IT Management  >   Systems Operations  >  

Computer Security

RSS Feed   
DEFINITION: A trusted platform module (TPM) is a specialized chip that can be installed on the motherboard of a personal computer for the purpose of hardware authentication . The TPM authenticates the computer in question rather than the user. To do so, TPM stores information specific to the host system, such as encryption keys, digital certificate s and password s.TPM minimizes the risk that data on the computer  … 

Computer Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
Computer Security White Papers (View All Report Types)
 
Your Email Security is Ineffective, and Getting Worse
sponsored by Ironscales
WHITE PAPER: The impacts of phishing attacks continue to expose the gaps in current email security tactics and highlights why organizations need to adapt their existing approach to meet the requirements of modern threats. Read on to uncover the key data insights from this Aberdeen study into the email security landscape.
Posted: 14 Jan 2020 | Published: 30 Jun 2019

Ironscales

Decluttering Your Security Environment
sponsored by Mimecast
WHITE PAPER: While it’s natural to think that the solution to increased security risk is incorporating more technology, overcomplicating your environment with tools – and not the right personnel – can lead to increased risk. In this white paper, leverage expertise from a recent think tank for advice on how to address cybersecurity complexity.
Posted: 11 Dec 2019 | Published: 11 Dec 2019

Mimecast

Machine Learning for Effective Micro-Segmentation
sponsored by ShieldX
WHITE PAPER: Learn how your organization could significantly improve security and decrease total cost of ownership with a micro-segmentation solution that employs machine learning.
Posted: 24 Jan 2020 | Published: 24 Jan 2020

ShieldX

How to Become Cyber Resilient: A Digital Enterprise Guide
sponsored by Malwarebytes
WHITE PAPER: Tap into this white paper to explore the current market influences that impact how an organization pursues cyber resilience, the key methods that should be adopted in becoming cyber resilient, and the reasons why cyber resilience can transform an organization into a digital enterprise highly focused on growth.
Posted: 24 Jan 2020 | Published: 24 Jan 2020

Malwarebytes

A CISO’s Guide to Hybrid Cloud Security
sponsored by vArmour
WHITE PAPER: Today’s organizations are adopting cloud at an unprecedented rate to bolster their business operations. As a result, CISOs & their security teams struggle to keep pace with providing data protection and compliance. Download this guide to discover how to achieve continuous security and compliance across hybrid cloud environments.
Posted: 29 Jan 2020 | Published: 29 Jan 2020


How an E-SOAR Strategy Revolutionizes Phishing Detection and Response
sponsored by Ironscales
WHITE PAPER: Email phishing attack detection, analysis and response are among the biggest challenges IT security teams face today. In this white paper, discover how automating this process can accelerate detection-to-response time from days or weeks down to just minutes or even seconds.
Posted: 14 Jan 2020 | Published: 14 Jan 2020

Ironscales

4 Steps to Building a PII Catalog for Privacy
sponsored by BigID
WHITE PAPER: Data catalogs digest an input of data in order to accurately organize what it is and where it comes from. Effective catalogs enable organizations to automate policy, implement data security and maintain compliance. This white paper highlights a 4-step process designed to guide an organization in its catalog journey. Read on to learn more.
Posted: 08 Jan 2020 | Published: 08 Jan 2020

BigID

Top 10 Kubernetes Security Best Practices
sponsored by Alcide
WHITE PAPER: The latest CNCF-led open-source Kubernetes security audit highlights more than 30 flaws found in Kubernetes clusters. Alcide has identified the top-10 flaws in this short eBook that also highlights what checks to implement in order to fix and stay secure.
Posted: 24 Jan 2020 | Published: 24 Jan 2020

TOPICS:  Security
Alcide

Data Breach Response Revisited
sponsored by Absolute Software Corporation
WHITE PAPER: Learn how your organization can revisit your incident response plans and be prepared to detect, respond, and recover as quickly as possible.
Posted: 11 Feb 2020 | Published: 11 Feb 2020

Absolute Software Corporation

Application Shielding with Intertrust whiteCriterion Code Protection
sponsored by Intertrust
WHITE PAPER: Traditional parameter security measures lack the flexibility needed to meet mobile and IoT security risks. This white paper goes in-depth into the specific security challenges hackers are using to expose application vulnerabilities and defines the tactics and tools that can be implemented to mitigate these risks.
Posted: 17 Dec 2019 | Published: 31 Aug 2018

Intertrust
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info