IT Management  >   Systems Operations  >  

System Security

RSS Feed    Add to Google    Add to My Yahoo!
System Security Reports
PCI 3.0: Top 10 Ways PCI 3.0 Will Affect Your Application Security Program
sponsored by WhiteHat Security
WEBCAST: This recording of a live webcast provides a detailed description about how the newest PCI requirements will affect your application security program.
Posted: 01 Oct 2015 | Premiered: Dec 31, 2013

WhiteHat Security

Heartbleed and OpenSSL Risks in the UK
sponsored by Venafi
EGUIDE: This expert guide discusses why so many organizations remain vulnerable to Heartbleed and OpenSSL and suggests ways you can ensure you're not one of them.
Posted: 23 Sep 2015 | Published: 23 Sep 2015


The Best-of-Breed Enterprise Mac Management
sponsored by JAMF Software
WHITE PAPER: This brief white paper outlines three key areas of Mac management and highlights the benefits of a best-of-breed Mac management solution. Access this paper to manage inventory, deployment, and security with an integrated enterprise mobility management approach.
Posted: 09 Oct 2015 | Published: 09 Oct 2015

JAMF Software

Security Certificates and Cryptographic Keys in Peril
sponsored by Venafi
EGUIDE: This expert guide discusses why security certificates and cryptographic keys can no longer be trusted and how you can stay safe from hacks that exploit them.
Posted: 25 Sep 2015 | Published: 25 Sep 2015


Increase Productivity and Reduce Risk with Secure File Sharing & Collaboration
sponsored by BlackBerry
WHITE PAPER: This white paper highlights an EFSS solution that allows you to take back control over your data, combining the benefits of productivity and collaboration with security. Access this paper now to bolster your business against third-party threats with 6 steps for deploying secure EFSS.
Posted: 12 Oct 2015 | Published: 12 Oct 2015


Real-Time Protection from Advanced Web Threats
sponsored by Trustwave
WHITE PAPER: This white paper discusses how you can stay safe from web-based attacks without compromising your organization's online presence.
Posted: 05 Oct 2015 | Published: 31 Dec 2014


Use Case On-Demand Webinar:  How West Virginia University Reduced Its Sensitive Data Footprint
sponsored by Identity Finder, LLC
WEBCAST: In the following webinar, chief information security officer Alex Jalso discusses best practices for reducing your sensitive data footprint. Tune in to learn how to identify a sensitive data footprint within your security environment.
Posted: 12 Oct 2015 | Premiered: Oct 12, 2015

Identity Finder, LLC

Case Study: Securing Files Anywhere in the World
sponsored by FinalCode
WHITE PAPER: By using a case study of one successful corporation, this white paper examines what you can do to maintain the confidentiality of all your files, no matter who has access to them.
Posted: 05 Oct 2015 | Published: 30 Apr 2015


Taking Control of Cloud Data: A Realistic Approach to Data Encryption
sponsored by Vaultive
WHITE PAPER: This paper outlines the new set of technical approaches for extending ownership and control for the computing model based on encryption in use, as well as distinguishes between evaluating the security and resiliency of the cloud service provider's environment.
Posted: 23 Sep 2015 | Published: 23 Sep 2015


How to Detect and Defend against Fraudulent Certificates
sponsored by Venafi
EGUIDE: In this expert guide, you'll find tips on detecting and mitigating the fraudulent certificates used by the Flame malware, Zeus, and more.
Posted: 24 Sep 2015 | Published: 24 Sep 2015

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement