IT Management  >   Systems Operations  >   Security  >  

Information Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Infosecurity
DEFINITION: COBIT (Control Objectives for Information and Related Technology) is an international open standard that defines requirements for the control and security of sensitive data and provides a reference framework. COBIT, which provides a reference framework, was introduced in the 1990s by the IT Governance Institute. Learn more about managing compliance at COBIT consists of an executive  … 
Definition continues below.
Information Security Reports
1 - 25 of 380 Matches Previous Page  |  Next Page
November ezine: An issue covering the latest techniques in selling security and what to pitch in Q4
sponsored by MicroScope
EZINE: In the wake of the TalkTalk hacking scandal it would be all too easy for the channel to use it to sell security, but that would be a mistake as customers want to hear more positive thoughts.
Posted: 11 Nov 2015 | Published: 11 Nov 2015


Expert Analysis: 2015's Top Security Information and Event Management Vendors Compared
sponsored by IBM
WHITE PAPER: The following Magic Quadrant white paper examines the top 13 security information and event management vendors. Inside, learn how each compares in terms of strengths, cautions, and more to get started on the right path to top-notch information security.
Posted: 05 Nov 2015 | Published: 05 Nov 2015


Data Privacy vs. Data Protection
sponsored by PEER 1
WHITE PAPER: Access this white paper to learn what specific privacy challenges "ease of access" brings with it. Learn how you can protect the sensitive data of e-government.
Posted: 02 Nov 2015 | Published: 02 Nov 2015


Raiders of the Lost File Shares: Defending Enterprise Data Against Destructive Malware
sponsored by BlackBerry
WHITE PAPER: Take a deep look at recent malware attacks against file sharing systems and potential countermeasures to thwart them. Learn how to achieve secure mobile file sharing and mitigate the risk of information loss.
Posted: 12 Oct 2015 | Published: 12 Oct 2015


Why InfoSec Needs Guarantees
sponsored by WhiteHat Security
WEBCAST: This webcast presents the argument that security platform vendors need to change the industry and begin to offer guarantees on security platforms. View now to learn why security guarantees will benefit the vendors as well as the organizations using them.
Posted: 01 Oct 2015 | Premiered: May 12, 2015

WhiteHat Security

End-to-End Defensible eDiscovery
sponsored by Zylab International, Inc.
WHITE PAPER: In this white paper, learn how you can condense eDiscovery processing to avoid data loss and legal consequences.
Posted: 29 Sep 2015 | Published: 05 Aug 2015

Zylab International, Inc.

IoT Security: A Hurdle to World of Connected Things
sponsored by Intel and IBM
EGUIDE: In this exclusive e-guide, find out what experts recommend to remain secure and compliant as IoT permeates everyday life.
Posted: 24 Sep 2015 | Published: 16 Sep 2015

Intel and IBM

Taking Control of Cloud Data: A Realistic Approach to Data Encryption
sponsored by Vaultive
WHITE PAPER: This paper outlines the new set of technical approaches for extending ownership and control for the computing model based on encryption in use, as well as distinguishes between evaluating the security and resiliency of the cloud service provider's environment.
Posted: 23 Sep 2015 | Published: 23 Sep 2015


Storing Data in the Cloud and Data Residency Laws: Irreconcilable Differences?
sponsored by Vaultive
WHITE PAPER: In this white paper, learn why data encryption may be the savior for data security and privacy in the cloud and what regulators are saying in response. Access this resource now to discover if data encryption can keep your organization safe from data breaches and enable you to take advantage of cloud computing benefits.
Posted: 22 Sep 2015 | Published: 20 Apr 2015


Bridging the Gap Between Legal & IT
sponsored by Zylab International, Inc.
WHITE PAPER: In this white paper, you'll learn how to bridge the gap between legal and IT departments and take eDiscovery out of the list of organizational burdens. Continue reading to learn the risks of ignoring eDiscovery shortcomings and what problems to anticipate for IT and legal departments.
Posted: 22 Sep 2015 | Published: 05 Aug 2015

Zylab International, Inc.

Cloud Security: Top Concerns and Ensuring Data Protection
sponsored by Intel and IBM
RESOURCE: This brief infographic presents the top cloud security concerns organizations are dealing with and examines how to protect data in the cloud.
Posted: 21 Sep 2015 | Published: 22 Jul 2015

Intel and IBM

Prevent your SaaS provider from Handing Over Your Data
sponsored by Vaultive
WHITE PAPER: In this handy white paper, you'll learn how to mitigate the risks of blind subpoenas. Read on now to uncover how to use encryption to make it unreadable to authorities without your permission.
Posted: 17 Sep 2015 | Published: 05 Aug 2015


Top 10 Reasons to Strengthen Information Security with App and Desktop Virtualization
sponsored by Citrix
WHITE PAPER: In this paper we explore ten reasons why desktop virtualization should be the foundation of your layered approach to information security.
Posted: 16 Sep 2015 | Published: 03 Dec 2013


Global Threats and an Intelligent Response
sponsored by
EBOOK: In today's world of multipronged, global threats, a global threat intelligence service is becoming essential to enterprise security strategy.
Posted: 16 Sep 2015 | Published: 16 Sep 2015

Analyst Report: Leaders in the Secure Information Sharing Market
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper takes your information sharing and collaboration concerns into account and provides an extensive review of the many products and vendors available.
Posted: 09 Sep 2015 | Published: 31 Jul 2015

IntraLinks, Inc

Realign your data protection efforts
sponsored by
VIRTUAL ENVIRONMENT: David Sherry explains how your organization should react to the shift of organized online criminals from coveting credit card numbers to identity information and how to re-prioritize your efforts in protecting your organization.
Posted: 06 Aug 2015 | Premiered: 20 Jul 2015

The Essential Guide for Threat Intelligence Services: What to Look For
sponsored by
EBOOK: This buyer's guide can help you find the right threat intelligence service for your organization. Access it now to learn what features every successful threat intelligence platform must offer.
Posted: 27 Feb 2015 | Published: 27 Feb 2015

4 Data Traffic Security Challenges Exposing Enterprises to Hack Attacks
sponsored by Certes Networks
WHITE PAPER: This white paper discusses the 4 major points of weakness that your enterprise needs to prioritize in 2015 in order to defend your business-critical data from hackers.
Posted: 12 Feb 2015 | Published: 22 Jan 2015

Certes Networks

Taking Control of File Sharing Services
sponsored by Mimecast
WHITE PAPER: This informative white paper discusses how file sharing services are being used within enterprises; the benefits and risks that they bring; and the factors that organizations should consider in selecting an enterprise-grade service in order to ensure its security.
Posted: 19 Dec 2014 | Published: 30 Apr 2014


Gartner: Digital transformation: How to survive the information crisis
sponsored by
ANALYST BRIEF: It is time to revisit out-of-date policies and strategies to avoid minor issues becoming major disasters, say Gartner analysts Saul Judah and Andrew White.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Computer Weekly – 4 August 2015: Cyber risks hit the road
sponsored by
EZINE: In this week's Computer Weekly, after hackers took remote control of a Jeep Cherokee, we assess the security concerns for internet-connected cars. With the growth of digital banking, is there a need for high-street branches anymore? And we examine whether email overload is hindering the UK's economic productivity. Read the issue now.
Posted: 03 Aug 2015 | Published: 03 Aug 2015

Surviving in a State of Denial
sponsored by
EBOOK: DDoS prevention begins with understanding the nature of the latest attacks. Learn what your system is up against when it comes to DDoS and how configuration can help contain them.
Posted: 15 Jun 2015 | Published: 15 Jun 2015

A new look at Vulnerability Management
sponsored by TechTarget
RESOURCE: Does your list of security vulnerabilities seem overwhelming? Visualisation in VM can be an essential tool in making critical issues apparent. Security Visualisation serves as a guideline of how to generate a visual representation of a dataset. Download this guide to get expert advice on how to generate a security visualization plan.
Posted: 24 Oct 2014 | Published: 18 Mar 2014


Protecting Your Critical Data with Integrated Security Intelligence
sponsored by IBM
WHITE PAPER: Access this white paper to gain actionable insights that can help you reduce security risks and boost compliance.
Posted: 08 Oct 2014 | Published: 30 Apr 2013


How SIEM Helps IT Security, Compliance, Operations and Management
sponsored by CDW Corporation
WHITE PAPER: Security information and event management (SIEM) tools offer more than just security. In fact, many organizations overlook some of the most useful aspects of SIEM technology, including fraud prevention and operations management. In this expert resource, discover the value of SIEM tools for four different audiences.
Posted: 12 Sep 2014 | Published: 12 Sep 2014

CDW Corporation
1 - 25 of 380 Matches Previous Page    1 2 3 4    Next Page
INFORMATION SECURITY DEFINITION (continued): … COBIT (Control Objectives for Information and Related Technology) is an international open standard that defines requirements for the control and security of sensitive data and provides a reference framework. COBIT, which provides a reference framework, was introduced in the 1990s by the IT Governance Institute. Learn more about managing compliance at COBIT consists of an executive summary, management guidelines, framework, control objectives, implementation toolset and audit guidelines. Extensive support is provided, including a list of critical success factors for measuring security program effectiveness and benchmark s for auditing purposes. COBIT has been revised several times since inception and upgrades are published at regular intervals.
Information Security definition sponsored by, powered by an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement