IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Information Security Policies

RSS Feed   
Information Security Policies White Papers (View All Report Types)
 
Beginner's Guide to Open Source Intrusion Detection Tools
sponsored by AT&T Cybersecurity
WHITE PAPER: Threat and intrusion detection have become a top priority in cybersecurity, making it more important than ever. If you aren't already running an intrusion detection system (IDS) in your network, you should start now. In this white paper, explore different IDS tools to determine which would be the best fit for your organization.
Posted: 10 May 2019 | Published: 10 May 2019

AT&T Cybersecurity

The First 72-Hours: How to Approach the Initial Hours of a Security Incident
sponsored by Fidelis
WHITE PAPER: Over the course of responding to thousands of critical security incidents, Fidelis Security has seen organizations approach the initial hours of an incident in every conceivable way. In this white paper, discover the 1st steps security teams should take when responding to an incident.
Posted: 20 Sep 2019 | Published: 20 Sep 2019

Fidelis

The Present and Future of Security Operations
sponsored by Splunk
WHITE PAPER: In this white paper, learn about several technologies, processes, and philosophical trends that may help CISOs overcome today's security operations challenges and develop a well-organized and operative future-oriented strategy.
Posted: 20 May 2019 | Published: 31 Mar 2019

Splunk

Acalvio Deception and the NIST Cybersecurity Framework 1.1
sponsored by Acalvio
WHITE PAPER: The NIST Cybersecurity Framework 1.1 (CSF) is being widely adopted by organizations of all types as they seek to minimize risk. In this white paper, explore an overview of the CSF core controls and learn how Acalvio supports the NIST Cybersecurity Framework.
Posted: 23 Jul 2019 | Published: 30 Jun 2018

Acalvio

Turbocharge ITOps Productivity for Security and Efficiency
sponsored by BMC
WHITE PAPER: It's simply not possible to address the security risks and management challenges posed by today's infrastructures using manual methods. Operations and security teams need automation—and they need it badly. In this white paper, learn how to empower your team with integrated automation.
Posted: 15 May 2019 | Published: 15 May 2019

BMC

Buyer’s Guide for Complete Privileged Access Management (PAM)
sponsored by BeyondTrust Corporation
WHITE PAPER: Cybercriminals covet privileges or privileged access because it can expedite access to an organization’s most sensitive targets. In this buyer’s guide, learn how to control, monitor and audit privileges and privileged access to protect against both external and internal threats.
Posted: 05 Nov 2019 | Published: 05 Nov 2019

BeyondTrust Corporation

Building a Modern Information Governance Strategy
sponsored by Mimecast
WHITE PAPER: Many organizations are rethinking their information management programs. They are creating modern and easier-to-execute policies, developing comprehensive processes and deploying better technology, all of which drive compliance. In this white paper, learn how key security challenges can be addressed through a modern information governance strategy.
Posted: 11 Apr 2019 | Published: 28 Sep 2018

Mimecast

GreyEnergy: Dissecting the Malware from Maldoc to Backdoor
sponsored by Nozomi Networks
WHITE PAPER: GreyEnergy uses a common infection method, phishing emails with infected documents. However, the malware's code is anything but common – it is well written, smartly put together and designed to defeat detection by cybersecurity products. In this white paper, dive into an analysis of how the malware works.
Posted: 26 Sep 2019 | Published: 28 Feb 2019

Nozomi Networks

Six Steps for Building a Robust Incident Response Function
sponsored by IBM
WHITE PAPER: In the white paper "Six Steps for Building a Robust Incident Response Function" IBM Resilient provides a framework for security teams to build a strong incident response program and deliver organization-wide coordination and optimizations to accomplish these goals.
Posted: 19 Sep 2019 | Published: 19 Sep 2019

IBM

Can You Handle Your Data?
sponsored by TITUS
WHITE PAPER: The modern world is swimming in data, with no signs of that changing any time soon. Threats to the security of all this data have grown in number and sophistication, meaning data regulations are more complicated than ever. In this white paper, learn how organizations can improve information handling practices to better protect their sensitive data.
Posted: 14 May 2019 | Published: 31 Jan 2019

TITUS
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement