IT Management  >   Systems Operations  >  

Systems Security

RSS Feed    Add to Google    Add to My Yahoo!
Systems Security Reports
 
The Changing Workforce: Automation & the Role of Ex-Hackers
sponsored by Radware
WHITE PAPER: The wave of automation is forcing companies to think differently about how they structure their security resources. Learn what your peers are doing to keep the network impermeable, including employing ex-hackers, automating security models, and more.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Radware

Mobile Security and Risk Review
sponsored by MobileIron
WHITE PAPER: Uncover an in-depth look into the modern threat landscape of mobile security, where it has come from, and where it is going. Discover how new threats have emerged on the scene, what tactics they are using, and how to effectively counter them.
Posted: 12 Sep 2016 | Published: 12 Sep 2016

MobileIron

Penetration Testing Services Data Sheet
sponsored by IBM
DATA SHEET: Since high-profile data breaches have become routine, a programmatic approach to security testing and vulnerability management is required. This resource details a security service that will document your unique set of requirements for determining risk and create a custom tool to recommend a testing profile for each of your targets.
Posted: 22 Sep 2016 | Published: 29 Jul 2016

IBM

How Healthcare Benefits from Cloud-delivered Security
sponsored by OpenDNS
WHITE PAPER: By utilizing the cloud for healthcare, you can enhance security today while ensuring scalability into the future. Learn how to deal with malware, ransomware and other threats that impact patient well-being and best come into regulatory compliance with the cloud.
Posted: 29 Sep 2016 | Published: 31 Aug 2016

OpenDNS

Inside the 2016 Verizon Data Breach Investigations Report
sponsored by Intel Security
WEBCAST: Join Marc Spitler, Senior Manager at Verizon Security Research, and Raj Samani, CTO for EMEA at Intel Security, as they go over findings from this year's Data Breach Investigation Report.
Posted: 26 Sep 2016 | Premiered: Sep 26, 2016

Intel Security

Not All Certificate Authorities are Created Equal
sponsored by Symantec
WHITE PAPER: Learn the importance of continual hardening of the infrastructure that protects cryptographic keys and securing the authentication process that validates identity. Uncover how to maximize SSL encryption effectiveness, utilize daily penetration testing, and create a secure certificate authorities environment.
Posted: 29 Sep 2016 | Published: 29 Sep 2016

Symantec

Streamlining Security Incident and Vulnerability Response
sponsored by ServiceNow
WHITE PAPER: Discover vital shortcomings in the way IT defends itself from incidents and breaches, and how to shore up your own defenses. Learn how to integrate security and IT tools while coordinating incident response, reducing time-until-response, and remediate issues quickly.
Posted: 29 Sep 2016 | Published: 29 Sep 2016

ServiceNow

SHA-1 is Dead. Long live SHA-2!
sponsored by Certified Security Solutions (CSS)
WHITE PAPER: Discover how to quickly and effectively implement a SHA-1 depreciation plan to ensure that every certificate in your organization is based on the new SHA-2 algorithm. Learn why SHA-1 is out, the reasons behind deprecation timing, and best practices and resources for your SHA-2 migration.
Posted: 16 Sep 2016 | Published: 16 Sep 2016

Certified Security Solutions (CSS)

Say Hello, Again, to SIEM
sponsored by SearchSecurity.com
EBOOK: SIEM products are ever-changing technologies. Here's what you need to know now about security information and event management tools.
Posted: 22 Sep 2016 | Published: 31 Aug 2016

SearchSecurity.com

Focus: Securing new technology
sponsored by ComputerWeekly.com
EGUIDE: The scarcity of information security professionals with the required depth and breadth of experience is one of the biggest challenges facing businesses. As businesses seek to gain competitive edge through digital transformation, they are increasingly exposing themselves to increasing risk of cyber attack.
Posted: 29 Sep 2016 | Published: 29 Sep 2016

ComputerWeekly.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement