All resources sponsored by:

SearchSecurity.com

1 - 25 of 671 Matches
User behavior analytics tackles cloud, hybrid environments
sponsored by SearchSecurity.com
EZINE:Organizations are investing in user behavior analytics for on-premises and cloud as UBA integration with SIEM, data loss prevention and other security technologies continue to broaden the threat detection and response of security operations centers.
Posted: 28 Sep 2018 | Published: 28 Sep 2018
Get This Now


IT Security Roadmap 2019; How to survive emerging threats and thrive in complexity
sponsored by SearchSecurity.com
VIRTUAL TRADESHOW:In this virtual conference, produced jointly by ISACA, SearchSecurity.com, and SearchCompliance.com, our experts will examine the shifts in enterprise IT, the future of endpoint security, and how to mitigate IT complexity new technology trends bring. We'll bring together expert insights for achieving a secure and compliant infrastructure.
Posted: 12 Sep 2018 | Premiered: Sep 7, 2018
Get This Now


How to Best Secure DNS? There's More Than One Approach
sponsored by SearchSecurity.com
EBOOK:Few aspects of the internet are as crucial as the domain name system. A DNS failure could bring the internet to a halt. What approach are you taking to protect and secure DNS in your organization? Download this handbook for insights into effective DNS security approaches.
Posted: 24 Aug 2018 | Published: 24 Aug 2018
Get This Now


Recent Ransomware Attacks Got you? Don't Cry; Fight Back!
sponsored by SearchSecurity.com
EBOOK:Recent ransomware attacks may make you WannaCry, but there's no time for that. It's time to learn what you can do to minimize the threat and how to deal if the worst happens. Start here to discover how to fight back against hackers, today.
Posted: 24 Aug 2018 | Published: 24 Aug 2018
Get This Now


Security data scientists on how to make your data useful
sponsored by SearchSecurity.com
EZINE:In this issue of Information Security magazine, CISOs and security data scientists offer strategies for effective use of data analytics and machine learning to advance enterprise threat research.
Posted: 03 Aug 2018 | Published: 03 Aug 2018
Get This Now


Get Smart About Threat Intel Tools and Services
sponsored by SearchSecurity.com
EBOOK:Learn how threat intelligence tools can improve enterprise security and where they should fit into the broader security scheme.
Posted: 25 Jun 2018 | Published: 25 Jun 2018
Get This Now


How to Make a SIEM System Comparison Before you Buy
sponsored by SearchSecurity.com
EBOOK:Considering a SIEM system that employs machine learning? It's a great idea, but your SIEM will still need considerable human input to be effective. Open this security buyer's handbook to learn what SIEM features are essential for your company.
Posted: 21 Jun 2018 | Published: 21 Jun 2018
Get This Now


Information Security: Companies Aren't the Only Ones Migrating to Cloud
sponsored by SearchSecurity.com
EZINE:Hackers are embracing all advantages of the cloud, launching lucrative attacks like malicious cryptomining, DDoS, and ransomware. In this issue of Information Security magazine, editor Kathleen Richards looks at cloud security in 2018 and reveals strategies to protect sensitive data from new internal and external threats.
Posted: 03 Apr 2018 | Published: 03 Apr 2018
Get This Now


The Tug of War Between UBA and SIEM
sponsored by SearchSecurity.com
EZINE:In this issue of Information Security magazine, we look at SIEM, UBA tools and considerations for effectively implementing user behavior analytics. Additionally, our experts dive into Q&A with John Germain, CISO at Duck Creek Technologies and security research expert, Blaine Burnham.
Posted: 01 Dec 2017 | Published: 01 Dec 2017
Get This Now


CISOs Map Out Their 2018 Cybersecurity Plans
sponsored by SearchSecurity.com
EZINE:As attack vectors increase and cyberattacks become more sophisticated, how are CISOs preparing? Find out inside this issue of Information Security magazine, where security professionals detail the process of developing effective one-year cybersecurity plans
Posted: 17 Aug 2018 | Published: 17 Aug 2018
Get This Now


How to Create Marketing Reports Your Boss Actually Cares About
sponsored by SearchSecurity.com
RESOURCE:Have you ever heard the quote "Those who do not learn history are doomed to repeat it."? Reports and analysis are a business' way of learning history. In this 33-page guide learn how to create detailed marketing reports that provide you with 3 essential ingredients for effective reporting insights.
Posted: 18 Jun 2018 | Published: 21 Jun 2018
Get This Now


CISOs face the IoT security risks of stranger things
sponsored by SearchSecurity.com
EZINE:Strategies to manage IoT security risks remain in the early stages outside of healthcare and a few other industries. It's not just data that can be stolen or your PC crippled; now your HVAC unit and your robotic manufacturing process or your company truck are targets, too.
Posted: 01 Jun 2018 | Published: 01 Jun 2018
Get This Now

TOPICS:  Security

CISOs Map Out Their 2018 Cybersecurity Plans
sponsored by SearchSecurity.com
EZINE:As attack vectors increase and cyberattacks become more sophisticated, how are CISOs preparing? Find out inside this issue of Information Security magazine, where security professionals detail the process of developing effective one-year cybersecurity plans.
Posted: 23 Apr 2018 | Published: 23 Apr 2018
Get This Now


Cyber-Risk Strategies and Models for a Post-Perimeter Age
sponsored by SearchSecurity.com
EBOOK:In our expert handbook, managing editor Brenda Horrigan and Nemertes Research president Johna Till Johnson explain how to implement a zero-trust approach to cybersecurity.
Posted: 20 Apr 2018 | Published: 20 Apr 2018
Get This Now


The time is ripe to implement cybersecurity automation
sponsored by SearchSecurity.com
EBOOK:It's past time to implement cybersecurity automation. Learn what automation can do for your IT defenses and how to get started in our latest handbook.
Posted: 23 Mar 2018 | Published: 23 Mar 2018
Get This Now


Mobile security trends point to unifying policy and tools
sponsored by SearchSecurity.com
EBOOK:Mobile security trends reflect how threats shift and devices evolve. The trend now in mobile security is toward unified endpoint management.
Posted: 20 Feb 2018 | Published: 20 Feb 2018
Get This Now


Crafting a Cybersecurity Incident Response Plan, Step by Step
sponsored by SearchSecurity.com
EBOOK:Is your cybersecurity incident response plan the best it can be? Inside this expert handbook, Johna Till Johnson, Rob Shapland and Mike Villegas uncover step by step instructions to crafting an effective incident response plan and cloud incident response plan for your organization.
Posted: 13 Feb 2018 | Published: 13 Feb 2018
Get This Now


CISOs Map Out Their 2018 Cybersecurity Plans
sponsored by SearchSecurity.com
EZINE:As attack vectors increase and cyberattacks become more sophisticated, how are CISOs preparing? Find out inside this issue of Information Security magazine, where security professionals detail the process of developing effective one-year cybersecurity plans.
Posted: 01 Feb 2018 | Published: 01 Feb 2018
Get This Now


Defense-In-Depth Security: Key to Keeping IT Safe
sponsored by SearchSecurity.com
EBOOK:The enterprise perimeter's demise is in part due to BYOD. Leverage this expert handbook to uncover an effective approach to constructing your IT security "fortress" and replacing the outdated idea of a security perimeter.
Posted: 19 Jan 2018 | Published: 19 Jan 2018
Get This Now


Botnet attacks are evolving; your defenses must too
sponsored by SearchSecurity.com
EBOOK:Botnet attacks will expand and evolve. The best way to fight back is to stop searching for the perfect botnet-protection tool and layer defenses instead.
Posted: 15 Jan 2018 | Published: 15 Jan 2018
Get This Now


What GDPR privacy requirements mean for U.S. businesses
sponsored by SearchSecurity.com
EBOOK:Enforcement of the EU's new GDPR privacy regulations is imminent, and potential fines send a clear message to companies to protect their customers, or else.
Posted: 27 Dec 2017 | Published: 26 Dec 2017
Get This Now


Security Analysis Principles and Techniques for IT Pros
sponsored by SearchSecurity.com
EBOOK:As a result of the recent developments affecting security analytics, uncover these tips for ensuring you get the most out of your security analytics tool.
Posted: 01 Dec 2017 | Published: 01 Dec 2017
Get This Now


The Case for Modern SOCs
sponsored by SearchSecurity.com
EZINE:In this issue of ISM we look at ways to optimize the next-gen SOC and integration and automation strategies that will help you get there. Additionally, our experts dive into Q&A with the Xerox CISO, how companies are using threat intelligence, why companies are failing to manage vulnerabilities in critical systems and applications, and more.
Posted: 02 Nov 2017 | Published: 02 Nov 2017
Get This Now


What does a CISO do now? It's a changing, increasingly vital role
sponsored by SearchSecurity.com
EBOOK:What does a CISO do now, with risks proliferating and the most-needed security skills in short supply? Learn why the CISO role is more vital than ever.
Posted: 11 Oct 2017 | Published: 11 Oct 2017
Get This Now


Steps to Protect Your Growing Data
sponsored by SearchSecurity.com
EZINE:The distribution of data and the many ways in which it can be accessed has made handling data protection risks especially challenging. In this issue of Information Security, security experts examine data protection risks and considerations for implementing a data - centric security model.
Posted: 02 Oct 2017 | Published: 02 Oct 2017
Get This Now


1 - 25 of 671 Matches
Page: 2 3 4 5 6 7 8 9 10 11 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement