All resources sponsored by:

SearchSecurity.com

1 - 25 of 637 Matches
Dedicated to Information Security: The High-Stakes Role of the CISO
sponsored by SearchSecurity.com
EZINE:Almost 20 years into its existence, the CISO job is still open to discussion. In this issue of Information Security, we look at the role's elevation and influence on broader security initiatives, plus challenges of the job and the changes ahead.
Posted: 01 Dec 2016 | Published: 01 Dec 2016
Get This Now


What to Look for in Incident Response Management Tools
sponsored by SearchSecurity.com
EBOOK:Breaches are inevitable, so an effective incident response toolkit is essential. Learn the current and coming requirements for IR tools and what features are most vital.
Posted: 29 Nov 2016 | Published: 29 Nov 2016
Get This Now


Why DevOps + Security = A Bright Idea
sponsored by SearchSecurity.com
EBOOK:By combining DevOps and security, software developers will be able to produce more secure applications and infrastructures.
Posted: 22 Nov 2016 | Published: 18 Nov 2016
Get This Now


Security Analytics: Searching for Meaning
sponsored by SearchSecurity.com
EBOOK:This expert e-guide helps clarify how advanced security analysis differs from the threat assessments of the past. Access now for a deeper understanding of how advanced security analytics works and how it can best be used in your organization.
Posted: 21 Nov 2016 | Published: 21 Nov 2016
Get This Now


Minimizing Cyber Risk with Better Threat Detection and Incident Response
sponsored by SearchSecurity.com
EZINE:The security incident response process must cope with an increasingly constant onslaught of attacks. Learn how to automate and better collaborate your company incident response.
Posted: 16 Nov 2016 | Published: 11 Nov 2016
Get This Now


CW ASEAN November 2016
sponsored by SearchSecurity.com
EZINE:Small businesses in the ASEAN region could unknowingly be allowing hackers to access large corporate networks.
Posted: 01 Nov 2016 | Published: 31 Oct 2016
Get This Now


CW ANZ November 2016
sponsored by SearchSecurity.com
EZINE:With the number of cyber incidents identified by Australian organisations more than doubling in the past year, PwC is using an online game to give enterprises first-hand experience of what it means to face a cyber attack.
Posted: 01 Nov 2016 | Published: 31 Oct 2016
Get This Now


Straddling the Security Divide Between On-Premises and Cloud
sponsored by SearchSecurity.com
EZINE:Legacy security tools designed for data centers don't work well in cloud infrastructures. We help you conquer the divide between on-premises and cloud security in this issue of Information Security.
Posted: 01 Nov 2016 | Published: 01 Nov 2016
Get This Now


Are You Ready for RASP?
sponsored by SearchSecurity.com
EBOOK:This runtime application self-protection handbook covers the basics and offers advice on RASP implementation for IT security professionals.
Posted: 24 Oct 2016 | Published: 21 Oct 2016
Get This Now


Put Endpoint Security in Capable Hands
sponsored by SearchSecurity.com
EBOOK:Endpoint security threat prevention is a critical enterprise IT concern. Learn the latest on keeping endpoints secure.
Posted: 20 Oct 2016 | Published: 20 Oct 2016
Get This Now


From IoT to IDoT: Securing the Identity of Things
sponsored by SearchSecurity.com
EZINE:With devices seeping into everyday work life, the danger to businesses has increased, and companies should worry about who is bringing what into the workplace and which corporate devices pose risks. In this issue of Information Security, we discuss the Identity of Things problem, and how you can solve it.
Posted: 03 Oct 2016 | Published: 03 Oct 2016
Get This Now


What to Look for in Web Fraud Detection Systems
sponsored by SearchSecurity.com
EBOOK:In this TechTarget Buyer's Guide readers will learn the key features of a Web fraud detection product and how to choose the best product for their company.
Posted: 28 Sep 2016 | Published: 23 Mar 2016
Get This Now


Next-Gen Autentication
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT:This Security classroom explores the latest in authentication methods and technologies.
Posted: 23 Sep 2016 | Premiered: 15 Sep 2016
Get This Now


Say Hello, Again, to SIEM
sponsored by SearchSecurity.com
EBOOK:SIEM products are ever-changing technologies. Here's what you need to know now about security information and event management tools.
Posted: 22 Sep 2016 | Published: 31 Aug 2016
Get This Now


A Certified Concern
sponsored by SearchSecurity.com
EBOOK:Can that CA be trusted? Certificate authority risks are many, but since there's no avoiding SSL and TLS, at least for now. Here's how to increase CA security.
Posted: 21 Sep 2016 | Published: 20 Sep 2016
Get This Now


5 Steps to Raising Ransomware Resistance
sponsored by SearchSecurity.com
EBOOK:This TechGuide explores the nature of the threat and the latest ransomware trends. It outlines several steps information security pros should take in order to heighten their organization's resistance and prevent ransomware attacks.
Posted: 16 Sep 2016 | Published: 16 Sep 2016
Get This Now


Cloud Services Take Off, GRC Doesn't
sponsored by SearchSecurity.com
EZINE:The ability for organizations to implement cloud governance models is increasingly challenged by the proliferating use of services by business units and workgroups. This issue of Information Security shares tips on gaining more insight when employees are migrating critical apps and data to the cloud.
Posted: 01 Sep 2016 | Published: 01 Sep 2016
Get This Now


Say Hello, Again, to SIEM
sponsored by SearchSecurity.com
EBOOK:SIEM products are ever-changing technologies. Here's what you need to know now about security information and event management tools.
Posted: 31 Aug 2016 | Published: 31 Aug 2016
Get This Now


Securing DevOps
sponsored by SearchSecurity.com
EZINE:In this issue of Information Security, adopters of DevOps and security, or DevSecOps, share tips on how to defend the cloud's continuous improvement model.
Posted: 01 Aug 2016 | Published: 01 Aug 2016
Get This Now


Time to Toughen Up for IoT
sponsored by SearchSecurity.com
EBOOK:This 3-part guide is filled with best practices for Internet-enabled device security, looking at such things as raising awareness of potential security threats wrought by IoT and how to test your defenses in the IoT era.
Posted: 26 Jul 2016 | Published: 20 Jul 2016
Get This Now


Behavioral threat analytics
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT:This school examines the kinds of products that fit into the real-time behavioral threat analytics approach to security and what we know so far about deploying them successfully.
Posted: 20 Jul 2016 | Premiered: 15 Jul 2016
Get This Now


Is UTM Ready for the Big Leagues?
sponsored by SearchSecurity.com
EBOOK:This Technical Guide reviews advanced UTM and what elements make for a truly enterprise-class UTM device.
Posted: 11 Jul 2016 | Published: 11 Jul 2016
Get This Now


Time for an IAM Overhaul
sponsored by SearchSecurity.com
EBOOK:IAM security policies must take into account the latest technology developments, especially cloud and the Internet of Things. Access this three-part technical guide to gain valuable information on IAM strategy in the face of rapidly evolving technology.
Posted: 19 Aug 2016 | Published: 19 Aug 2016
Get This Now


Buff Up Your Web Apps
sponsored by SearchSecurity.com
EZINE:Secure web apps are essential to modern business. Learn what security risks they present and get our experts' advice on how to overcome them.
Posted: 10 Aug 2016 | Published: 10 Aug 2016
Get This Now


Time to Toughen Up for IoT
sponsored by SearchSecurity.com
EBOOK:The list of internet of things challenges is not short, but security is still a top concern. Learn to cut risks and follow IoT security best practices.
Posted: 19 Jul 2016 | Published: 20 Jul 2016
Get This Now


1 - 25 of 637 Matches
Page: 2 3 4 5 6 7 8 9 10 11 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement