Business of Information Technology  >   Business Management  >   Best Practices  >  

Security Best Practices

RSS Feed   
Security Best Practices White Papers (View All Report Types)
1 - 25 of 865 Matches Previous Page  |  Next Page
How to Design and Maintain a Secure ICS Network
sponsored by SecurityMatters
WHITE PAPER: Learn about the IEC 62443 standards and their limitations so that you can reduce the exposure of industrial networks to constantly evolving threats with analytics, network segmentation, enhanced threat detection, and more.
Posted: 12 Feb 2018 | Published: 16 Jul 2015

SecurityMatters

Deception Technology Comes of Age
sponsored by Illusive Networks
WHITE PAPER: Today, deception technology is gaining more and more attention as an innovative cybersecurity technology that can shift the balance of power back to your business. This white paper details how to embrace deception as a network security tool with 5 compelling reasons.
Posted: 09 Feb 2018 | Published: 09 Feb 2018

Illusive Networks

Demystifying IT Risk to Achieve Greater Security & Compliance
sponsored by Lynx Technology Partners
WHITE PAPER: Discover 4 steps to help you create effective risk management so that you can get a better picture of the threats facing your organization and improve your defense against them.
Posted: 08 Feb 2018 | Published: 08 Feb 2018

Lynx Technology Partners

Achieve Effective PCI Compliance by Automating Required Controls and Processes
sponsored by Skybox Security
WHITE PAPER: Find out how to improve PCI DSS compliance by incorporating a platform into your network and information security workflows that provides a holistic understanding of your attack surface.
Posted: 08 Feb 2018 | Published: 31 Dec 2016

Skybox Security

What is Attribute-Based Access Control?
sponsored by Axiomatics
WHITE PAPER: Learn about the evolution of traditional role-based access control and how the shift towards attribute-based access control is impacting cybersecurity.
Posted: 08 Feb 2018 | Published: 31 Dec 2016

Axiomatics

Breach Prevention: The New Way Forward
sponsored by NSS Labs
WHITE PAPER: Attackers are able to bypass traditional endpoint and perimeter-based security solutions. This white paper explains why organizations are adopting breach detection systems (BDS) to evolve with the ever-changing threat landscape.
Posted: 08 Feb 2018 | Published: 08 Feb 2018

NSS Labs

Reduce Your Audit Tax: Five Methods to Lessen the Burdens
sponsored by Lynx Technology Partners
WHITE PAPER: The security and regulatory environment these days has mushroomed to the point that very few organizations ever go untouched by the auditor's viewfinder. Access this resource to uncover the 5 steps to developing and implementing an audit tax strategy for greater automation of data collection and reporting.
Posted: 08 Feb 2018 | Published: 08 Feb 2018

Lynx Technology Partners

Stop the Cybersecurity Guessing Game
sponsored by NSS Labs
WHITE PAPER: According to Gartner, security spending keeps growing and it will increase by 26% in the next 3 years. However, many organizations are unclear of how secure they really are. Access this white paper to uncover how to address the unmitigated risks created by today's threats.
Posted: 07 Feb 2018 | Published: 07 Feb 2018

NSS Labs

3 Use Cases for Deception Technology in Financial Services
sponsored by Illusive Networks
WHITE PAPER: This white paper details how a deception solution can help lay the foundation for an active defense program. In addition, uncover 3 use cases for deception technology in financial services, as the industry plays an important role in shaping network and security best practices regarding cybersecurity.
Posted: 07 Feb 2018 | Published: 07 Feb 2018

Illusive Networks

What is The Multi-Cloud?
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper explores why the usual methods of cloud security are not able to effectively secure multi-cloud environments. Then, learn how an open standards-based fabric of integrated and adaptive security products could provide the visibility and coordination needed to provide a high level of protection.
Posted: 06 Feb 2018 | Published: 06 Feb 2018

Fortinet, Inc.

Economics of Insecurity
sponsored by Cylance
WHITE PAPER: Traditional AV companies don't want to help you prevent attacks. They want to help you react to breaches - so they can sell you more solutions with every intrusion. It's all part of the "Economics of Insecurity". Tired of the status quo and investing in more of the same old technology? Learn why it's time to think beyond the stack.
Posted: 01 Feb 2018 | Published: 01 Feb 2018

Cylance

2018 Security Predictions
sponsored by Forcepoint
WHITE PAPER: This report predicts that the intersection of people, critical data, and IP will drive major security shifts coming in 2018. Read on to learn the 8 predictions.
Posted: 30 Jan 2018 | Published: 29 Dec 2017

Forcepoint

Rethinking Data Security
sponsored by Forcepoint
WHITE PAPER: Read this white paper to find out what new security concerns are driving the need for risk adaptive protection. Then learn about a data protection method that focuses on people for visibility into the data they create and the applications they use.
Posted: 29 Jan 2018 | Published: 29 Jan 2018

Forcepoint

The SIEM Buyer's Guide
sponsored by Splunk
WHITE PAPER: Before making a SIEM purchasing decision, read this buyer's guide which outlines the 9 technical capabilities no modern system should go without. Then learn what Splunk has to offer not only as a SIEM but as a data analytics tool for your entire IT system.
Posted: 26 Jan 2018 | Published: 26 Jan 2018

Splunk

4 Easy Ways Central Logging Improves Security Posture
sponsored by Splunk
WHITE PAPER: Reliable central logging or log management is the first critical step toward gaining visibility across a multi-layered security environment. This resource reveals how to gain immediate visibility into critical security incidents with 4 basic sources that security teams can leverage along with central logging.
Posted: 26 Jan 2018 | Published: 26 Jan 2018

Splunk

The General Data Protection Regulation: Key Themes and Challenges
sponsored by Forcepoint
WHITE PAPER: Read this white paper to explore 3 major misconceptions about the GDPR, and uncover 5 key steps to help your organization perform a basic assessment of its data protection capabilities. Then, discover an approach that can help you get in line with the GDPR in 3 core areas.
Posted: 25 Jan 2018 | Published: 25 Jan 2018

Forcepoint

A Strategic Approach to Web Application Security
sponsored by Whitehat Securities
WHITE PAPER: App vulnerabilities originate with the source code, and you'll want to secure more of your source code in both development and production. But it's easier said than done for security pros to review source code continuously. Uncover a new static application security testing subscription service to address this problem.
Posted: 18 Jan 2018 | Published: 31 Dec 2017

Whitehat Securities

Getting the Board on Board with Application Security
sponsored by Whitehat Securities
WHITE PAPER: CISOs need to make sure their business considers AppSec from the highest levels. Review these 4 recommendations to improve your business' AppSec and get the support you need.
Posted: 18 Jan 2018 | Published: 31 Dec 2017

Whitehat Securities

Four CISO Tribes and Where to Find Them
sponsored by Synopsys
WHITE PAPER: In this research content, gathered based on interviews with 25 CISOs, discover 4 distinct approaches to the role of CISO. Learn what makes each one distinct, how you can use this information to push your own career forward, and more.
Posted: 18 Jan 2018 | Published: 29 Dec 2017

Synopsys

Your Chance to Get It Right: Five Keys to Building AppSec into DevOps
sponsored by Veracode, Inc.
WHITE PAPER: Watch this webcast to learn how to get app security pros involved in the collaborative DevOps culture by helping developers speak their language. You'll find 5 steps your company can take to achieving secure DevOps inside.
Posted: 17 Jan 2018 | Published: 17 Jan 2018

Veracode, Inc.

The Security Professional's Role in a DevSecOps World
sponsored by Veracode, Inc.
WHITE PAPER: Learn about the evolving role of security professionals in the world of DevSecOps, and find out where app security fits into the shifting app development paradigms created by DevOps cultural changes.
Posted: 15 Jan 2018 | Published: 15 Jan 2018

Veracode, Inc.

Finding GDPR noncompliance in a mobile first world
sponsored by Lookout
WHITE PAPER: With the proliferation of mobile devices in the workplace, whether company or employee owned, there is a greater risk of data loss or leakage. Whether they know it or not, your employees are putting your company's data--and GDPR compliance--at risk. This white paper is your guide to laying out the mobile portion of your GDPR strategy.
Posted: 15 Jan 2018 | Published: 26 Oct 2017

Lookout

State of Software Security
sponsored by Veracode, Inc.
WHITE PAPER: According to this report the top 10 list of most common vulnerability categories in 2017 is strikingly similar to 2016. Information leakage was again the most prevalent, present in 66% of apps on initial scan. Inside this report, State of Software Security, uncover trends over time, benchmark performance, and identify best practices.
Posted: 12 Jan 2018 | Published: 28 Dec 2017

Veracode, Inc.

The State of Software Security: Developer Guide
sponsored by Veracode, Inc.
WHITE PAPER: This State of Software Security report examines the increased burden on developers to ensure sound app security testing, particularly in DevOps and Agile environments. Discover best practices to improve app security testing and remediation, and learn about the tenets of DevSecOps.
Posted: 12 Jan 2018 | Published: 31 Dec 2017

Veracode, Inc.

The Developer's Guide to Software Integrity
sponsored by Synopsys
WHITE PAPER: Explore the importance of DevSecOps in building high-quality apps and learn which tools are best suited to helping developers identify and resolve the bugs that can lead to crashes or act as points of entry for attackers.
Posted: 11 Jan 2018 | Published: 31 Dec 2017

Synopsys
1 - 25 of 865 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement