IT Management  >   Systems Operations  >   Security  >  

Management of Security Information

RSS Feed   
Management of Security Information White Papers (View All Report Types)
 
Faster Response With Crowdstrike and MITRE ATT&CK™
sponsored by CrowdStrike
WHITE PAPER: As responders often lack the time and resources to investigate every alert, or even prioritize the most critical ones, a high-risk threat might go unnoticed. Potentially, this could allow devastating breaches to occur. In this white paper, learn how adopting the common industry framework MITRE ATT&CK can solve this challenge.
Posted: 11 Apr 2019 | Published: 11 Apr 2019

CrowdStrike

Security Orchestration, Automation and Response (SOAR) for MSSPs
sponsored by Swimlane
WHITE PAPER: Success and growth in the MSSP business requires balancing the delivery on multiple customer service level agreements (SLAs) with cost-effective operations. But, advances in SOAR offer MSSPs a number of ways to meet SLAs, improve response times and deliver better security. In this white paper, learn more about the potential of SOAR for MSSPs.
Posted: 18 Apr 2019 | Published: 18 Apr 2019

Swimlane

Can You Handle Your Data?
sponsored by TITUS
WHITE PAPER: The modern world is swimming in data, with no signs of that changing any time soon. Threats to the security of all this data have grown in number and sophistication, meaning data regulations are more complicated than ever. In this white paper, learn how organizations can improve information handling practices to better protect their sensitive data.
Posted: 14 May 2019 | Published: 31 Jan 2019

TITUS

3 Minutes Until the Apocalypse
sponsored by Acalvio
WHITE PAPER: Most organizations utilize a SIEM in their SOC to aggregate, correlate and prioritize alerts presented to the frontline SOC Analyst. However, with a myriad of logs feeding into the SIEM, it is a daunting task to keep up with the alerts on the screen. In this white paper, learn 3 things security teams can do to make their lives better.
Posted: 24 Jun 2019 | Published: 24 Jun 2019

Acalvio

Internal Threats Personified
sponsored by Mimecast
WHITE PAPER: When it comes to securing email and protecting against cyberattacks, most organizations focus their attention on inbound emails. Although this is a great start, not all attacks are from incoming emails. In this white paper, explore 4 email-related activities that employees often engage in that contribute to the spread of these insider threats.
Posted: 17 Apr 2019 | Published: 17 Apr 2019

Mimecast

Digital Transformation Executive Report
sponsored by Dell SecureWorks
WHITE PAPER: Businesses are more dependent on technology than ever before. While digital transformation brings about opportunity, it also introduces large amounts of risk. In this white paper, learn how organizations can create a decentralized security partnership approach between security, IT and citizen developers.
Posted: 23 May 2019 | Published: 23 May 2019

Dell SecureWorks

Turbocharge ITOps Productivity for Security and Efficiency
sponsored by BMC
WHITE PAPER: It's simply not possible to address the security risks and management challenges posed by today's infrastructures using manual methods. Operations and security teams need automation—and they need it badly. In this white paper, learn how to empower your team with integrated automation.
Posted: 15 May 2019 | Published: 15 May 2019

BMC

THE THREE PHASES OF SECURING PRIVILEGED ACCOUNTS
sponsored by Cyber-Ark Software
WHITE PAPER: In this white paper, discover the 3 phases of securing privileged accounts and which action may benefit an organization the most.
Posted: 10 Jul 2019 | Published: 10 Jul 2019

Cyber-Ark Software

What are your Public Cloud Security Risks?
sponsored by Lacework
WHITE PAPER: There are many good business reasons why the public cloud has become a go-to environment for fast infrastructure expansion. But is it secure? Read on to learn about the cloud's unique security challenges and how continuous, real-time monitoring, analysis, and alerting can help your organization stay secure.
Posted: 29 May 2019 | Published: 29 May 2019

Lacework

General Data Protection Regulation (GDPR): Balancing Risk and Corporate Reputation
sponsored by HID Global
WHITE PAPER: As the amount of breaches rise and the consequences for breaches get more expensive, it's imperative to keep anyone with malicious intent out of your company's networks and systems. In this white paper, learn how identity and access management technologies can keep your data secure and help your organization comply with the GDPR.
Posted: 10 Apr 2019 | Published: 10 Apr 2019

HID Global
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement