IT Management  >   Systems Operations  >   Security  >  

Secure Data

RSS Feed    Add to Google    Add to My Yahoo!
Secure Data Reports
 
What is Password Management?
sponsored by Fast Pass Corp
WHITE PAPER: This paper explores the importance of enterprise password management, intended for IT-pros involved in the processes related to the use of corporate passwords.
Posted: 04 Jan 2018 | Published: 04 Jan 2018

Fast Pass Corp

GDPR Compliance Checklist: A 9-Step Guide
sponsored by AlienVault
WHITE PAPER: The GDPR has the potential to significantly alter the way businesses handle and store data as it consolidates and replaces many local data protection laws. This guide offers a 9-step GDPR checklist to ensure your organization is prepared for the May 2018 regulation.
Posted: 04 Jan 2018 | Published: 04 Jan 2018

AlienVault

Vulnerable By Design: Why Destructive Exploits Keep On Coming
sponsored by enSilo
WHITE PAPER: Attackers can exploit design vulnerabilities and gain root access to highly secure systems leading to data theft, disruption of critical infrastructure and more. Explore this resource to gain insight into design vulnerabilities and malware which exploit them. In addition uncover the differences between design and security vulnerabilities.
Posted: 15 Jan 2018 | Published: 15 Jan 2018


Essential guide to dealing with a data breach
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Computer Weekly's essential guide to dealing with a data breach looks at companies that have been affected and offers advice on how to respond to cyber security occurrences
Posted: 03 Jan 2018 | Published: 03 Jan 2018

ComputerWeekly.com

The Business Case for Mobile Security
sponsored by Lookout
EBOOK: Mobility is the way of the future, so you need to protect your mobile devices. This e-book chapter presents the case for mobile security and how you can convince the different decision-makers that mobile threats are real and worth the investment to defend against.
Posted: 12 Jan 2018 | Published: 12 Jan 2018

Lookout

Secure the Workplace Without Locking Down Your People
sponsored by Atos
RESOURCE: What if I told you that you could secure your workplace without taking away employees' flexbility? Read on to learn about the guidelines you need to follow to make this happen and the topics you will need to address for the future of your workplace security strategy.
Posted: 20 Dec 2017 | Published: 28 Nov 2017

Atos

DTMF Masking for PCI DSS Compliance
sponsored by Semafone
WHITE PAPER: PCI DSS is made up of 12 requirements, including securing networks, protecting data, access control measures, information security practices, and monitoring and testing. This resource provides insight into becoming PCI DSS compliant by implementing dual-tone multi-frequency.
Posted: 04 Jan 2018 | Published: 04 Jan 2018

Semafone

FBI Cyber Squad Guest Speaking on Emerging Cyber Threats
sponsored by Digital Shadows
WEBCAST: Do you understand your data and susceptibility to being targeted? Watch this webcast to uncover emerging cyber threats, persistent vulnerabilities and strategies for protecting your enterprise.
Posted: 21 Nov 2017 | Premiered: Nov 21, 2017

Digital Shadows

Ten Steps for Successful Application Platforming in the Cloud
sponsored by Atos
WHITE PAPER: Most organizations are trying to copy the success of "cloud first," like Uber and Netflix, but doing so is a compllicated process that often lead to increased complexity that further slow necessary progress. This paper addresses this and explores ten tips for a successful digital transformation.
Posted: 30 Nov 2017 | Published: 31 Oct 2017

Atos

How Can Privileged Access Accounts Be Managed in Large Companies?
sponsored by One Identity
EGUIDE: According to a Verizon Data Breach Report, 55% of insider misuse incidents involved access abuse. Inside this e-guide, security expert Michael Cobb, dives into the risk of privileged access and reveals best practices for securing privileged access.
Posted: 20 Nov 2017 | Published: 13 Nov 2017

One Identity
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement