, multifactor authentication tools are a critical defense. Learn the latest about MFA technology, how to compare MFA tools and select the right product for your organization.
Posted: 05 Jan 2016 | Published: 05 Jan 2016
Get This Now

TOPICS:  Authentication

Threat Monitoring in Tough Times
sponsored by SearchSecurity.com
EBOOK:Threat monitoring today is tough. The bad guys move fast and hide well. Learn the latest tactics for keeping systems safe.
Posted: 23 Dec 2015 | Published: 15 Dec 2015
Get This Now


Resolve to Revitalize Your SIEM Security
sponsored by SearchSecurity.com
EBOOK:This expert guide explores some of the latest developments in SIEM technology and how you can best take advantage of them.
Posted: 15 Dec 2015 | Published: 15 Dec 2015
Get This Now


Strategies for IT security suites
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT:Purchasing a suite of IT security tools can be convenient, but may result in functional overlap and other problems. Learn how to make security suites work for you.
Posted: 10 Dec 2015 | Premiered: 06 Dec 2015
Get This Now


Swiss Army Knife Security? How to Vet Integrated Tool Sets
sponsored by SearchSecurity.com
EZINE:In this issue of Information Security magazine, we look at the changing delivery models for cybersecurity tools as more vendors offer multi-tool platforms and services. Let us help you make sense of it all with advice on tool consolidation.
Posted: 02 Dec 2015 | Published: 02 Dec 2015
Get This Now


API Security Now
sponsored by SearchSecurity.com
EBOOK:Secure APIs are possible but not easy. This guide outlines the source for security risks with application program interfaces, and how to eliminate them.
Posted: 16 Nov 2015 | Published: 16 Nov 2015
Get This Now


Hybrid Cloud Security Expert Best Practices
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT:The cloud-based security services market is booming, as enterprises adopt email, Web security, and identity and access management SaaS. How can CISOs best combine cloud-based security controls with on-premises security programs? This supercast looks at the latest cloud security services and best practices.
Posted: 24 Sep 2015 | Premiered: 17 Sep 2015
Get This Now


Enhance your Enterprise's IAM
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT:This virtual environment explores how you can implement advanced IAM to prevent hacks from coming through third-party vendors and other vulnerable spots.
Posted: 02 Sep 2015 | Premiered: 24 Aug 2015
Get This Now


Realign your data protection efforts
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT:David Sherry explains how your organization should react to the shift of organized online criminals from coveting credit card numbers to identity information and how to re-prioritize your efforts in protecting your organization.
Posted: 06 Aug 2015 | Premiered: 20 Jul 2015
Get This Now


Security School: Effective Analyze SIEM Data
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT:Achieving the promise of SIEM is a matter of understanding the technology, and this webcast series will help you do so. Watch these interesting presentations from a leading security expert to learn all you need to know to make SIEM work for you.
Posted: 04 Aug 2015 | Premiered: 10 May 2013
Get This Now


What to Look for in Email Security Gateways
sponsored by SearchSecurity.com
EBOOK:In order to protect your BYOD workforce, you need email security gateways (ESGs.) Access this guide to learn the basics of ESGs, and identify which capabilities you need as you plan your adoption.
Posted: 01 Jul 2015 | Published: 01 Jul 2015
Get This Now

TOPICS:  Email Security

"Hacking as a Service," and Other Emerging Threats
sponsored by SearchSecurity.com
EZINE:Lethal threats to enterprise security are emerging from every which way. Access this exclusive edition of Information Security Magazine to learn just what you're up against.
Posted: 12 Oct 2015 | Published: 12 Oct 2015
Get This Now


What to Look for in Vulnerability Management
sponsored by SearchSecurity.com
EBOOK:This Buyer's Essentials guides InfoSec pros in the assessment and purchase of vulnerability management tools. It explains how they work and highlights key features corporate buyers should look for.
Posted: 07 Oct 2015 | Published: 07 Oct 2015
Get This Now

TOPICS:  Security

Endpoint Security in this Interconnected Age
sponsored by SearchSecurity.com
EBOOK:In this era of advanced exploit kits, state-sponsored hacking and worse, what's your best endpoint security strategy?
Posted: 07 Oct 2015 | Published: 07 Oct 2015
Get This Now

TOPICS:  Security

Information Security Magazine: October Issue
sponsored by SearchSecurity.com
EZINE:In this issue of Information Security magazine, we look at the shared responsibility model between organizations and service providers to protect data in the cloud.
Posted: 01 Oct 2015 | Published: 01 Oct 2015
Get This Now


Global Threats and an Intelligent Response
sponsored by SearchSecurity.com
EBOOK:In today's world of multipronged, global threats, a global threat intelligence service is becoming essential to enterprise security strategy.
Posted: 16 Sep 2015 | Published: 16 Sep 2015
Get This Now


Endpoint Security: Beyond Antivirus
sponsored by SearchSecurity.com
EBOOK:In this e-book, security experts share tips on endpoint security that moves beyond outdated signature-based tools.
Posted: 10 Sep 2015 | Published: 10 Sep 2015
Get This Now


Hybrid Cloud Security Is No Castle in the Air
sponsored by SearchSecurity.com
EZINE:In this issue of Information Security magazine, we look at hybrid cloud security and five strategies that CIOs have used to secure these environments.
Posted: 01 Sep 2015 | Published: 01 Sep 2015
Get This Now

TOPICS:  Security

What to Look For in a Web Application Scanner
sponsored by SearchSecurity.com
EBOOK:With so many Web applications on enterprise networks today, a scanner is essential to security. Here's what you need to know if you're in the market for a Web app scanner.
Posted: 18 Aug 2015 | Published: 18 Aug 2015
Get This Now


Protecting Data on the Go
sponsored by SearchSecurity.com
EBOOK:This guide informs InfoSec pros on the risks to business data carried on or accessed by employees' mobile devices and the best available protections for this business data on the go.
Posted: 18 Aug 2015 | Published: 18 Aug 2015
Get This Now


Information Security Magazine: August Issue
sponsored by SearchSecurity.com
EZINE:Identity and access management is so complex that many companies have faltered when it comes to securing third-party vendors. With breaches on the rise, vulnerabilities can be costly.
Posted: 03 Aug 2015 | Published: 03 Aug 2015
Get This Now


The Problem with the Padlock
sponsored by SearchSecurity.com
EBOOK:TLS/SSL is no longer a Web security cornerstone. While the industry responds to its vulnerabilities, with TLS 1.3, learn what else you must do to keep your connections secure.
Posted: 16 Jul 2015 | Published: 16 Jul 2015
Get This Now


1 - 25 of 607 Matches
Page: 2 3 4 5 6 7 8 9 10 11 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement