IT Agents  >   IT Workforce  >   Information Technology Professionals  >   IT Managers  >  

IT Security Managers

RSS Feed    Add to Google    Add to My Yahoo!
IT Security Managers Reports
 
8 Security Issues to Avoid in Mobile App Development
sponsored by Kony
WHITE PAPER: This resource divulges the top 8 security issues that app developers need to watch in order to protect their users from phishing, malware, and more.
Posted: 22 Jul 2015 | Published: 22 Jul 2015

Kony

2016 Report on Security in the Hospitality Industry
sponsored by Verizon
RESEARCH CONTENT: Learn about the network security vulnerabilities facing the hospitality industry in 2016. By identifying which issues are most prevalent in your industry, you'll have a head start in heading them off in your own enterprise.
Posted: 08 Jun 2016 | Published: 08 Jun 2016

Verizon

Can New Security Tools Keep Your Network Clean?
sponsored by SearchSecurity.com
EZINE: This issue provides network and security IT pros with step-by-step guidance so they can decide what advanced security monitoring tools are right for their network's particular needs.
Posted: 01 Jul 2015 | Published: 01 Jul 2015

SearchSecurity.com

Security without Limits: Extending Enterprise-Grade Security from your Data Center to the Cloud
sponsored by Unisys
WHITE PAPER: Need the ability to quickly and securely shift workloads back forth between the data center and the cloud? Access this white paper and discover ways cryptographic micro-segmentation can seamlessly protect data center workloads against unauthorized access.
Posted: 16 May 2016 | Published: 16 May 2016

Unisys

Windows Security Management: What's New in Windows 10
sponsored by LogRhythm, Inc.
WHITE PAPER: In this white paper, you'll explore how new auditing and logging capabilities in Windows 10 give IT visibility into potential threats. Uncover ways to thwart threat actors by scoping user privileges, logging on with additional credentials, and more.
Posted: 07 Mar 2016 | Published: 29 Jan 2016

LogRhythm, Inc.

Value of Security Analytics & Anomaly Detection
sponsored by Prelert
RESEARCH CONTENT: In this infographic you will find the results of an EMA research report, digested for easy consumption and action.
Posted: 04 Jun 2015 | Published: 04 Jun 2015

Prelert

The Impact of Spear Phishing: Enterprise Survey Findings
sponsored by Cloudmark
VIDEO: In this informative video, you'll hear from cyber security expert Morgan Wright and Cloudmark's SVP of engineering Leon Rishniw as they discuss the impacts of spear phishing. Tune in for details on how you can defend the enterprise against this expanding threat.
Posted: 22 Jan 2016 | Premiered: 13 Jan 2016

Cloudmark

Advanced Security through Micro-segmentation and Cryptographic Cloaking for Highly Sensitive Data, Networks, and Systems
sponsored by Unisys
WHITE PAPER: Traditional network security hardware and software are becoming less effective and increasingly susceptible to advanced threats. Discover a different approach to mitigating risks by securing data-in-motion across any public or private network.
Posted: 13 May 2016 | Published: 13 May 2016

Unisys

Report: Modern Threat Intelligence
sponsored by IBM
WHITE PAPER: The complexities of doing business at scale, both strategic and technical, create barriers in preventing breaches. Uncover ways to focus on user education and systematic protocols for operating a strong risk assessment program, allowing you to overcome these barriers.
Posted: 15 Mar 2016 | Published: 29 Feb 2016

IBM

How One Airborne Wi-Fi Provider Issued Fake Google SSL Certificates, and Faced the Consequences
sponsored by Symantec Website Security
EGUIDE: This e-guide features a case study on how Gogo LLC issued fake Google SSL certificates. Learn how this incident caused ripples in the security industry, and uncover ways some vendors are increasingly observing encrypted traffic.
Posted: 09 Feb 2016 | Published: 04 Feb 2016

Symantec Website Security
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement