Business of Information Technology  >   Business Management  >   Best Practices  >  

Security Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Security Best Practices Reports
26 - 50 of 1802 Matches Previous Page  |  Next Page
Deriving Value from the Technical Security Test
sponsored by SecureWorks
WHITE PAPER: Uncover a guide for your questions as you get into the process of choosing the right provider to meet your specific security testing needs. Learn key considerations that must be implemented in the selection process for technical testing providers.
Posted: 21 Sep 2016 | Published: 31 Aug 2016

SecureWorks

Who Will CAVE First: Likely Targets of Ransomware
sponsored by Radware
WHITE PAPER: The following resource lists an acronym that highlights four key areas criminals will assess in their decision to target people and companies. Learn how to avoid being a victim by getting inside the mind of a ransomware attacker.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Radware

The Changing Workforce: Automation & the Role of Ex-Hackers
sponsored by Radware
WHITE PAPER: The wave of automation is forcing companies to think differently about how they structure their security resources. Learn what your peers are doing to keep the network impermeable, including employing ex-hackers, automating security models, and more.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Radware

Best Practices for Writing Secure iOS and Android Apps
sponsored by Proofpoint, Inc.
WHITE PAPER: As mobile applications grow to reach wider audiences, they become larger targets for cyberattackers. Access this list of 21 mobile security guidelines for developers and security pros when developing Android and iOS mobile apps. Learn how to provide security at every step of the mobile application development and management processes.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Proofpoint, Inc.

Advancing Endpoint Security: The Importance of Threat Intelligence, Visibility
sponsored by SecureWorks
WHITE PAPER: Discover how to mix anti-malware capabilities with high-level visibility and behavioral based detection to eliminate endpoint threats. By arming yourself with these weapons, your organization can not only detect threat actors and their tradecraft, but also slash time of response, minimizing the damage they cause.
Posted: 21 Sep 2016 | Published: 31 Aug 2016

SecureWorks

Best Practices for Dealing With Phishing and Ransomware
sponsored by Trustwave
WHITE PAPER: There are steps you can take to address phishing and ransomware. Discover how to best mitigate these tremendous threats to decrease the likelihood of infection and the subsequent consequences that come from them.
Posted: 21 Sep 2016 | Published: 30 Sep 2016

Trustwave

Public Key Infrastructure: The New Best Practices
sponsored by Certified Security Solutions (CSS)
WHITE PAPER: This white paper outlines how Public Key Infrastructure (PKI) has evolved and highlights some common PKI weaknesses of today. Access now to uncover best practices on how to identify challenges, address questions, and manage issues to reduce risk and meet audit and compliance requirements for PKI operations.
Posted: 20 Sep 2016 | Published: 20 Sep 2016

Certified Security Solutions (CSS)

Automated Malware Analysis Tools and Technology: The Security Architecture and Operations Playbook
sponsored by Palo Alto Networks
WHITE PAPER: The following report features a 36-criteria evaluation of automated malware analysis providers. Discover ways each provider measures up so you and your team can make the right choice.
Posted: 20 Sep 2016 | Published: 21 Apr 2016

Palo Alto Networks

Public Key Infrastructure: Traditional Deployments vs. IoT PKI
sponsored by Certified Security Solutions (CSS)
WHITE PAPER: This white paper explores the differences between a typical enterprise Public Key Infrastructure (PKI) and an Internet of Things (IoT) PKI. Gain access to a current assessment of the state of IoT security risks and explore the unique design, deployment, and management considerations of an IoT PKI.
Posted: 20 Sep 2016 | Published: 20 Sep 2016

Certified Security Solutions (CSS)

Report: The Impact of Security Threats on Business
sponsored by Radware
WHITE PAPER: In the following report, executives underscore just how expensive it is to recover from a cyber-attack. Learn where organizations are continuing to take action despite major revenue losses, and what more can be done.
Posted: 20 Sep 2016 | Published: 20 Sep 2016

Radware

To Pay or Not to Pay: Ransom-Based Cyber-Attacks on the Rise
sponsored by Radware
WHITE PAPER: Organizations need to proactively prepare their networks for ransomware attacks. Learn now about three key considerations for tools and strategies designed to mitigate these incidents, how to detect a fake ransom letter, and the consequences of giving into these threats.
Posted: 20 Sep 2016 | Published: 20 Sep 2016

Radware

How GuideStar Stabilized Website Availability by Blocking Bad Bots
sponsored by Distil Networks
CASE STUDY: Learn how GuideStar countered their invasive bot problem, stabilized their site to recover 99.7% uptime, and still allowed good traffic to get through unhindered. Also discover how they saved 20 hours a month of IT effort and reigned in an out-of-control issue that seemed insurmountable.
Posted: 19 Sep 2016 | Published: 19 Sep 2016

Distil Networks

How Graphiq Blocked Bot Data-Scrapers & Improved SEO
sponsored by Distil Networks
CASE STUDY: Uncover not only how to block bot data-scrapers, monitor suspicious activity, and eliminate spikes in traffic, but also how to significantly improve the user experience. Also learn how to deploy an automatically updating "known violators" database to keep up with the latest threats.
Posted: 19 Sep 2016 | Published: 19 Sep 2016

Distil Networks

Give Your Threat Counter-Measures a Shot in the Arm
sponsored by Fortinet, Inc.
WHITE PAPER: Discover a deep (but concise) look at the current evolution of the modern security landscape: giving a succinct rundown of why attacks are stronger than ever, how to develop a strategic defense, and what to look for in solutions. Gain actionable insight into prevention, detection, mitigation, and more.
Posted: 19 Sep 2016 | Published: 19 Sep 2016

Fortinet, Inc.

Securing Microsoft Office 365 - The Inside Track To Threat Protection
sponsored by Proofpoint, Inc.
WHITE PAPER: This report explores Office 365 adoption concerns around issues such as threat protection, intelligence and response. Find out what additional security measures your organization can take to securely deploy Office 365 and reap its full benefits.
Posted: 19 Sep 2016 | Published: 31 Aug 2016

Proofpoint, Inc.

Nucleus Research Guidebook: IBM QRadar on Cloud
sponsored by IBM
RESOURCE: Learn how to eliminate the need for expensive hardware and IT personnel oversight by utilizing the cloud. Deploy quickly and achieve faster time to value with a growing range of additional cloud security services. Realize the benefits of a managed cloud infrastructure and more through this brief resource.
Posted: 19 Sep 2016 | Published: 31 Aug 2016

IBM

An Agent of Change in an Era of Intensifying Threats
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Discover a defense system tailored specially for your network that includes advanced sandboxing with CPU-level detection. Take the on-going cyberwar back to your cyberthieves' doorsteps by understanding the tools they use, their chosen attack vectors and the methods they employ.
Posted: 19 Sep 2016 | Published: 31 Aug 2016

Check Point Software Technologies Ltd.

BYOD & MDM: Why you’re still at risk – and what you can do about it
sponsored by Proofpoint, Inc.
WHITE PAPER: In this white paper discover how you can reap the benefits of BYOD and MDM while also keeping your data and devices secure. Also uncover 9 threats that MDM solutions often fail to catch.
Posted: 16 Sep 2016 | Published: 16 Sep 2016

Proofpoint, Inc.

How To Easily Start Your Implementation Planning for Office 365
sponsored by Blue Coat Systems
WHITE PAPER: Uncover how to effectively plan for your enterprise's adoption of Office 365, and run through a comprehensive step-by-step to build your cloud "to-do" list.
Posted: 16 Sep 2016 | Published: 16 Sep 2016

Blue Coat Systems

Preventing Ransomware Threats to Health Data in 10 Steps
sponsored by OpenDNS
WHITE PAPER: Health data has become some of the most sought-after personal data on the black market, making healthcare professionals and hospital systems prime targets for cybercrime – particularly ransomware attacks. This e-guide will provide you with 10 steps to avoid ransomware attacks on your health systems.
Posted: 16 Sep 2016 | Published: 14 Sep 2016

OpenDNS

How Healthcare Organizations are Tackling IoT Device Management
sponsored by OpenDNS
EGUIDE: Connected medical devices are becoming more widespread in healthcare, but security and management options are limited for IT teams. This e-guide will teach you how to devise a plan to secure each device from surface attacks and cyberthreats. Plus, see how several vendors are tackling this problem and offering tools to keep patient data safe.
Posted: 16 Sep 2016 | Published: 14 Sep 2016

OpenDNS

Security Framework: A Guide for Business Leaders
sponsored by Palo Alto Networks
WHITE PAPER: Don't satisfy yourself with the status quo. In this guide, access an extensive security framework which will analyze, detect, prevent, and respond to all known and unknown cyber threats. Learn how to formulate a strategy that will rapidly automate protection, extend network visibility, and more.
Posted: 16 Sep 2016 | Published: 16 Sep 2016

Palo Alto Networks

Focus: IT Security in the Middle East
sponsored by ComputerWeekly.com
EGUIDE: In this issue, we look at the challenges facing organisations in the Middle East as they increasingly rely on digital technologies to engage with customers and citizens.We also analyse specific risks to enterprises, such as malware sneaking into networks under the guise of encryption.
Posted: 16 Sep 2016 | Published: 16 Sep 2016

ComputerWeekly.com

Measures to Protect Our Growing Data
sponsored by Pure Storage
RESOURCE: The data deluge has arrived and at any one time, federal agencies will store an average of 2.63 petabytes. Flash storage provides the capacity, performance and cost-effectiveness needed but still leaves the question of security. Read on to learn how governments intend to keep their data safe and secure.
Posted: 15 Sep 2016 | Published: 15 Jul 2016

Pure Storage

Trusted Identities in Digital Business The Benefits of PKI
sponsored by Entrust, Inc.
ANALYST BRIEF: Uncover the changing nature of trust in business, how it will affect your enterprise, and how to create business value using identity. Learn how to manage identity and access more effectively, saving your teams time, effort, and resources.
Posted: 15 Sep 2016 | Published: 15 Sep 2016

Entrust, Inc.
26 - 50 of 1802 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement