IT Management  >   Systems Operations  >   Security  >  

Managing Security

RSS Feed    Add to Google    Add to My Yahoo!
Managing Security Reports
Breaking Bad: The Risk of Insecure File Sharing
sponsored by IntraLinks, Inc
RESEARCH CONTENT: This report explores the ways that employees put their organization's data at risk through negligent file sharing. Read on for expert tips to secure information sharing in the collaborative environment.
Posted: 11 Sep 2015 | Published: 31 Oct 2014

IntraLinks, Inc

Social Threat Intelligence: A New Way to Stay Ahead of Hackers
sponsored by Threatstream
PODCAST: This podcast explores social threat intelligence, a new approach to threat intelligence that enables you to share threat information with other businesses in real time.
Posted: 25 Sep 2015 | Premiered: Jun 15, 2015


Today's Top 10 Web Hacking Technique
sponsored by WhiteHat Security
WEBCAST: In this webcast, you'll learn today's top 10 web hacking techniques, such as Heartbleed and ShellShock, and how to protect your network as we continue through 2015. View it now to discover the 3 keys to email and web security.
Posted: 01 Oct 2015 | Premiered: Apr 9, 2015

WhiteHat Security

Battling Security Threats from within Your Organization
sponsored by IBM
WHITE PAPER: This white paper explores the risk of insider attacks, both malicious and accidental, and gives tips on how you can secure yourself against them.
Posted: 11 Sep 2015 | Published: 30 Jun 2015


Removing the Complexity and Guesswork from Your PKI Refresh
sponsored by Venafi
WHITE PAPER: This white paper discusses the challenges of PKI refresh and their impact on security. Read on to learn how you can bolster security with a simplified and streamlined PKI refresh process.
Posted: 15 Sep 2015 | Published: 15 Sep 2015


How you can defend against criminal attacks originating from the Deep Web
sponsored by IBM
WHITE PAPER: This white paper explores the depths of the Deep Web, using attack data to examine what kinds of attacks originate there and how you can defend against them.
Posted: 09 Sep 2015 | Published: 31 Jul 2015


Security Certificates and Cryptographic Keys in Peril
sponsored by Venafi
EGUIDE: This expert guide discusses why security certificates and cryptographic keys can no longer be trusted and how you can stay safe from hacks that exploit them.
Posted: 25 Sep 2015 | Published: 25 Sep 2015


Make Behavioral Analytics Part of Your Security Strategy
sponsored by MASERGY
WHITE PAPER: This article discusses why network behavior analysis is essential for maintaining security against advanced threats.
Posted: 16 Sep 2015 | Published: 25 Aug 2015


A New Way to Think about Security
sponsored by IBM
VIDEO: This brief video describes why managed security services (MSS) may be the answer to the increasingly complex question of modern security.
Posted: 14 Sep 2015 | Premiered: 07 Apr 2015


Social Threat Intelligence: A New Approach to Security
sponsored by Threatstream
TRANSCRIPT: This resource discusses social threat intelligence (STI), a collaborative approach to threat intelligence that can help you keep up with new cyber-risks.
Posted: 23 Sep 2015 | Published: 23 Sep 2015

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement