IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Device Security Policies

RSS Feed   
Device Security Policies White Papers (View All Report Types)
 
Insights into Building an Industrial Control System Security Operations Center
sponsored by Dragos
WHITE PAPER: One of the most dedicated focuses towards security that can be implemented in an ICS is a security operations center (SOC). In this white paper, learn how best practices from enterprise IT SOCs can be adapted to focus on ICS environments.
Posted: 05 Aug 2019 | Published: 31 Mar 2017

Dragos

Can You Handle Your Data?
sponsored by TITUS
WHITE PAPER: The modern world is swimming in data, with no signs of that changing any time soon. Threats to the security of all this data have grown in number and sophistication, meaning data regulations are more complicated than ever. In this white paper, learn how organizations can improve information handling practices to better protect their sensitive data.
Posted: 14 May 2019 | Published: 31 Jan 2019

TITUS

How to choose the right micro-segmentation provider
sponsored by Guardicore
WHITE PAPER: As micro-segmentation grows in popularity, there are a number of options to choose from for security operations, from the vendors themselves to the tools and processes they offer. Download this white paper to explore the essential elements to consider before choosing a micro-segmentation provider today.
Posted: 20 Jun 2019 | Published: 20 Jun 2019

Guardicore

Faster Response with Crowdstrike and MITRE ATT&CK
sponsored by CrowdStrike
WHITE PAPER: As responders often lack the time and resources to investigate every alert, or even prioritize the most critical ones, a high-risk threat might go unnoticed. Potentially, this could allow devastating breaches to occur. In this white paper, learn how adopting the common industry framework MITRE ATT&CK can solve this challenge.
Posted: 24 Jul 2019 | Published: 24 Jul 2019

CrowdStrike

The 6 Most Common Types of Phishing Attacks
sponsored by Inky Technology
WHITE PAPER: Phishing attacks are on the rise and attackers are constantly evolving their tactics to trick victims. In this white paper, explore 6 of the most common types of phishing attacks.
Posted: 28 Jun 2019 | Published: 28 Jun 2019

Inky Technology

Containing Security Incident Response Costs
sponsored by enSilo
WHITE PAPER: Of the many challenges security leaders face, one big issue that can often be downplayed is budgeting. While the cost of a breach is well documented, the costs of managing a security team, that can prevent attacks, are not. In this white paper, learn how enSilo can help solve the problem of uncontained and unexpected incident response costs.
Posted: 23 May 2019 | Published: 05 Mar 2018


Artificial Intelligence: The Smarter Approach To Information Security
sponsored by Blackberry Cylance
WHITE PAPER: The news headlines are replete with stories of devastating data breaches, compromising the data of millions. Traditional AV solutions are ineffective at preventing breaches. In this white paper, learn how an AI-driven security solution can help your organization combat cyber attacks.
Posted: 20 Sep 2019 | Published: 20 Sep 2019

Blackberry Cylance

6 Steps to Achieving Data Access Governance
sponsored by One Identity
WHITE PAPER: Organizations need to satisfy compliance requirements and be able to quickly address security threats. They need to centralize the access request process and put an end to ambiguity about who has access to what. In this white paper, discover how organizations can achieve this by following 6 steps to implement data access governance.
Posted: 29 Aug 2019 | Published: 29 Aug 2019

One Identity

Acalvio Deception and the NIST Cybersecurity Framework 1.1
sponsored by Acalvio
WHITE PAPER: The NIST Cybersecurity Framework 1.1 (CSF) is being widely adopted by organizations of all types as they seek to minimize risk. In this white paper, explore an overview of the CSF core controls and learn how Acalvio supports the NIST Cybersecurity Framework.
Posted: 23 Jul 2019 | Published: 30 Jun 2018

Acalvio

Security Maturity: Mapping the Road to Resilience in Europe
sponsored by Dell SecureWorks
WHITE PAPER: The road to cybersecurity maturity can be tricky. This is because there isn't one universal standard by which management can determine how well the risk is being managed. For European organizations, reviewing the highlights in this white paper can provide clues for comparing their own cybersecurity maturity to that of other EMEA organizations.
Posted: 23 May 2019 | Published: 23 May 2019

Dell SecureWorks
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement