IT Management  >   Systems Operations  >   Security  >  

Management of Security Information

RSS Feed    Add to Google    Add to My Yahoo!
Management of Security Information Reports
 
Understanding today’s information security threats
sponsored by Dell SecureWorks
PODCAST: This podcast can help you gain the understanding you need to secure your organization by describing what threats your business faces and how you can combat them.
Posted: 14 Jul 2015 | Premiered: Jul 14, 2015

Dell SecureWorks

Fast Detection & Deep Understanding: Responding Effectively to Cyber Attacks
sponsored by BAE Systems Applied Intelligence (formerly SilverSky)
WHITE PAPER: This white paper discusses the importance of the relationship between threat identification and security intelligence, and gives tips on how you can improve both of these factors.
Posted: 07 Jul 2015 | Published: 31 Dec 2013

BAE Systems Applied Intelligence (formerly SilverSky)

You've Been Breached: Now What Do You Do?
sponsored by Dell SecureWorks
PODCAST: This podcast features tips on how to remedy a security breach before it can do lasting harm on your organization.
Posted: 13 Jul 2015 | Premiered: Jul 13, 2015

Dell SecureWorks

Building Application Centric, Security-Enabled Data Centers
sponsored by Cisco Systems, Inc.
WHITE PAPER: Access this white paper to discover the Cisco solution that delivers application centric security automation in existing and next-generation data centers.
Posted: 20 Jul 2015 | Published: 29 Nov 2013

Cisco Systems, Inc.

Cyber security: Balancing risks and controls for finance professionals
sponsored by ComputerWeekly.com
RESEARCH CONTENT: The finance community is becoming more aware of the impact of cyber security but there is scope for significant improvement, according to this report from Ernst & Young.
Posted: 21 Jul 2015 | Published: 21 Jul 2015

ComputerWeekly.com

Implementing Strong, Comprehensive Authentication
sponsored by Symantec Corporation
WHITE PAPER: This white paper examines the capabilities of a strong, comprehensive authentication system that will keep you safe in today's threat landscape.
Posted: 17 Jul 2015 | Published: 31 Jul 2014

Symantec Corporation

Connecting the Server Room to the Board Room
sponsored by SurfWatch Labs
VIDEO: This video describes how an effective security intelligence application can help executives understand the security risks their business faces.
Posted: 13 Jul 2015 | Premiered: 10 Apr 2015

SurfWatch Labs

Why Scan to E-Mail Has Made Your Printers a Threat
sponsored by Nuance
VIDEO: This brief video explains why scanning and accidentally e-mailing documents to the wrong place can make your printer one of your company's greatest liabilities.
Posted: 24 Jun 2015 | Premiered: 03 Apr 2015

Nuance

Point of Sale Insecurity: A Threat to Your Business
sponsored by SurfWatch Labs
WEBCAST: This webcast discusses the risks facing PoS machines and what you can do to make sure yours are secured..
Posted: 13 Jul 2015 | Premiered: Jun 9, 2015

SurfWatch Labs

Insider Threat Patterns and Ways of Prevention
sponsored by Varonis
EGUIDE: This expert guide addresses the danger of accidental insider threats, giving you insight into how to prevent these threats from happening and how you can analyze network activity to stop unusual actions.
Posted: 02 Jul 2015 | Published: 02 Jul 2015

Varonis
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement