IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security Reports
226 - 250 of 3025 Matches Previous Page  |  Next Page
Top 6 Security Considerations in Migrating to Microsoft Windows 10
sponsored by Absolute
WHITE PAPER: Examine 6 of the most important IT security considerations in migrating to Windows 10. Discover how persistent endpoint security tools can help you address these challenges and enable your devices to stay secure beyond the operating system upgrades.
Posted: 04 Nov 2016 | Published: 31 Oct 2016

Absolute

MicroScope - November 2016: Resellers reach for the cloud
sponsored by MicroScope
EZINE: This themed issue looks at the opportunities for the channel in helping customers make the transition to the cloud
Posted: 04 Nov 2016 | Published: 04 Nov 2016

MicroScope

Ultimate Guide to Application Security
sponsored by Veracode, Inc.
WHITE PAPER: Learn how to work with appropriate teams to develop a clear application security strategy with concrete requirements for security policies. This, combined with selecting the right application security partners, can ensure your ability to create an advanced application security program that systemically reduces risk and enables innovation.
Posted: 03 Nov 2016 | Published: 31 Oct 2016

Veracode, Inc.

Cloud Security Playbook: Strategies & Best Practices for Today's Volatile Threat Landscape
sponsored by ThreatStack
WHITE PAPER: Learn strategies, best practices, and expert advice to help your company thrive amidst today's volatile cloud threat landscape.
Posted: 02 Nov 2016 | Published: 02 Nov 2016

ThreatStack

3 Types of Insider Threats to Watch Out For
sponsored by Absolute
WHITE PAPER: Learn how to proactively spot an insider threat. This white paper gives you an overview of each insider threat profile so you can easily identify behavior and determine an appropriate response when faced with a potential insider threat.
Posted: 02 Nov 2016 | Published: 31 Oct 2016

Absolute

2016 State of Software Security
sponsored by Veracode, Inc.
WHITE PAPER: This report provides you with tangible AppSec benchmarks with which to measure your own programs against. Discover stats and figures on the risk of applications and overall industry remediation trends.
Posted: 02 Nov 2016 | Published: 31 Oct 2016

Veracode, Inc.

Five Principles for Securing DevOps
sponsored by Veracode, Inc.
WHITE PAPER: Discover how to successfully integrate security with DevOps and learn 5 principles your security strategy must address. Furthermore, understand how DevOps and CI/CD are different from Agile development and how this difference changes the requirements for application security.
Posted: 02 Nov 2016 | Published: 31 Oct 2016

Veracode, Inc.

The 2016 Economics of Web Scraping Report
sponsored by Distil Networks
WHITE PAPER: Access this report to learn how web scraper bots are a threat to your online content, how exactly these malicious bots are costing you money, and most importantly, what you can do to protect your content – and your revenue.
Posted: 01 Nov 2016 | Published: 01 Nov 2016

Distil Networks

CW ASEAN November 2016
sponsored by SearchSecurity.com
EZINE: Small businesses in the ASEAN region could unknowingly be allowing hackers to access large corporate networks.
Posted: 01 Nov 2016 | Published: 31 Oct 2016

SearchSecurity.com

CW ANZ November 2016
sponsored by SearchSecurity.com
EZINE: With the number of cyber incidents identified by Australian organisations more than doubling in the past year, PwC is using an online game to give enterprises first-hand experience of what it means to face a cyber attack.
Posted: 01 Nov 2016 | Published: 31 Oct 2016

SearchSecurity.com

A Guide for Building PCI DSS & HIPAA Compliant Businesses in the Cloud
sponsored by ThreatStack
WHITE PAPER: Where do you begin your cloud compliance journey? In this guide, learn to better understand the complexities of cloud compliance requirements, without all the headaches and confusion. Uncover how compliance differs in the cloud, why security monitoring is critical to achieving compliance, and more.
Posted: 01 Nov 2016 | Published: 01 Nov 2016

ThreatStack

Straddling the Security Divide Between On-Premises and Cloud
sponsored by SearchSecurity.com
EZINE: Legacy security tools designed for data centers don't work well in cloud infrastructures. We help you conquer the divide between on-premises and cloud security in this issue of Information Security.
Posted: 01 Nov 2016 | Published: 01 Nov 2016

SearchSecurity.com

The Rise of Ransomware
sponsored by Barracuda Networks
WHITE PAPER: Discover eye-opening statistics about the ever-increasing ransomware problems against today's enterprises. Learn what types of attacks are taking place, where these attacks are taking place and what you can do to best protect your organization from financial and brand name disaster.
Posted: 01 Nov 2016 | Published: 01 Sep 2016

Barracuda Networks

Next Generation Computing: There's Never Been a Better Time to Refresh
sponsored by DELL INTEL and MICROSOFT
BROCHURE: Dell, Intel, and Microsoft have put together an interactive eGuide on next-generation computing. In this eGuide they describe the main drivers for, and benefits of refreshing the hardware for increased productivity, security and a lower Total Cost of Ownership (TCO).
Posted: 01 Nov 2016 | Published: 01 Nov 2016


User Behavioral Analytics Tools Can Thwart Security Attacks
sponsored by Preempt Security
EGUIDE: Inside this expert e-guide, Johna Till Johnson explores the emerging world of User Behavioral Analytics (UBA) and how it can give you a clear view into what should, and what should not, be going on in your virtual environment. Inside you'll find a breakdown of the features a UBA provides, and a basic deployment plan to get your program running.
Posted: 31 Oct 2016 | Published: 31 Oct 2016

Preempt Security

The Ultimate Guide to Preventing Account Takeover
sponsored by Distil Networks
WHITE PAPER: 46% of internet traffic is composed of bots at any given time performing automated tasks or mimicking human behavior. Access this resource to uncover the 7 steps to mitigate account take over bots, how to under their purpose and how to stop them in their tracks.
Posted: 31 Oct 2016 | Published: 31 Oct 2016

Distil Networks

Transforming Your Security: A New Era in Enterprise Firewalls
sponsored by Fortinet, Inc.
WHITE PAPER: Discover how to increase security effectiveness and reduce complexity by consolidating network security across the entire threat surface. Take a holistic approach, with central visibility and control of the borderless enterprise managed through a single pane of glass.
Posted: 31 Oct 2016 | Published: 30 Sep 2016

Fortinet, Inc.

The SecOps Playbook
sponsored by ThreatStack
WHITE PAPER: Make SecOps a reality at your organization. The goal of SecOps is to help companies deliver software more efficiently and more securely. This resource offers a brief history of SecOps and six steps to get off the ground with a successful program for your enterprise.
Posted: 28 Oct 2016 | Published: 28 Oct 2016

ThreatStack

Personify your Security Team and Gain Access a Recent Email Security Report
sponsored by Mimecast
WHITE PAPER: This e-book reveals five IT security personas that are common within vulnerable organizations. Find out how to evolve your security team from Nervous to Vigilant, and gain access to the Mimecast Business Email Threat Report 2016.
Posted: 28 Oct 2016 | Published: 28 Oct 2016

Mimecast

Bot Defense Insights for Thwarting Automated Threats
sponsored by Distil Networks
WHITE PAPER: Learn not only what bots are but why they are a significant threat, why bad bots are created, and how to tackle the threat they represent to your enterprise. Access now to discover how to keep your organization safe from this very real menace.
Posted: 28 Oct 2016 | Published: 28 Oct 2016

Distil Networks

User Provisioning Best Practices: Access Recertification
sponsored by STEALTHbits
EGUIDE: User access recertification is the process of continually auditing users' permissions to make sure they have access only to what they need. Implementing recertification, however, can be challenging. Get best practices on creating a recertification process in this e-guide from IAM expert Randall Gamby.
Posted: 04 Nov 2016 | Published: 31 Oct 2016

STEALTHbits

Your Guide to Securing Office 365
sponsored by MobileIron
WHITE PAPER: Learn how to employ a security model focused on mobile device deployment of Office 365. Discover how to distribute apps securely, protect app data-at-rest on the device, protect app data-in-motion to back-end services, and more.
Posted: 04 Nov 2016 | Published: 04 Nov 2016

MobileIron

Learn New Techniques For Preventing Data Loss In The Cloud
sponsored by Blue Coat Systems
EGUIDE: This e-guide outlines the risks the cloud exposes modern enterprises to, and explores new options in cloud security like third-party cloud access security brokers (CASBs). Learn about several tools available that can let CIOs gain the visibility to prioritize cloud apps based on their security risk, and more.
Posted: 04 Nov 2016 | Published: 04 Nov 2016

Blue Coat Systems

Four Top Cybercrime Trends
sponsored by IBM
WHITE PAPER: Today, organizations are going back to the basics. The major cybersecurity trends of recent can largely be addressed by focusing on "security 101." Learn how to reduce enterprise risk and limit attackers' opportunities as much as possible.
Posted: 02 Nov 2016 | Published: 31 Dec 2015

IBM

Reviewing a Year of Serious Data Breaches, Major Attacks and New Vulnerabilities
sponsored by IBM
WHITE PAPER: Discover which industries were hit hardest in 2015 and what these attacks mean for the future. Learn what steps you can take to prepare your security plan for growing threats in 2016 and beyond.
Posted: 02 Nov 2016 | Published: 01 Apr 2016

IBM
226 - 250 of 3025 Matches Previous Page    8 9 10 11 12 13    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement