IT Management  >   Systems Operations  >   Security  >  

Threats

RSS Feed    Add to Google    Add to My Yahoo!
Threats Reports
 
4 Requirements for a Multi-Cloud Security Approach
sponsored by Cloudvisory
WHITE PAPER: Discover how to replace your traditional network controls with a centralized security policy management platform that can enforce policy through the existing granular, cloud-native security controls of each provider for tighter security with 4 requirements.
Posted: 10 Apr 2017 | Published: 10 Apr 2017

Cloudvisory

SANS Survey: Security and Accountability in the Cloud Data Center
sponsored by McAfee, Inc.
WHITE PAPER: How has cloud security changed this year? Has it improved? Stayed the same? Worsened? This report summarizes the second annual SANS survey of IT professionals using a variety of cloud providers and service models, including SaaS, IaaS, and PaaS implementations.
Posted: 17 Apr 2017 | Published: 30 Nov 2016

McAfee, Inc.

Cybersecurity: The Rise of the Incident Response Platforms
sponsored by IBM
WHITE PAPER: In this ESG report learn how incident response platforms (IRPs) can solve many of the headaches plaguing IT and CISOs.
Posted: 12 Apr 2017 | Published: 12 Apr 2017

IBM

DevSecOps: How to Seamlessly Integrate Security Into DevOps
sponsored by Sonatype
WHITE PAPER: In this Gartner report discover strong recommendations for IT security professionals to preserve the teamwork, agility and speed of DevOps and agile development environments, while ensuring security.
Posted: 25 Apr 2017 | Published: 30 Sep 2016

Sonatype

Advanced Analytics and Machine Learning: A Prescriptive and Proactive Approach to Security
sponsored by McAfee, Inc.
WHITE PAPER: Overwhelmed by the immense volume of security intelligence and alerts, human analysts need machine learning to augment and accelerate their efforts. In this white paper learn how these programs adapt to threats based on new data in a 3 part learning process, separate static and dynamic data to sift the clean files from the malware, and more.
Posted: 11 Apr 2017 | Published: 28 Feb 2017

McAfee, Inc.

Focus ANZ: Security & Digital Transformation
sponsored by ComputerWeekly.com
EGUIDE: With cyber threats and attacks making headlines almost every day, cyber security has now become a key focus of many governments and enterprises all over the world. In this e-guide, read about the new measures the Australian government is putting in placeto protect critical systems from cyber attacks.
Posted: 07 Apr 2017 | Published: 07 Apr 2017

ComputerWeekly.com

Log Management and Analytics: Your Guide
sponsored by Logentries
WEBCAST: Discover a demonstration on exactly how to successfully manage logs, server data, and analytics.
Posted: 19 Apr 2017 | Premiered: Apr 13, 2017

Logentries

Rapid Growth of SSL Encryption
sponsored by Fortinet, Inc.
WHITE PAPER: Discover 8 parts of a successful encryption strategy. Also learn 5 factors aiding SSL traffic growth, 3 ways cybercriminals use SSL encryption nefariously, why enterprises often elect to not inspect SSL traffic, and more.
Posted: 11 Apr 2017 | Published: 11 Apr 2017

Fortinet, Inc.

Passwords Defined: Build Stronger Passwords
sponsored by Specops Software
WHITE PAPER: Learn 2 actionable insights to make your passwords less vulnerable to brute force and dictionary-style attacks. Discover what makes common passwords weak, and what to avoid when choosing yours.
Posted: 18 Apr 2017 | Published: 05 Dec 2016

Specops Software

7 Questions to Achieve GDPR Compliance
sponsored by Hewlett-Packard Enterprise
WEBCAST: Discover the answers to seven questions that can help you achieve GDPR compliance, covering subjects like how to address your readiness status, what information falls under these regulations, how to respond to legal matters, and more.
Posted: 07 Apr 2017 | Premiered: Nov 18, 2016

Hewlett-Packard Enterprise
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement