IT Management  >   Systems Operations  >   Security  >  

Information Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Infosecurity
DEFINITION: COBIT (Control Objectives for Information and Related Technology) is an international open standard that defines requirements for the control and security of sensitive data and provides a reference framework. COBIT, which provides a reference framework, was introduced in the 1990s by the IT Governance Institute. Learn more about managing compliance at SearchCompliance.com. COBIT consists of an executive  … 
Definition continues below.
Information Security Reports
1 - 25 of 367 Matches Previous Page  |  Next Page
Adapting an infosec program for emerging threats
sponsored by Intel
EGUIDE: An enterprise's information security program must be adaptable to new threats and risks. Expert Nick Lewis explains how to update and evolve these programs in the following exclusive resource.
Posted: 18 May 2016 | Published: 13 May 2016

Intel

Five End-User Computing Predictions for 2016
sponsored by Dell, Inc., Intel and VMware
RESOURCE: This blog post reveals the top five trends that will impact end user computing (and to a greater degree IT as a whole) in 2016. Here's a sneak peak at what made the list: digital transformation. Access now to learn the others.
Posted: 05 May 2016 | Published: 04 Feb 2016

Dell, Inc., Intel and VMware

Computer Weekly – 3 May 2016: How high-speed rail is accelerating innovation
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how HS2, the UK's planned high-speed railway, is developing its IT from scratch and having to predict the future. We hear from DevOps experts who try to bust some of the myths around continuous software delivery. And our latest buyer's guide analyses graph databases. Read the issue now.
Posted: 29 Apr 2016 | Published: 03 May 2016

ComputerWeekly.com

Securing the Internet of Things: 6 Crucial Steps
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Although a majority of large companies are actively working on Internet of Things (IoT) initiatives, data security continues to be a low priority for boards of directors. This resource explores the new security risks prompted by the IoT and reveals 6 crucial actions that you need to take to counteract them.
Posted: 20 Apr 2016 | Published: 20 Apr 2016

Hewlett-Packard Enterprise

Why Enterprises Need Trustworthy Data
sponsored by IBM
WHITE PAPER: In this e-book, information governance expert Paula Wiles Sigmon discusses what enterprises are doing to improve the quality of their data, who should be responsible for data that goes in and out of an enterprise data warehouse, and the emerging role of the chief data officer. Gain tips on how you can foster confidence in your data.
Posted: 18 Apr 2016 | Published: 30 Jun 2014

IBM

Computer Weekly – 19 April 2016: The hunters who prey on cyber criminals
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to the hunters – a new breed of security expert that proactively hunts down cyber attackers. We visit Silicon Valley to meet some of the up-and-coming startups in data analytics. And we hear from IT leaders about the people, process and cultural aspects of managing digital transformation. Read the issue now.
Posted: 18 Apr 2016 | Published: 19 Apr 2016

ComputerWeekly.com

Computer Weekly – 12 April 2016: How IT in a portacabin supports £1bn London Bridge station overhaul
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how a temporary IT set-up based in a portacabin is supporting the UK's largest critical infrastructure project. Our latest buyer's guide looks at converged infrastructure products. And we analyse research showing data protection topping the list of UK security priorities. Read the issue now.
Posted: 08 Apr 2016 | Published: 12 Apr 2016

ComputerWeekly.com

Optimize Patient Documentation with Enterprise Content Management
sponsored by Actiance
EGUIDE: In this e-guide, healthcare industry expert Reda Chouffani discusses how to enhance patient documentation with an enterprise content management platform. Discover a platform that offers features like: customization, advanced workflow functions, security and HIPAA compliance, and more.
Posted: 04 Apr 2016 | Published: 01 Apr 2016

Actiance

Electronic Privacy Screens: Protect Your Data at the Source
sponsored by OptioLabs
WHITE PAPER: This white paper discusses how display security and breach detection solutions can protect against disclosures of information caused by over-the-shoulder observation and unattended workstations. Read on to discover the key features that you need to look for in a display security solution.
Posted: 01 Apr 2016 | Published: 01 Apr 2016

OptioLabs

Global Data Breach Notification Laws: Meeting Requirements and Mitigating Risks with Endpoint Security
sponsored by Absolute
WHITE PAPER: This white paper discusses the basic requirements of data breach notifications and highlights an endpoint protection technology that can help you develop effective risk management and compliance strategies. Read on to discover how you can ensure the security of your devices and protect your information.
Posted: 11 Mar 2016 | Published: 31 Dec 2015

Absolute

Are You Doing All You Can To Protect Your Critical Business Information?
sponsored by Citrix
DATA SHEET: This infographic details 7 best practices to protect your critical business information while empowering workers to access it from any location or device. Discover how a policy-driven approach to information security can mitigate threats and data breaches in your mobile workforce.
Posted: 05 Feb 2016 | Published: 05 Feb 2016

Citrix

Why InfoSec Needs Guarantees
sponsored by WhiteHat Security
WEBCAST: This webcast presents the argument that security platform vendors need to change the industry and begin to offer guarantees on security platforms. View now to learn why security guarantees will benefit the vendors as well as the organizations using them.
Posted: 01 Oct 2015 | Premiered: May 12, 2015

WhiteHat Security

Global Threats and an Intelligent Response
sponsored by SearchSecurity.com
EBOOK: In today's world of multipronged, global threats, a global threat intelligence service is becoming essential to enterprise security strategy.
Posted: 16 Sep 2015 | Published: 16 Sep 2015

SearchSecurity.com

Realign your data protection efforts
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: David Sherry explains how your organization should react to the shift of organized online criminals from coveting credit card numbers to identity information and how to re-prioritize your efforts in protecting your organization.
Posted: 06 Aug 2015 | Premiered: 20 Jul 2015

SearchSecurity.com

The Essential Guide for Threat Intelligence Services: What to Look For
sponsored by SearchSecurity.com
EBOOK: Vendors are now turning to threat intelligence services to combat unseen threats. This guide will introduce you to threat intelligence services and detail how each services compares to one another. Learn how to best choose a service that can fight the specific attacks which afflict your network and who can scale as your organization grows.
Posted: 27 Feb 2015 | Published: 27 Feb 2015

SearchSecurity.com

Taking Control of File Sharing Services
sponsored by Mimecast
WHITE PAPER: This informative white paper discusses how file sharing services are being used within enterprises; the benefits and risks that they bring; and the factors that organizations should consider in selecting an enterprise-grade service in order to ensure its security.
Posted: 19 Dec 2014 | Published: 30 Apr 2014

Mimecast

Gartner: Digital transformation: How to survive the information crisis
sponsored by ComputerWeekly.com
ANALYST BRIEF: It is time to revisit out-of-date policies and strategies to avoid minor issues becoming major disasters, say Gartner analysts Saul Judah and Andrew White.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

ComputerWeekly.com

Computer Weekly – 9 February 2016: How Software Protects People
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how software is helping to maintain safety in high-risk sectors such as oil and gas, aerospace and healthcare. We offer six tips from CIOs for innovation with data. And we examine the continuing threat to businesses from denial of service cyber attacks. Read the issue now.
Posted: 05 Feb 2016 | Published: 09 Feb 2016

ComputerWeekly.com

Top 5 Questions Answered on How to Best Protect Your Data in the Cloud
sponsored by Blue Coat Systems
WHITE PAPER: Discover the top 5 questions (and answers) you need to consider when crafting your cloud security strategy. The sad truth is there is no silver bullet to keep your data safe, but there are simple steps to keep hackers out. View now to find out what they are.
Posted: 05 Jan 2016 | Published: 18 Nov 2015

Blue Coat Systems

December ezine: An issue covering cloud and security developments in the market
sponsored by MicroScope
EZINE: Two of the most explosive opportunities in the channel are cloud and security and we look ahead to what the market holds for resellers operating in those areas.
Posted: 14 Dec 2015 | Published: 11 Dec 2015

MicroScope

November ezine: An issue covering the latest techniques in selling security and what to pitch in Q4
sponsored by MicroScope
EZINE: In the wake of the TalkTalk hacking scandal it would be all too easy for the channel to use it to sell security, but that would be a mistake as customers want to hear more positive thoughts.
Posted: 11 Nov 2015 | Published: 11 Nov 2015

MicroScope

Computer Weekly – 4 August 2015: Cyber risks hit the road
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, after hackers took remote control of a Jeep Cherokee, we assess the security concerns for internet-connected cars. With the growth of digital banking, is there a need for high-street branches anymore? And we examine whether email overload is hindering the UK's economic productivity. Read the issue now.
Posted: 03 Aug 2015 | Published: 03 Aug 2015

ComputerWeekly.com

Surviving in a State of Denial
sponsored by SearchSecurity.com
EBOOK: DDoS prevention begins with understanding the nature of the latest attacks. Learn what your system is up against when it comes to DDoS and how configuration can help contain them.
Posted: 15 Jun 2015 | Published: 15 Jun 2015

SearchSecurity.com

A new look at Vulnerability Management
sponsored by TechTarget
RESOURCE: Does your list of security vulnerabilities seem overwhelming? Visualisation in VM can be an essential tool in making critical issues apparent. Security Visualisation serves as a guideline of how to generate a visual representation of a dataset. Download this guide to get expert advice on how to generate a security visualization plan.
Posted: 24 Oct 2014 | Published: 18 Mar 2014

TechTarget

Protecting Your Critical Data with Integrated Security Intelligence
sponsored by IBM
WHITE PAPER: Access this white paper to gain actionable insights that can help you reduce security risks and boost compliance.
Posted: 08 Oct 2014 | Published: 30 Apr 2013

IBM
1 - 25 of 367 Matches Previous Page    1 2 3 4    Next Page
 
INFORMATION SECURITY DEFINITION (continued): … COBIT (Control Objectives for Information and Related Technology) is an international open standard that defines requirements for the control and security of sensitive data and provides a reference framework. COBIT, which provides a reference framework, was introduced in the 1990s by the IT Governance Institute. Learn more about managing compliance at SearchCompliance.com. COBIT consists of an executive summary, management guidelines, framework, control objectives, implementation toolset and audit guidelines. Extensive support is provided, including a list of critical success factors for measuring security program effectiveness and benchmark s for auditing purposes. COBIT has been revised several times since inception and upgrades are published at regular intervals.
Information Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement