IT Management  >   Systems Operations  >   Security  >  

Computer Security Management

RSS Feed    Add to Google    Add to My Yahoo!
Computer Security Management Reports
 
UK 2015 Cyber Risk Survey Report
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Many UK firms are failing to adequately assess their customers and trading partners for cyber risk, Marsh's UK Cyber Risk Survey reveals.
Posted: 23 Jun 2015 | Published: 23 Jun 2015

ComputerWeekly.com

Balancing Security and User Experience: A Day in the Life of the Mobile Worker
sponsored by Pulse Secure
WHITE PAPER: Access this white paper to learn how to balance IT's difficulties with managing mobile security and the need to deliver a seamless mobile user experience.
Posted: 10 Jun 2015 | Published: 29 Aug 2014

Pulse Secure

Uncover Advanced Attacks and Detect Hidden Breaches
sponsored by Hewlett-Packard Limited
WHITE PAPER: In this white paper, discover how you can gain greater visibility into the state of both active and live threats hidden within your network.
Posted: 22 May 2015 | Published: 30 Apr 2015

Hewlett-Packard Limited

Endpoint Security and Best Practices for Detecting Malware
sponsored by Malwarebytes Corporation
EGUIDE: In this e-guide, you can find essential tips for adapting your endpoint security to the mobile workforce, and for protecting against hidden malware.
Posted: 12 Jun 2015 | Published: 12 Jun 2015


Fake SSL Certificates Enable Variety of Security Threats
sponsored by Blue Coat Systems
EGUIDE: Access this expert guide to learn everything you need to know about the growing vulnerability of digital certificates that underpin trust and security on corporate and consumer network as cyber criminals use man-in-the-middle and DNS attacks.
Posted: 10 Jun 2015 | Published: 10 Jun 2015

Blue Coat Systems

15 SIEM Products Analyzed and Reviewed
sponsored by IBM
WHITE PAPER: This resource objectively evaluates fifteen SIEM technologies and provides you with a detailed report of each one.
Posted: 24 Jun 2015 | Published: 25 Jun 2014

IBM

Keep Yourself Secure from Growing Cyber-Threats
sponsored by Hewlett-Packard Limited
WHITE PAPER: In this infographic, discover what you can do to stay safe in an increasingly dangerous cyber landscape, including increasing proactivity in your security strategy and partnering with security services.
Posted: 21 May 2015 | Published: 21 May 2015

Hewlett-Packard Limited

Advanced Persistent Threat Detection and How to Prevent Drive-By Download Attacks
sponsored by Malwarebytes Corporation
EGUIDE: This e-guide explains what you can do to detect and stop even the most advanced threats.
Posted: 12 Jun 2015 | Published: 12 Jun 2015


Determining the Right Mobile Security Solution for Your Organization
sponsored by IBM
WHITE PAPER: This helpful white paper presents the steps every organization should take before committing to a mobile security solution, and examines the pros and cons of different potential security strategies.
Posted: 06 Jul 2015 | Published: 07 Aug 2014

IBM

Best Practices for Mobile Application Lifecycle Management
sponsored by IBM
WHITE PAPER: Access this white paper to learn the best practices for secure MALM. Don't leave your enterprise app store vulnerable to attacks.
Posted: 06 Jul 2015 | Published: 26 Dec 2014

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement