All Research Sponsored By:TechTarget Security

Intrusion Detection and Prevention: Decision Time
EBOOK: Learn how to evaluate your potential vendor's IDS/IPS product and its ability to meet your specific business requirements.
Posted: 02 Oct 2014 | Published: 02 Oct 2014


Intrusion Detection and Prevention: RFP Technology Decisions
EBOOK: To properly evaluate IDS/IPS products, you must understand vendor offerings and how well they fit with your organization.
Posted: 02 Oct 2014 | Published: 02 Oct 2014


Intrusion Detection and Protection: From Business Problem to Technical Solution
EBOOK: Learn how IDS/IPS help you thwart attacks and mitigate post-attack damage.
Posted: 02 Oct 2014 | Published: 02 Oct 2014


Information Security Magazine – October 2014
EZINE: Continuous monitoring has been part of the information security lexicon for years. So why are so many security professionals still wondering how to get a program started?
Posted: 01 Oct 2014 | Published: 01 Oct 2014


Data Loss Prevention: Decision Time
EBOOK: This expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.
Posted: 25 Sep 2014 | Published: 25 Sep 2014


Data Loss Prevention: RFP Technology Decisions
EBOOK: This expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.
Posted: 25 Sep 2014 | Published: 25 Sep 2014


Data Loss Prevention: From Business Problem to Technical Solution
EBOOK: This expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.
Posted: 25 Sep 2014 | Published: 25 Sep 2014


Windows Shopping: Will 8.1 Meet Your Security Needs?
EBOOK: Microsoft Windows 8.1 attempts to respond to a demand for new security features for network endpoints and user devices. This technical guide offers a concise review of its security features and whether MS Windows 8.1 fills its promises.
Posted: 12 Sep 2014 | Published: 12 Sep 2014


Information Security Magazine: September 2014
EZINE: Open source software vulnerabilities have security executives worried. Lower your risk by revisiting application security policy and enforcing development best practices.
Posted: 02 Sep 2014 | Published: 02 Sep 2014


Countering Cyber-Crime with a Sharp Eye and a Clear Plan
EBOOK: Bigger, more diverse networks mean a bigger attack surface for hackers. Today's networking pros must assess and update network security strategies to account for new vulnerabilities and respond to inevitable attacks.
Posted: 14 Aug 2014 | Published: 21 Aug 2014


Securing the Internet of Things
EBOOK: Discover the risks related to the IoT and what you can do to mitigate them. Gain an understanding of how traditional threats are altered by the IoT and what steps must be taken now to get a viable and effective IoT policy in place.
Posted: 13 Aug 2014 | Published: 12 Aug 2014


Information Security Magazine – July/August 2014
EZINE: Big data and security with non-relational data management platforms are too often an afterthought. Here's what you need to get started with NoSQL security.
Posted: 31 Jul 2014 | Published: 01 Aug 2014


Information Security ANZ July 2014
EZINE: This ezine looks at how will new privacy laws impact IT departments in Australia?
Posted: 27 Jun 2014 | Published: 27 Jun 2014


Information Security ASEAN July 2014
EZINE: This issue looks at the state of the Personal Data Protection Act in Singapore and Malaysia?
Posted: 27 Jun 2014 | Published: 27 Jun 2014


TechTarget's Annual Salary and Careers Survey Results
EBOOK: The results of TechTarget's 2013 IT Salary and Careers Survey chart the compensation, job satisfaction and project priorities of 1,711 IT professionals, including hundreds of senior IT leaders.
Posted: 11 Jun 2014 | Published: 11 Jun 2014

TOPICS:  Careers | Security

TechTarget's 2013 Annual Salary and Careers Infographic
EBOOK: TechTarget's 2013 Annual Salary and Careers Survey polled 1,711 IT professionals on their 2013 compensation, anticipated future earnings and technology priorities in 2014.
Posted: 11 Jun 2014 | Published: 11 Jun 2014

TOPICS:  Careers | Security

Information Security E-Zine – June 2014
EZINE: Global threat intelligence services have continued to evolve and play more of role in SIEM and endpoint security products. How can threat intelligence benefit risk scenarios?
Posted: 02 Jun 2014 | Published: 02 Jun 2014


Coming at You: How to Deal with the Latest DDoS Attacks
EBOOK: Access this TechGuide to learn more about DDoS threats and how to protect your systems—while shape-shifting cyberattackers are tough to stay ahead of, they're too destructive to ignore.
Posted: 14 May 2014 | Published: 15 May 2014


Insider Edition: There's No Room for Either/Or When It Comes to Cloud and Security
EBOOK: Improved capabilities for logging and reporting cloud-based activity are now available, as are new ways for cloud providers to certify and communicate their security postures. This Insider Edition looks at efforts such as the STAR certification and the recently announced CloudTrust protocol.
Posted: 14 May 2014 | Published: 15 May 2014


Information Security – May 2014
EZINE: The online authentication protocols proposed by the Fast Identity Online Alliance face a reality check. As FIDO-ready products ship, what are the implications for enterprises?
Posted: 30 Apr 2014 | Published: 30 Apr 2014


Information Security Magazine – April 2014
EZINE: In this issue, we help you assess your mobile security strategy in the face of emerging threats and attackers' use of mobile devices to carry out attacks.
Posted: 01 Apr 2014 | Published: 01 Apr 2014


Information Security ASEAN March 2014
EZINE: This ezine looks at the security challenges facing IT security professionals in the ASEAN region with a look at threats and industry trends.
Posted: 18 Mar 2014 | Published: 18 Mar 2014


Information Security ANZ March 2014
EZINE: This issue looks at the security challenges facing IT security professionals in the Australia/New Zealand region.
Posted: 18 Mar 2014 | Published: 18 Mar 2014


What’s the Best Focus for MDM Strategy Now?
EBOOK: This guide provides expert advice on how to craft a mobile device security strategy that safeguards enterprise assets and prevents minor security issues from becoming major security disasters.
Posted: 12 Mar 2014 | Published: 12 Mar 2014


Technical Guide on Application Security
EZINE: This expert Tech Guide from SearchSecurity.com offers insight on today's application security threat environment, as well as key recommendations and challenges with implementing the latest defense tools.
Posted: 06 Mar 2014 | Published: 31 Dec 2012