IT Management  >   Systems Operations  >   Security  >  

Information Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Infosecurity
DEFINITION: COBIT (Control Objectives for Information and Related Technology) is an international open standard that defines requirements for the control and security of sensitive data and provides a reference framework. COBIT, which provides a reference framework, was introduced in the 1990s by the IT Governance Institute. Learn more about managing compliance at COBIT consists of an executive  … 
Definition continues below.
Information Security Reports
1 - 25 of 367 Matches Previous Page  |  Next Page
Enable Collaboration without Compromising Content
sponsored by IntraLinks, Inc
CASE STUDY: Chances are that you need to do work with outside parties, but you're concerned that doing so puts your content at risk. Find out what one non-profit organization did to ensure that they could maintain their collaborative efforts without compromising content.
Posted: 13 Oct 2016 | Published: 31 Dec 2015

IntraLinks, Inc

Computer Weekly – 20 September 2016: Digital giving – transforming Save the Children with technology
sponsored by
EZINE: In this week's Computer Weekly, we talk to global charity Save the Children to find out how technology is helping to transform its work. We go behind the scenes at the UK's most secretive court as it discusses bulk data surveillance. And we analyse the often contradictory experiences of firms implementing SAP's Hana platform. Read the issue now.
Posted: 16 Sep 2016 | Published: 20 Sep 2016

Modernizing Data Protection
sponsored by IBM
WEBCAST: Should you store all data forever? What should the life-cycle of data be? What, if anything, can you learn from old data? How do you modernize your data protection? Watch this episode of #Cubeconversations, where 3 industry veterans address these questions by discussing the cloud, dealing with data growth, and the systems of insight into data.
Posted: 26 Aug 2016 | Premiered: Jan 26, 2016


Clearing the Confusion of Modern Data Protection
sponsored by IBM
WEBCAST: One aspect of IT that everyone agrees upon is the need for better data protection. But what they don't always agree on is how to provide it. View this webcast where Jason Buffington, senior analyst at ESG, takes an in-depth look at modern data protection and explains why when you modernize production, you must modernize protection.
Posted: 26 Aug 2016 | Premiered: Jan 7, 2016


Information Security and Data Privacy Practices
sponsored by Gigya
WHITE PAPER: Explore several information security and data privacy practices that will enable you to better protect your data. Topics discussed include infrastructure, data security, compliance, privacy, and more.
Posted: 18 Aug 2016 | Published: 29 Jul 2016


Computer Weekly – 3 May 2016: How high-speed rail is accelerating innovation
sponsored by
EZINE: In this week's Computer Weekly, we find out how HS2, the UK's planned high-speed railway, is developing its IT from scratch and having to predict the future. We hear from DevOps experts who try to bust some of the myths around continuous software delivery. And our latest buyer's guide analyses graph databases. Read the issue now.
Posted: 29 Apr 2016 | Published: 03 May 2016

Computer Weekly – 19 April 2016: The hunters who prey on cyber criminals
sponsored by
EZINE: In this week's Computer Weekly, we talk to the hunters – a new breed of security expert that proactively hunts down cyber attackers. We visit Silicon Valley to meet some of the up-and-coming startups in data analytics. And we hear from IT leaders about the people, process and cultural aspects of managing digital transformation. Read the issue now.
Posted: 18 Apr 2016 | Published: 19 Apr 2016

Computer Weekly – 12 April 2016: How IT in a portacabin supports £1bn London Bridge station overhaul
sponsored by
EZINE: In this week's Computer Weekly, we find out how a temporary IT set-up based in a portacabin is supporting the UK's largest critical infrastructure project. Our latest buyer's guide looks at converged infrastructure products. And we analyse research showing data protection topping the list of UK security priorities. Read the issue now.
Posted: 08 Apr 2016 | Published: 12 Apr 2016

Why InfoSec Needs Guarantees
sponsored by WhiteHat Security
WEBCAST: This webcast presents the argument that security platform vendors need to change the industry and begin to offer guarantees on security platforms. View now to learn why security guarantees will benefit the vendors as well as the organizations using them.
Posted: 01 Oct 2015 | Premiered: May 12, 2015

WhiteHat Security

Global Threats and an Intelligent Response
sponsored by
EBOOK: In today's world of multipronged, global threats, a global threat intelligence service is becoming essential to enterprise security strategy.
Posted: 16 Sep 2015 | Published: 16 Sep 2015

The Essential Guide for Threat Intelligence Services: What to Look For
sponsored by
EBOOK: Vendors are now turning to threat intelligence services to combat unseen threats. This guide will introduce you to threat intelligence services and detail how each services compares to one another. Learn how to best choose a service that can fight the specific attacks which afflict your network and who can scale as your organization grows.
Posted: 27 Feb 2015 | Published: 27 Feb 2015

Taking Control of File Sharing Services
sponsored by Mimecast
WHITE PAPER: This informative white paper discusses how file sharing services are being used within enterprises; the benefits and risks that they bring; and the factors that organizations should consider in selecting an enterprise-grade service in order to ensure its security.
Posted: 19 Dec 2014 | Published: 30 Apr 2014


Gartner: Digital transformation: How to survive the information crisis
sponsored by
ANALYST BRIEF: It is time to revisit out-of-date policies and strategies to avoid minor issues becoming major disasters, say Gartner analysts Saul Judah and Andrew White.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

What's the Best Way to Handle External Security Auditors?
sponsored by Dell Software
EGUIDE: A survey conducted at RSA Conference 2015 found that only about 68% of IT pros are honest with security auditors about the occurrence of incidents—leaving 32% in a decidedly gray area of ethics. Make the most of the audit process by learning 3 issues to consider when employing external security auditors.
Posted: 10 Oct 2016 | Published: 05 Oct 2016

Dell Software

Infographic: What's Happening with your Data Now?
sponsored by Proofpoint, Inc.
RESOURCE: This infographic contains important stats about enterprise archiving trends and shows how a highly automated archiving system can help to reduce cost, mitigate risk, and deliver value.
Posted: 13 Jun 2016 | Published: 13 Jun 2016

Proofpoint, Inc.

Adapting an infosec program for emerging threats
sponsored by Intel
EGUIDE: An enterprise's information security program must be adaptable to new threats and risks. Expert Nick Lewis explains how to update and evolve these programs in the following exclusive resource.
Posted: 18 May 2016 | Published: 13 May 2016


Optimize Patient Documentation with Enterprise Content Management
sponsored by Actiance
EGUIDE: In this e-guide, healthcare industry expert Reda Chouffani discusses how to enhance patient documentation with an enterprise content management platform. Discover a platform that offers features like: customization, advanced workflow functions, security and HIPAA compliance, and more.
Posted: 04 Apr 2016 | Published: 01 Apr 2016


Computer Weekly – 9 February 2016: How Software Protects People
sponsored by
EZINE: In this week's Computer Weekly, we find out how software is helping to maintain safety in high-risk sectors such as oil and gas, aerospace and healthcare. We offer six tips from CIOs for innovation with data. And we examine the continuing threat to businesses from denial of service cyber attacks. Read the issue now.
Posted: 05 Feb 2016 | Published: 09 Feb 2016

Top 5 Questions Answered on How to Best Protect Your Data in the Cloud
sponsored by Blue Coat Systems
WHITE PAPER: Discover the top 5 questions (and answers) you need to consider when crafting your cloud security strategy. The sad truth is there is no silver bullet to keep your data safe, but there are simple steps to keep hackers out. View now to find out what they are.
Posted: 05 Jan 2016 | Published: 18 Nov 2015

Blue Coat Systems

December ezine: An issue covering cloud and security developments in the market
sponsored by MicroScope
EZINE: Two of the most explosive opportunities in the channel are cloud and security and we look ahead to what the market holds for resellers operating in those areas.
Posted: 14 Dec 2015 | Published: 11 Dec 2015


November ezine: An issue covering the latest techniques in selling security and what to pitch in Q4
sponsored by MicroScope
EZINE: In the wake of the TalkTalk hacking scandal it would be all too easy for the channel to use it to sell security, but that would be a mistake as customers want to hear more positive thoughts.
Posted: 11 Nov 2015 | Published: 11 Nov 2015


Computer Weekly – 4 August 2015: Cyber risks hit the road
sponsored by
EZINE: In this week's Computer Weekly, after hackers took remote control of a Jeep Cherokee, we assess the security concerns for internet-connected cars. With the growth of digital banking, is there a need for high-street branches anymore? And we examine whether email overload is hindering the UK's economic productivity. Read the issue now.
Posted: 03 Aug 2015 | Published: 03 Aug 2015

Surviving in a State of Denial
sponsored by
EBOOK: DDoS prevention begins with understanding the nature of the latest attacks. Learn what your system is up against when it comes to DDoS and how configuration can help contain them.
Posted: 15 Jun 2015 | Published: 15 Jun 2015

A new look at Vulnerability Management
sponsored by TechTarget
RESOURCE: Does your list of security vulnerabilities seem overwhelming? Visualisation in VM can be an essential tool in making critical issues apparent. Security Visualisation serves as a guideline of how to generate a visual representation of a dataset. Download this guide to get expert advice on how to generate a security visualization plan.
Posted: 24 Oct 2014 | Published: 18 Mar 2014


Protecting Your Critical Data with Integrated Security Intelligence
sponsored by IBM
WHITE PAPER: Access this white paper to gain actionable insights that can help you reduce security risks and boost compliance.
Posted: 08 Oct 2014 | Published: 30 Apr 2013

1 - 25 of 367 Matches Previous Page    1 2 3 4    Next Page
INFORMATION SECURITY DEFINITION (continued): … COBIT (Control Objectives for Information and Related Technology) is an international open standard that defines requirements for the control and security of sensitive data and provides a reference framework. COBIT, which provides a reference framework, was introduced in the 1990s by the IT Governance Institute. Learn more about managing compliance at COBIT consists of an executive summary, management guidelines, framework, control objectives, implementation toolset and audit guidelines. Extensive support is provided, including a list of critical success factors for measuring security program effectiveness and benchmark s for auditing purposes. COBIT has been revised several times since inception and upgrades are published at regular intervals.
Information Security definition sponsored by, powered by an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement