IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Information Security Policies

RSS Feed    Add to Google    Add to My Yahoo!
Information Security Policies Reports
 
Stop The Breach: Reduce The Likelihood Of An Attack Through An IAM Maturity Model
sponsored by Centrify Corporation
RESEARCH CONTENT: Forrester Research investigated the connection between increased adoption of identity and access management (IAM) best practices and reducing the likelihood of experiencing a security breach. Uncover their key findings to learn more about the efficacy of different IAM approaches and technologies.
Posted: 28 Jun 2017 | Published: 28 Feb 2017

Centrify Corporation

Insuring the uninsurable: Is cyber insurance worth its salt?
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This article in our Royal Holloway Information Security Thesis series discusses the risks and benefits of cyber insurance and outlines steps businesses can take to make better informed risk mitigation decisions.
Posted: 12 Sep 2017 | Published: 12 Sep 2017

ComputerWeekly.com

How Should Companies Across the Globe Prepare for EU GDPR Compliance?
sponsored by Commvault
EGUIDE: As the GDPR deadline looms, companies across the globe are hurrying to get into compliance. In this expert guide, learn how US based companies are doing when it comes to getting in-line with the GDPR, compared to European countries and the rest of the world. Then, find out what you can do to help speed your organization along the road to compliance
Posted: 30 Aug 2017 | Published: 21 Aug 2017

Commvault

2017 Global Security Report
sponsored by Trustwave
RESEARCH CONTENT: The reactive information security paradigm of 10 years ago can no longer defend against the virtual and connected threats of today. In this global cyber security report, read about the current state of IT security and how it fares against evolving threats from hackers and cybercriminals.
Posted: 16 Aug 2017 | Published: 16 Aug 2017

Trustwave

We Need to Talk About Cybersecurity: Moving on from the "Ad Hoc" Stage
sponsored by Dell SecureWorks
WHITE PAPER: Simply dealing with problems as they arise isn't enough – to keep your organization truly protected you need a cybersecurity plan. Learn 5 steps to developing your own cyber-business risk model.
Posted: 21 Jul 2017 | Published: 21 Jul 2017

Dell SecureWorks

Secure Coding Practices: Avoid SQL Injection
sponsored by WhiteHat Security
WEBCAST: SQL injections are one of the most common web-based attacks that have the potential to destroy key databases. Watch this webcast to learn more about SQL injections, how attackers execute them in different coding languages like Java and C#, and how best to defend against them.
Posted: 26 Jul 2017 | Premiered: Dec 31, 2016

WhiteHat Security

CW ANZ – July 2017: Cyber security plan bears fruit
sponsored by ComputerWeekly.com
EZINE: Australia's Cyber Security Strategy has made significant headway over the past year, but the jury is still out on its long-term impact. In this month's CW ANZ, we take a look at the progress of Australia's national cyber security blueprint and what else needs to be done to better protect Australia's interests in the global cyber security landscape.
Posted: 13 Jul 2017 | Published: 13 Jul 2017

ComputerWeekly.com

The Rise Of The Secure Internet Gateway
sponsored by Cisco Umbrella
WHITE PAPER: The integration of cloud apps into the everyday business environment has made securing web access more difficult than ever. Click inside to find out how a Secure Internet Gateway (SIG), can help modern businesses secure user information across public and private cloud environments.
Posted: 24 Jul 2017 | Published: 24 Jul 2017

Cisco Umbrella

How To Securely Configure A Linux Host To Run Containers
sponsored by Twistlock, Inc.
WHITE PAPER: Discover how to update traditional security for containerized, microservices-based app development by learning how to securely configure a Linux host to run Docker containers.
Posted: 21 Jul 2017 | Published: 21 Jul 2017


It Vs. Users? How Law Firms Can Maximize Security While Granting Access To The Web
sponsored by Authentic8, Inc.
WHITE PAPER: Discover how to maximize network and endpoint security while still granting the web access employees need to stay productive, with a particular focus on the role of security in law firms. Learn how to go beyond virtualization to secure web access and use Silo to create secure, cloud-based virtual browsers.
Posted: 28 Jul 2017 | Published: 31 Dec 2016

Authentic8, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement