All resources sponsored by:

SearchSecurity.com

1 - 25 of 668 Matches
How to Implement a Strong COVID-19 Cybersecurity Plan
sponsored by SearchSecurity.com
EBOOK:Cybercriminals aren't slowing down during the pandemic, and neither can your security. Learn about the biggest threats right now and how to stop them cold.
Posted: 17 Jun 2020 | Published: 17 Jun 2020
Get This Now


Employ AI for Cybersecurity, Reap Strong Defenses Faster
sponsored by SearchSecurity.com
EBOOK:Adversaries are constantly changing their hacking techniques to bypass the strongest enterprise security systems. Meanwhile, businesses are adopting new and advanced technologies to protect their assets. In this e-guide, explore considerations for implementing the latest applications of AI for cybersecurity in your enterprise.
Posted: 17 Jun 2020 | Published: 17 Jun 2020
Get This Now


Security Access Controls Over Identities Must Be Priority
sponsored by SearchSecurity.com
EGUIDE:No company should take IAM for granted. Every business faces the potential of a breach, as evidenced by the access control struggles experienced by Amazon Web Services customers. In this e-guide, learn how important a role identity- and access-based security plays in keeping enterprise and individual data safe.
Posted: 12 Jun 2020 | Published: 12 Jun 2020
Get This Now


Finding a Secure Managed File Transfer Tool: Key considerations
sponsored by SearchSecurity.com
EBOOK:Read this expert guide to explore key considerations that should be reviewed prior to an MFT investment and learn about the advantages of using a solution with enterprise file synchronization and sharing abilities.
Posted: 01 Jun 2020 | Published: 01 Jun 2020
Get This Now


How to Keep Each Cloud Workload Accessible and Secure
sponsored by SearchSecurity.com
EBOOK:While the shared responsibility model of cloud security is still relevant, responsibility for keeping cloud workloads safe is increasingly falling more on the shoulders of the in-house security team and management. Download this handbook for everything you need to know about keeping your cloud workloads accessible and secure.
Posted: 29 Jan 2020 | Published: 29 Jan 2020
Get This Now


The Best Email Security Comes Through Strategy and Tactics
sponsored by SearchSecurity.com
EBOOK:Achieving the best email security possible should be a top InfoSec priority. Why? Attackers work day and night thinking up new ways to bypass IT security. In this security handbook, learn how to approach email security both strategically and tactically.
Posted: 29 Mar 2019 | Published: 29 Mar 2019
Get This Now


What secure email gateways can do for your enterprise
sponsored by SearchSecurity.com
EBOOK:It is important to evaluate secure email gateways before implementing them in your organization. Here's a look at some of the best email security gateway products in the industry, as well as implementation, cost and uses.
Posted: 14 Feb 2020 | Published: 14 Feb 2020
Get This Now


A Guide to SIEM Platforms, Benefits and Features
sponsored by SearchSecurity.com
EZINE:SIEM systems enable organizations to centralize indecent response, detection and handling, as well as data logging for compliance. This e-guide is a collection of resources highlighting SIEM benefits, criteria and tools. Read on to evaluate which SIEM system is right for you.
Posted: 09 Jan 2020 | Published: 09 Jan 2020
Get This Now


Assess Secure Web Gateways to Suit Your Network Security Needs
sponsored by SearchSecurity.com
ESSENTIAL GUIDE:Secure web gateways are complex security controls that sit between the user and the internet to protect the organization from advanced web security threats. This buyer’s guide can help simplify the buying process by addressing the key considerations for evaluating a secure web gateway and the features and functionality these products offer.
Posted: 04 Dec 2019 | Published: 04 Dec 2019
Get This Now


Why EDR Technologies are Essential for Endpoint Protection
sponsored by SearchSecurity.com
EBOOK:While an organization's most valuable and sensitive data and systems are usually well-protected on interior servers situated inside data centers and behind firewalls, it is on the network endpoints where external attacks begin. In this handbook, learn how to address endpoint security issues in your organization.
Posted: 20 Jun 2019 | Published: 20 Jun 2019
Get This Now


Who Needs Security Orchestration, Automation and Response?
sponsored by SearchSecurity.com
EBOOK:Who needs SOAR? The understaffed security team. Or put it another way: most security teams. In this SOAR guide, our expert contributor providers a detailed list of potential uses and details of what SOAR can do to boost the security of an organization's systems and data.
Posted: 08 May 2019 | Published: 08 May 2019
Get This Now


Secure DevOps Brings Better, Faster, Safer Software
sponsored by SearchSecurity.com
EBOOK:In the rush to implement DevOps, security is too often overlooked. But DevSecOps is essential in these hack-filled days. Learn how you can add security to software development today.
Posted: 03 May 2019 | Published: 03 May 2019
Get This Now


Who needs security orchestration, automation and response?
sponsored by SearchSecurity.com
EBOOK:Who needs SOAR? Only those companies with understaffed, overworked IT security teams. Or in other words; most security teams. Learn how SOAR tools can help ease the burden of required security tasks and free up security pros for more challenging IT security projects.
Posted: 17 Apr 2019 | Published: 17 Apr 2019
Get This Now


Incident response playbook in flux as services, tools arrive
sponsored by SearchSecurity.com
EBOOK:The enterprise incident response "playbook" is getting a rewrite. An IR playbook guides an enterprise security team's work, identifying triggering events and outlining best practices or regulatory requirements. Download this handbook to learn more about the essential playbook revisions that are putting new technologies and services to use.
Posted: 12 Feb 2019 | Published: 12 Feb 2019
Get This Now


Explore the Threat Hunting Process
sponsored by SearchSecurity.com
EZINE:The threat hunting process hinges on an expert's ability to create hypotheses and to hunt for patterns and indicators of compromise in data-driven networks. In this issues of Information Security, explore learn how threat hunting programs can find security holes that machine learning or automated systems fail to detect.
Posted: 12 Feb 2019 | Published: 12 Feb 2019
Get This Now


Allure of the threat hunter draws companies large and small
sponsored by SearchSecurity.com
EZINE:Do you need a threat hunter on your analyst team? Threat hunting allows companies to be proactive, rather than wait for attackers to trigger alarms after they have already infiltrated an organization's systems. Yet not every company is ready to employ threat hunting techniques.
Posted: 29 Nov 2018 | Published: 29 Nov 2018
Get This Now


User behavior analytics tackles cloud, hybrid environments
sponsored by SearchSecurity.com
EZINE:In this issue of Information Security, explore why organizations are investing in user behavior analytics for on-premises and cloud.
Posted: 28 Sep 2018 | Published: 28 Sep 2018
Get This Now


How to Best Secure DNS? There's More Than One Approach
sponsored by SearchSecurity.com
EBOOK:Few aspects of the internet are as crucial as the domain name system. A DNS failure could bring the internet to a halt. What approach are you taking to protect and secure DNS in your organization? Download this handbook for insights into effective DNS security approaches.
Posted: 24 Aug 2018 | Published: 24 Aug 2018
Get This Now


Recent Ransomware Attacks Got you? Don't Cry; Fight Back!
sponsored by SearchSecurity.com
EBOOK:Recent ransomware attacks may make you WannaCry, but there's no time for that. It's time to learn what you can do to minimize the threat and how to deal if the worst happens. Start here to discover how to fight back against hackers, today.
Posted: 24 Aug 2018 | Published: 24 Aug 2018
Get This Now


Security data scientists on how to make your data useful
sponsored by SearchSecurity.com
EZINE:In this issue of Information Security magazine, CISOs and security data scientists offer strategies for effective use of data analytics and machine learning to advance enterprise threat research.
Posted: 03 Aug 2018 | Published: 03 Aug 2018
Get This Now


Get Smart About Threat Intel Tools and Services
sponsored by SearchSecurity.com
EBOOK:Learn how threat intelligence tools can improve enterprise security and where they should fit into the broader security scheme.
Posted: 25 Jun 2018 | Published: 25 Jun 2018
Get This Now


How to Make a SIEM System Comparison Before you Buy
sponsored by SearchSecurity.com
EBOOK:Considering a SIEM system that employs machine learning? It's a great idea, but your SIEM will still need considerable human input to be effective. Open this security buyer's handbook to learn what SIEM features are essential for your company.
Posted: 21 Jun 2018 | Published: 21 Jun 2018
Get This Now


CISOs face the IoT security risks of stranger things
sponsored by SearchSecurity.com
EZINE:Strategies to manage IoT security risks remain in the early stages outside of healthcare and a few other industries. It's not just data that can be stolen or your PC crippled; now your HVAC unit and your robotic manufacturing process or your company truck are targets, too.
Posted: 01 Jun 2018 | Published: 01 Jun 2018
Get This Now

TOPICS:  Security

CISOs Map Out Their 2018 Cybersecurity Plans
sponsored by SearchSecurity.com
EZINE:As attack vectors increase and cyberattacks become more sophisticated, how are CISOs preparing? Find out inside this issue of Information Security magazine, where security professionals detail the process of developing effective one-year cybersecurity plans.
Posted: 23 Apr 2018 | Published: 23 Apr 2018
Get This Now


Cyber-Risk Strategies and Models for a Post-Perimeter Age
sponsored by SearchSecurity.com
EBOOK:In our expert handbook, managing editor Brenda Horrigan and Nemertes Research president Johna Till Johnson explain how to implement a zero-trust approach to cybersecurity.
Posted: 20 Apr 2018 | Published: 20 Apr 2018
Get This Now


1 - 25 of 668 Matches
Page: 2 3 4 5 6 7 8 9 10 11 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info