IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Information Management

RSS Feed    Add to Google    Add to My Yahoo!
Security Information Management Reports
5 Signs You Need A Mobile Security Game Plan
sponsored by Appthority
WHITE PAPER: Learn five signs that indicate you need to step up your mobile security game plan. If mobile security is your blind spot or you simply sense a breach on the horizon, the time to beef up mobile security is right now.
Posted: 05 Oct 2016 | Published: 30 Sep 2016


Barracuda NextGen Firewall Advanced Threat Detection
sponsored by Barracuda Networks
WHITE PAPER: Discover how to protect against today's targeted malware using a cloud-based sandboxing that provide granular visibility into malware behavior. Learn how to stop today's advanced malware and ransomware attacks with dynamic analysis and detailed forensics.
Posted: 19 Oct 2016 | Published: 30 Sep 2016

Barracuda Networks

Ask The Analyst: Key Elements of an Effective Security Program
sponsored by AlienVault
WEBCAST: In this webcast, join Barbara Call of IDG and Forrester Security Analyst Joseph Blankenship to learn how organizations should assess their security intelligence program, validate the effectiveness of security monitoring tools, and plan for the future.
Posted: 12 Oct 2016 | Premiered: Jun 28, 2016


Risk Assessment Infographic
sponsored by STEALTHbits
RESOURCE: Organizations looking to gain actionable insight into their security risks may benefit from a risk assessment. Compare your company to risk statistics in this infographic, and find out how you can assess how safe or risk-prone your organization is.
Posted: 26 Sep 2016 | Published: 31 Aug 2016


The Last Line of Defense Against the “Mega Breach”
sponsored by CrowdStrike
WHITE PAPER: The frequency of "mega breaches" continues to rise at an alarming rate. In fact, crippling incidents involving tens of millions of customer records, theft of highly valuable intellectual property, and related criminal activity have become commonplace. Learn how breaches could be prevented by deploying endpoint protection technology.
Posted: 05 Oct 2016 | Published: 30 Sep 2016


Guidance on Healthcare Ransomware Attacks
sponsored by OpenDNS
EGUIDE: Learn from the U.S. Department of Health and Human Services on how to know if your healthcare organization is under attack from ransomware, how to recover, and how to know if HIPAA has been violated.
Posted: 23 Sep 2016 | Published: 16 Sep 2016


How Healthcare Benefits from Cloud-delivered Security
sponsored by OpenDNS
WHITE PAPER: By utilizing the cloud for healthcare, you can enhance security today while ensuring scalability into the future. Learn how to combat malware, ransomware and other threats that impact patient well-being and best come into regulatory compliance with the cloud.
Posted: 29 Sep 2016 | Published: 31 Aug 2016


How to Use an Incident Response Policy to Better Collaborate
sponsored by Delta Risk
EGUIDE: In this e-guide learn how to not only prepare your organization's response to a security incident, but also how to work with outside forces more effectively to detect, analyze, contain, and eradicate – as well as, recover essential data.
Posted: 07 Oct 2016 | Published: 06 Oct 2016

Delta Risk

Cloud App and Service Adoption: 11 Key Steps IT Should Take
sponsored by Symantec + Blue Coat
WHITE PAPER: You need to know which cloud service providers will break your fall in the event of unauthorized access to critical data. Uncover 11 steps to secure adoption for cloud apps and services.
Posted: 11 Oct 2016 | Published: 11 Oct 2016

Symantec + Blue Coat

4 Ways Neustar Strengthens your DNS Security
sponsored by Neustar
WHITE PAPER: The once blue skies of cyber space have become the Wild West. Discover 4 steps you can take to protect DNS, lower business risk and defend your brand. Defend your organization against every new and existing malicious actor on the web to ensure customer safety and zero site downtime.
Posted: 10 Oct 2016 | Published: 31 Dec 2015

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement