IT Management  >   Systems Operations  >   Security  >  

Cyber Security

RSS Feed    Add to Google    Add to My Yahoo!
Cyber Security Reports
 
Rules of Engagement: A Call to Action to Automate Breach Response
sponsored by ServiceNow
RESEARCH CONTENT: This Forester Research report analyzes cybersecurity attacks to provide you with insight on how to address these problems and prevent future attacks.
Posted: 01 Sep 2017 | Published: 03 Aug 2016

ServiceNow

How to Enhance AWS Security
sponsored by Splunk
WHITE PAPER: Here, you'll uncover guidance on enhancing AWS platform security, to quell data protection concerns. Access now to see how AWS can deliver top-notch security, as well as facilitate an adaptive environment armed with the actionable insights needed to help thwart and prevent future threats.
Posted: 30 Aug 2017 | Published: 28 Jul 2017

Splunk

Security Orchestration and Micro-Segmentation for Public and Private Cloud
sponsored by Cloudvisory
WHITE PAPER: According to Gartner, misconfiguration and mistakes are the leading causes of operations incidents and successful security attacks. Explore this white paper to uncover a cloud security platform that can provide you with protection your organization lacks.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

Cloudvisory

Web Security: Now What?
sponsored by SearchSecurity.com
EZINE: In this handbook, experts dive into the ongoing issues related to TLS security and HTTPS inspection. Uncover more about the journey of computer worms and how they play a role in advanced persistent threats.
Posted: 01 Sep 2017 | Published: 01 Sep 2017

SearchSecurity.com

IT Security and the Devops Environment
sponsored by CyberArk Software, Inc
WEBCAST: Watch this webcast to reveal how to improve application and infrastructure security and to engage in methods of delivering security that don't interrupt the fast flow and time to delivery.
Posted: 19 Sep 2017 | Premiered: Sep 19, 2017

CyberArk Software, Inc

Armor Complete's Intelligent Security Model: A Closed-loop System that Actively Learns how to Combat Threats
sponsored by Armor
WHITE PAPER: In this white paper, discover how an Intelligent Security Model (ISM) delivers a high level of security and compliance while actively learning how to combat threats.
Posted: 05 Sep 2017 | Published: 05 Sep 2017

Armor

16 Ways to Protect your Cloud from Ransomware
sponsored by evident.io
EBOOK: Read this e-book to uncover 16 steps your organization can take to protect your cloud from ransomware.
Posted: 19 Sep 2017 | Published: 19 Sep 2017

evident.io

How to Think like a Hacker to Stop Application Security Threats
sponsored by IBM
EGUIDE: Find out how applying the hacker mindset when setting application security standards can help uncover flaws that vulnerability scanners might not recognize.
Posted: 19 Sep 2017 | Published: 19 Sep 2017

IBM

Government IT strategy & challenges in Australia
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, you can read more about the challenges that Australia's government is facing in bringing the country's national fibre network up to speed, its plans to push ahead with decryption laws and what it is doing to safeguard critical infrastructure from cyber-attacks.
Posted: 30 Aug 2017 | Published: 30 Aug 2017

ComputerWeekly.com

Changing Password Behavior with Real Data
sponsored by LogMeIn, Inc.
WHITE PAPER: Check out this case study to learn about how Matt Shafer, IT Manager at Informz, overcame the issue of an open sharing password platform by implementing a password security posture that allows team leaders to centrally control shared passwords.
Posted: 06 Sep 2017 | Published: 06 Sep 2017

LogMeIn, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement