IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Policies

RSS Feed   
ALSO CALLED: Device Security Policies, Information Security Policies, Remote Access Policies, Policy Management
DEFINITION: In business, a security policy is a document that states in writing how a company plans to protect the company's physical andinformation technology (IT) assets. A security policy is often considered to be a "living document", meaning that the document is never finished, but is continuously updated as technology and employee requirements change. A company's security policy may include an acceptable  … 

Security Policies definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Policies Multimedia (View All Report Types)
1 - 25 of 138 Matches Previous Page  |  Next Page
Security in the Fast Lane
sponsored by WhiteHat Security
WEBCAST: Today’s organizations rely on a collection of applications in order to maintain internal operations and interact with end-users. However, dangerous threats targeting data in these critical apps have emerged. Watch this webinar to learn more about the application security threat landscape, notable breaches and how to protect your apps.
Posted: 04 Dec 2020 | Premiered: Dec 4, 2020

WhiteHat Security

Cisco Umbrella and Ford Motor Company Coffee Hour
sponsored by Cisco Umbrella
VIDEO: With the unprecedented shift to remote work, organizations needed to quickly enable access to critical applications everywhere without compromising network performance or security protection. Pause and take in this Cisco webcast to learn how Ford Motor Company CISO Patrick Milligan secures 108,000 remote workers.
Posted: 04 Dec 2020 | Premiered: 10 Nov 2020

Cisco Umbrella

Cybersecurity: It's a Team Sport
sponsored by WhiteHat Security
WEBCAST: During the pandemic, cybercrime has quadrupled, leaving many organizations scrambling to strengthen their security posture. In this webinar, learn why it’s more important than ever for vendors, partners and customers to work together and build a true cybersecurity team to combat the evolving threat landscape.
Posted: 03 Dec 2020 | Premiered: Dec 3, 2020

WhiteHat Security

Accelerating Your Cloud Transformation with SASE
sponsored by McAfee
WEBCAST: With the massive spike in remote work, organizations are leveraging more cloud resources than ever. But are they doing so securely? What about network capability? The SASE framework empowers organizations to securely embrace the cloud while avoiding complexity, latency and high costs. Jump into this webinar and immerse yourself in SASE.
Posted: 02 Dec 2020 | Premiered: Dec 2, 2020

McAfee

Introduction to DNSDB Part 2: Walk
sponsored by Farsight Security
WEBCAST: Many people on the internet behave in a way that can be considered ‘unaccountable.’ Some may even use a proxy to hide their true identity. Find out how to see through the smokescreen and pin down the truly bad domains in this DNSDB webinar.
Posted: 02 Dec 2020 | Premiered: Dec 2, 2020

Farsight Security

The Guide to Managing the Security of your SaaS and Cloud Providers
sponsored by Panorays
WEBCAST: The rapid increase in cloud app usage has opened a massive threat vector. In fact, 59% of organizations have experienced a data breach caused by a third-party. Add a growing list of new regulations to the equation and management becomes a virtual nightmare. Leverage this webinar to learn how to improve your cloud security program.
Posted: 01 Dec 2020 | Premiered: Dec 1, 2020

Panorays

Introduction to DNSDB Part 1: Crawl
sponsored by Farsight Security
WEBCAST: Cheap, easy-to-obtain domain names, IP addresses and other DNS assets are helping to fuel today’s cybercrime, from spam and phishing to more sophisticated nation-state attacks. What can you do to stay protected? Jump into this webinar to learn how you can advance your threat intelligence and navigate roadblocks when using DNS in investigations.
Posted: 01 Dec 2020 | Premiered: Dec 1, 2020

Farsight Security

Device Security Is Crucial For Protecting Our Connected World
sponsored by Archetype
VIDEO: While digital transformations can equip your organizations with unmatched efficiency and agility, it’s critical to ensure security plays an equally critical role to ensure the security of connected devices. Watch this video to learn more about the threat of insecure devices and how to address it.
Posted: 30 Nov 2020 | Premiered: 20 Oct 2020

Archetype

The State of Election Security
sponsored by WhiteHat Security
WEBCAST: The topics of voter registration and election security were top-of-mind in 2020 – but what did we learn that we can use to better ourselves going forward? Watch this webinar, which overviews the state of election security, common threats, and best practices.
Posted: 30 Nov 2020 | Premiered: Nov 30, 2020

WhiteHat Security

Cloud Security Architecture for Zero Trust
sponsored by McAfee
WEBCAST: In today’s vulnerable world, access control with context through zero trust has given organizations the ability to allow access based on behavior. But what implications does this hold for cloud security? How does it affect user experience? Access this webinar to learn answers to these questions as well as zero-trust cloud security architecture.
Posted: 30 Nov 2020 | Premiered: Nov 30, 2020

McAfee

How to Elevate Your Threat Intelligence Program
sponsored by DomainTools
WEBCAST: According to the SANS 2020 Cyber Threat Intelligence Survey, 82% of organizations find value in threat intelligence, however, only 4% of respondents had processes in place to measure effectiveness. So, how do you demonstrate and quantify the value of your threat intelligence program? View this Forrester-sponsored webcast to learn the answer.
Posted: 25 Nov 2020 | Premiered: Nov 25, 2020

DomainTools

Taking Control of Your Post-COVID-19 Budget
sponsored by DomainTools
WEBCAST: With attackers taking advantage of the pandemic, threat surfaces increasing with remote work and budgets being reduced or postponed, security teams face a trifecta of challenges in maintaining or obtaining the resources they need to defend their organization. Watch this webcast featuring a CISO to learn how to make the most of the tools you have.
Posted: 25 Nov 2020 | Premiered: Nov 25, 2020

DomainTools

Detecting and Defending Against SSRF
sponsored by WhiteHat Security
WEBCAST: Server-side request forgery (SSRF) attacks are a critical threat to be aware of in today’s landscape – targeting restricted information by manipulating server sent requests in order to gain access. This WhiteHat webinar provides a comprehensive overview of SSRF, how it operates, common weak points, and how to defend against it – watch now.
Posted: 25 Nov 2020 | Premiered: Nov 25, 2020

WhiteHat Security

Evaluating and Measuring DDoS Risk During the COVID-19 Era
sponsored by Akamai Technologies
WEBCAST: Distributed denial-of-service (DDoS) attacks range from small and sophisticated to large and bandwidth-busting. Unplanned outages are costly, requiring fast and effective DDoS mitigation. Join Dennis Birchard, Akamai’s Lead Principal Cloud Security Architect, to learn about DDoS trends, mitigation strategies and more.
Posted: 25 Nov 2020 | Premiered: Nov 25, 2020

Akamai Technologies

How Certification Can Add Assurance for Digital Transformation at Scale
sponsored by Archetype
WEBCAST: The role of security and trust in delivering mass digital transformation will provide significant growth across multiple markets. But it’s important that security leaders move with the times. Watch this 20-minute webinar to learn the device level security baselines that anchor devices, services and insights together.
Posted: 24 Nov 2020 | Premiered: Jul 15, 2020

Archetype

How to Identify Threats Faster and Increase Productivity
sponsored by DomainTools
WEBCAST: With the rapid-fire speed of alerts and multitasking required in infosecurity, security operation center (SOC) professionals often must determine the potential outcomes of events with limited context. How can your teams reduce operational risk and be more productive? Watch this webinar to learn how to address this challenge and others.
Posted: 24 Nov 2020 | Premiered: Nov 24, 2020

DomainTools

How to Build a Robust Cyber Threat Intelligence Program
sponsored by DomainTools
WEBCAST: Organizations looking to implement cyber threat intelligence (CTI) grapple with two challenges: lack of trained staff or lack of skills needed to fully utilize CTI, and lack of time to implement new processes. Watch this SANS webinar to see how to develop an effective CTI program despite these challenges.
Posted: 24 Nov 2020 | Premiered: Aug 18, 2020

DomainTools

NWN SecureX Online Workshop
sponsored by NWN Corporation
VIDEO: Today’s cybersecurity paradigm has completely changed – security programs are now in the spotlight of the board of directors and security teams are faced with mounting pressure on numerous fronts. Watch this webinar to learn more about today’s challenges and how NWN is helping organizations address them.
Posted: 24 Nov 2020 | Premiered: 24 Nov 2020

NWN Corporation

Upgrade the Hunt with Splunk and DomainTools
sponsored by DomainTools
WEBCAST: Splunk has just released an update for its prominent app DomainTools that offers enhanced detection, monitoring and diagnostic capabilities as well as more customization, self-service capabilities and deeper contexts within enterprise security. Watch this webcast to learn how you may be able to take your threat hunt to the next level.
Posted: 23 Nov 2020 | Premiered: Nov 23, 2020

DomainTools

Securing Azure Environments: Insights from PetSmart, Microsoft & Barracuda
sponsored by Barracuda
VIDEO: Microsoft Azure plays an important role in many organizations’ digital transformation initiatives. As such, it becomes critical to understand the capabilities, limitations and potential benefits of Azure. Watch this webinar to gain insights into Azure from experts at PetSmart, Microsoft and Barracuda.
Posted: 23 Nov 2020 | Premiered: 23 Nov 2020

Barracuda

Discover How to Remove Security Barriers and Experience the Benefits of Azure
sponsored by Barracuda
WEBCAST: Digital transformation is well underway, requiring profound changes—and bringing a host of new benefits. As you prepare your organization to begin or advance its migration to Azure, you want up-to-date, actionable info about best practices in the cloud—including security. Watch this webcast to become more informed on these practices.
Posted: 20 Nov 2020 | Premiered: Apr 2, 2020

Barracuda

Reduce API Security Risks with Automated and Continuous API Scanning
sponsored by WhiteHat Security
WEBCAST: Digital businesses have widespread API usage, making it easier for organizations to share data and integrate with customer applications. However, APIs have increasingly become a target for attackers, leading to many serious data breaches in recent history. How do we reduce API security risks? View this webcast to learn why testing may be the key.
Posted: 20 Nov 2020 | Premiered: Jul 15, 2020

WhiteHat Security

NWN Security
sponsored by NWN Corporation
VIDEO: For NWN, security is about risk, control and measurement – they took these pillars into consideration when crafting their security offering. Watch this short video for an overview of NWN’s cybersecurity vision and capabilities.
Posted: 18 Nov 2020 | Premiered: 18 Nov 2020

NWN Corporation

Plenty of Phish: Why We Need a New Approach to Email Security
sponsored by Darktrace
VIDEO: The shift towards remote workforces has introduced a series of new phishing and other email security threats. Unfortunately, inbox gateways and other traditional email security methods no longer cut it. Watch this webinar for a closer look at these new challenges and discover Darktrace’s Immune System Approach to email security.
Posted: 18 Nov 2020 | Premiered: 18 Nov 2020

Darktrace

DevSecOps Framework – Technical Deep Dive
sponsored by WhiteHat Security
WEBCAST: Organizational infrastructure is becoming more and more vulnerable, and as a result, development teams are searching for ways to securely develop, build and deploy business-driving applications. So, what can these teams do to get started? They can begin by watching this webcast to learn the keys to a successful DevSecOps implementation.
Posted: 16 Nov 2020 | Premiered: Nov 16, 2020

WhiteHat Security
1 - 25 of 138 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info