IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Information Security Policies

RSS Feed    Add to Google    Add to My Yahoo!
Information Security Policies White Papers (View All Report Types)
 
Quantifying the Risk and Economic Impact of Bad Bots
sponsored by Distil Networks
WHITE PAPER: Learn how to mitigate the threat of bad bots to your enterprise's sites. Discover vital information on issues faced by sites due to bad bots, such as web scraping, security breaches, spam, skewed analytics, and more.
Posted: 26 Aug 2016 | Published: 26 Aug 2016

Distil Networks

A Guide for Building PCI DSS & HIPAA Compliant Businesses in the Cloud
sponsored by ThreatStack
WHITE PAPER: Where do you begin your cloud compliance journey? In this guide, learn to better understand the complexities of cloud compliance requirements, without all the headaches and confusion. Uncover how compliance differs in the cloud, why security monitoring is critical to achieving compliance, and more.
Posted: 01 Nov 2016 | Published: 01 Nov 2016

ThreatStack

How to Secure Your Mainframes in Today's Threat Landscape
sponsored by Thycotic
WHITE PAPER: Discover modern mainframe security best practices and how to protect yours from today's threats and developments such as the loss of skilled mainframe administrators and compliance requirements and the difficulty of auditing the mainframe environment.
Posted: 27 Jan 2017 | Published: 27 Jan 2017

Thycotic

Web Application Firewall: Delivering Must-Have Protection for the Modern Enterprise
sponsored by Citrix
WHITE PAPER: To thoroughly protect numerous web properties, you need to supplement basic network security and firewall solutions with web application firewall tools. Learn what's currently available as essential components for web protection.
Posted: 16 Dec 2016 | Published: 16 Dec 2016

Citrix

Confronting Enterprise Security Risk: The State of Incident Response
sponsored by ServiceNow
WHITE PAPER: In this infographic, uncover research from ESG on the major causes of delays in incident response times and how to effectively counteract them, best practices to improve incident response, and more.
Posted: 30 Jan 2017 | Published: 30 Jan 2017

ServiceNow

Anatomy of a Whaling Attack: Protecting Your Organization from CEO Email Scams
sponsored by Mimecast North America
WHITE PAPER: Learn the anatomy of a whaling attack – an email scam that can threaten every member of your enterprise, from entry-level to the C-suite. Download this e-book now and learn 6 ways to defend against this potentially crippling attack.
Posted: 03 Jan 2017 | Published: 03 Jan 2017

Mimecast North America

Five Tactics to Stop Email Attacks
sponsored by Mimecast North America
WHITE PAPER: Access this resource now to get a breakdown of traditional phishing, spear-phishing, and whaling, and uncover 5 tips to help you prevent this email fraud.
Posted: 03 Jan 2017 | Published: 03 Jan 2017

Mimecast North America

Vendor Risk Management Checklist
sponsored by ModoModo
WHITE PAPER: As outsourcing becomes the norm with more and more aspects of an enterprise's operations managed by third parties, these organizations expose themselves to a growing amount of shared risk. The following checklist can serve as a guide to help your organization mitigate vendor risk.
Posted: 13 Feb 2017 | Published: 13 Feb 2017

ModoModo

Mobile Security Checklist: Top Ten Threats to Your Enterprise Today
sponsored by BlackBerry
WHITE PAPER: Access this white paper to find an overview of the key issues you need to be on top of right now to protect your organization, its employees and its customers.
Posted: 19 Dec 2016 | Published: 19 Dec 2016

BlackBerry

Fragmentation: The "Silent Killer" of Your Security Management Program
sponsored by ThreatConnect
WHITE PAPER: Look at the issues caused by security fragmentation and uncover a path towards enhanced security through better unity, one that cuts the detection deficit with a cohesive, intelligent defense.
Posted: 19 Oct 2016 | Published: 30 Sep 2016

ThreatConnect
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement