IT Management  >   Systems Operations  >   Security  >  

Management of Security

RSS Feed    Add to Google    Add to My Yahoo!
Management of Security Reports
 
How to update, automate your IR processes
sponsored by Booz Allen Hamilton
EGUIDE: In the era of nonstop security threats, creating a cyber threat intelligence team and leveraging incident response (IR) tools can help with detection and automation of processes. Explore the tools and considerations for updating your IR processes.
Posted: 04 Jan 2018 | Published: 04 Jan 2018

Booz Allen Hamilton

How SMBs are Changing their Security Tactics
sponsored by Booz Allen Hamilton
EGUIDE: Security has changed dramatically over the decades. In this e-guide, learn why firms look to security analytics to keep pace with cyber threats and how closer collaboration between departments, such as business continuity and information security, could help raise staff awareness.
Posted: 03 Jan 2018 | Published: 03 Jan 2018

Booz Allen Hamilton

Top 3 Challenges Your Team Faces when Building in the Cloud
sponsored by TrendMicro
WHITE PAPER: In the pages ahead, delve into the 3 major challenges that security teams face when moving into the cloud so that you know how to avoid or overcome them on your path to cloud adoption.
Posted: 30 Nov 2017 | Published: 30 Nov 2017

TrendMicro

Be the Champion of Security in a DevOps World
sponsored by Veracode, Inc.
VIDEO: There tends to be a gap, both technically and culturally, between what developers are doing and what security is doing, which often creates vulnerabilities. How can we close this gap without turning security into a bottleneck? Watch this webcast to learn how to incorporate security into the DevOps process.
Posted: 15 Jan 2018 | Premiered: 15 Jan 2018

Veracode, Inc.

15 Essential DNS and DNSSEC Monitoring Tests
sponsored by Men and Mice
WEBCAST: Don't fall short on your Internet security strategy. In this webcast, you can learn how to use 15 essential DNS and DNSSEC monitoring tests to help your organization detect concerns before your network performance is impacted.
Posted: 03 Nov 2017 | Premiered: Nov 10, 2016

Men and Mice

Securing Azure Active Directory: Detection and Alert
sponsored by Quest
WHITE PAPER: Once you've established the baseline for Azure AD security, the next step is to detect when and how changes are made. This white paper highlights four methods with which you can do this. Read on to gain guidance on detecting and alerting on changes to Azure AD groups, using sign-in risk detection, and more.
Posted: 08 Nov 2017 | Published: 08 Nov 2017

Quest

Mobile Threat Report
sponsored by Lookout
WHITE PAPER: With mobile threats becoming increasingly sophisticated it's more important than ever for organizations to know what threats they face, and how those threats can cause data loss, compliance infringement, and brand reputation damage. Download this white paper to uncover the latest mobile threats to your organization.
Posted: 15 Jan 2018 | Published: 15 Jan 2018

Lookout

Data Defense Doesn't Win Championships
sponsored by Delphix
RESOURCE: Learn about the DataOps approach and how it could help businesses continuously deliver secure access to data throughout its lifecycle.
Posted: 13 Dec 2017 | Published: 13 Dec 2017

Delphix

Exploring Incident Response Sevices
sponsored by Rapid7
WHITE PAPER: In this white paper, learn how Rapid7's Incident Response Services can help your organization prepare for and manage a breach. Read on to find how tabletop exercises, compromise assessments, readiness evaluations and more can help keep your data safe.
Posted: 27 Nov 2017 | Published: 27 Nov 2017

Rapid7

Managed Security Service Provider Selection for Dummies
sponsored by Rackspace
EBOOK: In this book, you learn how to leverage a managed security services provider to enhance your organization's security posture in the cloud.
Posted: 12 Oct 2017 | Published: 12 Oct 2017

Rackspace
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement