IT Agents  >   IT Workforce  >   Executive Management  >  

CISO

RSS Feed    Add to Google    Add to My Yahoo!
CISO Reports
 
The Identity Imperative in the Cloud
sponsored by Symantec Corporation
WHITE PAPER: Read this white paper to discover the importance of identity management in the cloud and to learn how you can maintain security despite the rapidly disappearing network perimeter.
Posted: 16 Jul 2015 | Published: 31 Mar 2015

Symantec Corporation

What CISOs Need to Know About Cloud Computing
sponsored by CloudPassage
WHITE PAPER: Access this informative resource to identify the key differences between cloud computing and traditional infrastructure for security professionals. Find out where to focus security efforts and how the cloud provides opportunities for security improvement.
Posted: 03 Sep 2014 | Published: 06 Jan 2014

CloudPassage

CW Buyer's Guide: Data Security
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This in-depth buyer's guide offers advice to CISOs on keeping up with security best practice as new EU data protection rules come into force
Posted: 14 Sep 2012 | Published: 05 Apr 2012

ComputerWeekly.com

Connecting the Server Room to the Board Room
sponsored by SurfWatch Labs
VIDEO: This video describes how an effective security intelligence application can help executives understand the security risks their business faces.
Posted: 13 Jul 2015 | Premiered: 10 Apr 2015

SurfWatch Labs

A strong information security program is a competitive gain, not just a cost
sponsored by Hewlett-Packard Company
EGUIDE: This e-guide discusses why good cybersecurity can win you more customers and gives you tips for getting the most return on your security investments.
Posted: 03 Jun 2015 | Published: 03 Jun 2015

Hewlett-Packard Company

Change is the Enemy of Security and Compliance: 10 Questions You Should Ask Yourself about Changes to Your Network
sponsored by nCircle
WHITE PAPER: Read this white paper to learn 10 ways that enterprise environments typically change and what you can do to identify, analyze and manage these changes and their associated risks on an ongoing basis.
Posted: 16 Mar 2009 | Published: 02 Mar 2009

nCircle

How Secure is your sudo? - The Good, the Bad, and the Ugly of Privileged Identity Management (PIM)
sponsored by BeyondTrust Corporation
WHITE PAPER: This white paper will illustrate certain positive situations where open source solutions like sudo often work in smaller scale enterprises. However, this white paper will also spotlight red flags that relate to larger companies or companies experiencing significant IT growth. Read this paper to learn more.
Posted: 21 May 2010 | Published: 20 May 2010

BeyondTrust Corporation

Information Security and Multi-Compliance: Avoiding Audit Fatigue with a Single IT Compliance Strategy
sponsored by Tripwire, Inc.
WHITE PAPER: This Prescriptive Guide provides nine steps that information security managers can use to break the compli­ance blame cycle and build an information security program that more effectively mitigates security risk. Read on to learn more.
Posted: 13 May 2010 | Published: 13 May 2010

Tripwire, Inc.

Cloud Security: Enterprise Point of View
sponsored by Dimension Data
VIRTUAL SEMINAR: Access this webcast today to listen as Darren O'Loughlin, CSO for Dimension Data's global business enabling IT as a Service, shares strategic objectives for securing applications and workloads on an enterprise-class cloud.
Posted: 29 Jan 2015 | Premiered: 26 Nov 2014

Dimension Data

Information Security Magazine, January 2009: Look Who's Coming to Dinner--the Security Steering Committee
sponsored by Information Security Magazine
EZINE: This special issue of Information Security Magazine explains the ins and outs of security steering committees. Learn who needs to be there, why they need to be there, what they need to be doing, and how to help them do it.
Posted: 07 May 2009 | Published: 01 Jan 2009

Information Security Magazine
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement