Security Management Reports

Healthcare Cybersecurity Best Practices
sponsored by ServiceNow
EGUIDE: In this expert e-guide, find out what CIOs attending HIMSS 2016 had to say on how to best identify and protect against healthcare cybersecurity vulnerabilities. Plus, learn why one CIO believes network monitoring is the key to cybersecurity in healthcare.
Posted: 13 Jun 2016 | Published: 07 Jun 2016

ServiceNow

Security Challenges in Healthcare Social Media Usage
sponsored by Actiance
EGUIDE: In this e-guide, Jeani Park, senior director at an Internet and mobile device monitoring company, answers questions about security challenges that healthcare organizations face when it comes to social media. Discover best practices for governing use of social media in a hospital or practice so that you can ensure patient information stays secure.
Posted: 04 Apr 2016 | Published: 01 Apr 2016

Actiance

Buyer's Essentials: What to Look for in Single Sign-On Technology
sponsored by TechTarget Health IT
EBOOK: Are you on the hunt for single sign-on (SSO) technology? Discover the differences between the numerous approaches to SSO, their benefits, and what works for various types of healthcare organizations. In this guide, health IT expert Rick Krohn shares his advice on choosing the right SSO tech for your practice.
Posted: 24 Mar 2016 | Published: 18 Mar 2016

TechTarget Health IT

Recognize Your Security Shortcomings and Address Them with Confidence
sponsored by Dell, Inc. and Intel®
EGUIDE: This white paper shows you the current state of data security among businesses of all sizes. Learn about the concerns adopting a cloud-based infrastructure raises and how to confidently secure your IT environment overall.
Posted: 24 Mar 2016 | Published: 21 Mar 2016

Dell, Inc. and Intel®

An Introduction to Microsoft Office 365 and Email Security Tools
sponsored by Solarwinds MSP
EGUIDE: In this e-guide, expert Dave Shackleford discusses the security pros and cons of Microsoft Office 365's cloud-based productivity suite. You'll also find a section on email security, including helpful information about choosing between on-premise email security tools, or embracing the cloud.
Posted: 22 Mar 2016 | Published: 18 Mar 2016

Solarwinds MSP

What to Look for in Multifactor Authentication Tools
sponsored by TechTarget Security
EBOOK: In our threat-laden environment, multifactor authentication tools are a critical defense. Access this resource and learn the latest about MFA technology, how to compare MFA tools and select the right product for your organization.
Posted: 21 Mar 2016 | Published: 05 Jan 2016

TechTarget Security

It's time to tackle IoT security
sponsored by RUCKUS Networks
EGUIDE: The forecasts for IoT are huge. Some suggest that there will be 50 billion devices connected by 2020. Whether or not that prediction is accurate, it's clear that IoT is gaining meaningful market momentum, buoyed by an endless array of applications. Unfortunately, they are creating a multitude of security vulnerabilities and attack surfaces.
Posted: 09 Mar 2016 | Published: 07 Mar 2016

RUCKUS Networks

Protecting Patient Data in the Mobile Era
sponsored by TechTarget Health IT
EZINE: The rapid adoption of EHRs, coupled with the widespread use of mobile devices among providers, has increased the endpoint security threat – and there are more risks ahead. Access this issue of Pulse to find out how providers are locking down access points to protect against data breaches and HIPAA violations.
Posted: 03 Mar 2016 | Published: 29 Feb 2016

TechTarget Health IT

Dispelling the Shadows Cast Over IT Security
sponsored by Cisco Umbrella
EGUIDE: This guide discusses two shadows that are being cast over IT security. Domain shadowing, and shadow IT. By learning about these two threats, you'll be better equipped to ensure that you won't face crippling attack down the line.
Posted: 02 Mar 2016 | Published: 28 Feb 2016

Cisco Umbrella

Security: Communicating to the Board of Directors and Evaluating Vendors' Promises
sponsored by BitSight
EGUIDE: This informative e-guide provides expert advice on how to plan security assessment reports to effectively communicate key security elements to the board of directors. Inside, also discover how a vendor security checklist can help you weigh your security needs against vendors' claims.
Posted: 02 Mar 2016 | Published: 26 Feb 2016

BitSight

The Business Benefits of Managing Cyber Risk and Minimizing Unnecessary Data
sponsored by UnitedLex
EGUIDE: Cyber risk management is becoming an increasingly important area of concern as company directors' realize the limitations of insurance. How can you address this risk and instill confidence in your customer engagement? Find out how to enhance your cyber risk management using 4 key strategies.
Posted: 18 Feb 2016 | Published: 16 Feb 2016

UnitedLex

Advanced Persistent Threat Detection: Can It Find Custom Malware?
sponsored by UnitedLex
EGUIDE: A recent test showed that some well-known threat detection products were unable to detect custom-written malware samples thrown at them. Access this resource and find out if APT detection is an effective way to find custom malware, and why signature-based antimalware tools can't keep up with today's evolving security risks.
Posted: 18 Feb 2016 | Published: 16 Feb 2016

UnitedLex

How Global Threat Intelligence Fits into a Security Strategy
sponsored by UnitedLex
EGUIDE: While global threat intelligence services can be a powerful business security tool, it's not the first one you should consider when setting strategy for better business security. Read on to evaluate the role of global threat intelligence in today's enterprise and assess other tactics to bolster this strategy.
Posted: 18 Feb 2016 | Published: 16 Feb 2016

UnitedLex

The Need-to-Know of Today's Cloud Security
sponsored by TechTarget Cloud Computing
EBOOK: In this handbook, you will examine several common cloud security conundrums, emphasizing the importance of identity and access management (IAM) in the cloud and scrutinizing the role of data encryption. If your organization is serious about securing workloads in the cloud, read on now to learn the specific vulnerabilities cloud APIs introduce.
Posted: 16 Feb 2016 | Published: 16 Feb 2016

TechTarget Cloud Computing

Open Source Strategies Spark Security and Integration Concerns
sponsored by Black Duck Software
EGUIDE: In this e-guide, experts discuss the importance of moving past security concerns with open source strategies. Find out how your enterprise can keep your infrastructure secure with open source strategies so that you can meet your high-performance needs.
Posted: 16 Feb 2016 | Published: 11 Feb 2016

Black Duck Software

How to Evaluate UCaaS Providers' Security Measures
sponsored by Carousel Industries
EGUIDE: This e-guide discusses ways you can address the security concerns of UCaaS, including multi-tenancy and encryption. It goes on to provide ways you can evaluate the security measures that potential UCaaS vendors are building into their services.
Posted: 16 Feb 2016 | Published: 11 Feb 2016

Carousel Industries

The Making of a Cloud Security Culture
sponsored by Trend Micro, Inc.
EGUIDE: This e-guide emphasizes the importance of cultivating a cloud security culture and discusses the key benefits and differences between public and hybrid cloud. Access now to learn how your organization can achieve a secure cloud environment.
Posted: 16 Feb 2016 | Published: 11 Feb 2016

Trend Micro, Inc.

Keep Your Data Secure in the Wake of the Heartbleed OpenSSL Vulnerability
sponsored by Symantec Website Security
EGUIDE: In this e-guide, learn about the web security implications of Heartbleed, the security defect found in several OpenSSL versions. View now to find out whether your enterprise should be concerned and how to protect your data from this bug.
Posted: 11 Feb 2016 | Published: 09 Feb 2016

Symantec Website Security

SSL Certificate Management: How to Avoid Common Mistakes
sponsored by Symantec Website Security
EGUIDE: This expert e-guide describes the most common SSL certificate management mistakes and provides advice on how to avoid them. Discover how to choose the best certificates for your enterprise's needs, manage renewal of certificates, and more.
Posted: 11 Feb 2016 | Published: 08 Feb 2016

Symantec Website Security

Encryption's Risks, Benefits, and Roles in SSL Attacks
sponsored by Symantec Website Security
EGUIDE: In this e-guide, expert Nick Lewis details ways to defend against SSL attacks. First, you'll uncover how to detect SSL attacks by inspecting network connections for anomalies. Next, you'll learn the importance of decoding SSL connections to further enable their detection and, ultimately, their mitigation.
Posted: 10 Feb 2016 | Published: 04 Feb 2016

Symantec Website Security

How One Airborne Wi-Fi Provider Issued Fake Google SSL Certificates, and Faced the Consequences
sponsored by Symantec Website Security
EGUIDE: This e-guide features a case study on how Gogo LLC issued fake Google SSL certificates. Learn how this incident caused ripples in the security industry, and uncover ways some vendors are increasingly observing encrypted traffic.
Posted: 09 Feb 2016 | Published: 04 Feb 2016

Symantec Website Security

Do Your Employees Have the Freedom to Roam? CW Mobility E-Zine: January 2016
sponsored by TechTarget ComputerWeekly.com
EZINE: In this issue of CW Europe, you will take an in-depth look at the major mobile roaming charge concern that is set to impact people across 28 European Union member states. Read on to see if the end of roaming charges will lead to more enterprises adopting video conferencing services.
Posted: 21 Jan 2016 | Published: 21 Jan 2016

TechTarget ComputerWeekly.com

Breaking the Cyber Attack Lifecycle
sponsored by Palo Alto Networks
WHITE PAPER: This white paper discusses the modern landscape of cybersecurity, and how enterprises can detect and prevent attacks at every stage of the attack lifecycle, and remain agile in the face of advanced attacks.
Posted: 10 Dec 2015 | Published: 31 Mar 2015

Palo Alto Networks

Endpoint Security Management: Beyond Antivirus
sponsored by TechTarget Security
EBOOK: Access this e-book for expert tips from security experts on endpoint security that moves beyond outdated signature-based tools.
Posted: 10 Sep 2015 | Published: 10 Sep 2015

TechTarget Security

Protecting Data on the Go
sponsored by TechTarget Security
EBOOK: This guide informs InfoSec pros on the risks to business data carried on or accessed by employees' mobile devices and the best available protections for this business data on the go.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

TechTarget Security