Business of Information Technology  >   Business Management  >   Best Practices  >  

Security Best Practices

RSS Feed   
Security Best Practices White Papers (View All Report Types)
26 - 50 of 893 Matches Previous Page  |  Next Page
7 Habits of Highly Effective SOCs
sponsored by Expel
WHITE PAPER: Because so many organizations are having to alter their security posture, many of them are building security operations centers (SOCs) to increase visibility and perform security analytics for best practice development. So what makes a highly effective SOC? Read this white paper to learn 7 key principles to make your SOC more productive.
Posted: 11 Nov 2020 | Published: 11 Nov 2020

Expel

Attacking and Defending a Distributed Workforce
sponsored by ServiceNow
WHITE PAPER: The shift to a distributed, remote workforce has exposed businesses to new attack vectors, including confidentiality threats, remote business process threats and availability threats, all of which alter company risk profiles. What does this mean for network professionals and risk management? Read this white paper to get the answer.
Posted: 11 Nov 2020 | Published: 11 Nov 2020

ServiceNow

Sixgill Report - #NoFilter: Social Media Hacking From The Underground
sponsored by Sixgill
WHITE PAPER: Because everyone is locked indoors, consumer usage of social media platforms has increased dramatically. Now, there’s another epidemic in the form of inorganic social media engagement (likes, views, followers, etc.) that points to a much larger problem – underground social media hacking. Read this report to learn more.
Posted: 11 Nov 2020 | Published: 11 Nov 2020

Sixgill

Covid-19 Lessons Learned—Business Continuity Management
sponsored by ServiceNow
WHITE PAPER: Regardless of whether an organization had a business continuity management (BCM) program in place prior to COVID-19, 2020 has been a learning experience for the shortcomings of most BCM programs. This white paper highlights common oversights and lessons learned regarding BCM in the era of COVID-19 – read on to get started.
Posted: 11 Nov 2020 | Published: 11 Nov 2020

ServiceNow

How to Easily and Securely Implement MFA for Web and Web App to Protect Social Data
sponsored by Onegini
WHITE PAPER: As online services expand and high-security transactions increase, organizations are urged to strengthen their existing online portals and apps with an MFA solution to safeguard particularly sensitive transactions. But implementing this technology can be a difficult task. Read this white paper to learn how to easily and securely implement MFA.
Posted: 10 Nov 2020 | Published: 10 Nov 2020

Onegini

Securing SMBs in a World of Digital Transformation
sponsored by Claranet
WHITE PAPER: The era of digital transformation demands similar growth in security capabilities as well. While large enterprises have the resources to invest heavily in this area, small and medium businesses (SMBs) must be a bit more resourceful. Read this white paper, which highlights cybersecurity guidance for SMBs in the era of digital transformation.
Posted: 09 Nov 2020 | Published: 09 Nov 2020

Claranet

Small Business Security: 4 Steps to Success
sponsored by Claranet
WHITE PAPER: Small businesses are popular targets for today’s hackers. However, by investing in right cybersecurity tools, these small businesses can significantly reduce their risk and facilitate good business growth. The following white paper provides 4 steps for small business cybersecurity success – read on to get started.
Posted: 09 Nov 2020 | Published: 09 Nov 2020

Claranet

Mapping the Ransomware Landscape
sponsored by Claranet
WHITE PAPER: By 2021, ransomware is expected to have a global impact of $20 billion – these threats are growing in their severity, frequency and complexity. This guide from Claranet explores changes in the threat landscape, highlights emerging variants and offers best practices for your organization to implement – read on to get started.
Posted: 09 Nov 2020 | Published: 09 Nov 2020

Claranet

Continuous Security – Putting it all Together
sponsored by HCL Software
WHITE PAPER: Traditionally, Security Maturity models were linear in their approach – suggesting that true security has some sort of end goal. However, cybersecurity requires a more continuous and cyclical approach in order to constantly ensure security is adequate. Read this e-guide to learn more about achieving continuous cybersecurity.
Posted: 06 Nov 2020 | Published: 06 Nov 2020

HCL Software

Modernize Your Video Security Solution with AI and Analytics
sponsored by Motorola, Inc.
WHITE PAPER: Within the next 5 years, there will be around 45 billion cameras on Earth. This abundance of information and data far outweighs our ability to process and analyze all this information on our own. In this white paper, learn about Motorola’s Avigilon, an assistive AI technology that helps security operators to detect critical events.
Posted: 06 Nov 2020 | Published: 06 Nov 2020

Motorola, Inc.

Top 10 Reasons For Protecting Your Organization With CipherTrust Data Security Platform
sponsored by Thales
WHITE PAPER: Protected data, continuous compliance and reduced complexity – these are the key pillars of an ideal data security program. Thales’ CipherTrust Data Security Platform aims to meet these 3 objectives to help organizations reduce risk. This white paper lists 10 reasons to consider switching to the platform – read on to see what they are.
Posted: 04 Nov 2020 | Published: 30 Sep 2020

Thales

The Key Pillars For Protecting Sensitive Data In Any Organization
sponsored by Thales
WHITE PAPER: This white paper, The Key Pillars For Protecting Sensitive Data In Any Organization, outlines the challenges of modern data security, as well as best practices for protecting critical data – read on to learn more.
Posted: 04 Nov 2020 | Published: 30 Sep 2020

Thales

What You Should Know About Your Identity & Access Management
sponsored by Beta Systems
WHITE PAPER: This 34-page whitepaper offers a comprehensive deep dive into Garancy Access Intelligence Manager (AIM) – an offering designed to help organizations monitor data sources, analyze access permissions, meet compliance requirements and address threats. Read on to learn more about its key features and capabilities.
Posted: 04 Nov 2020 | Published: 31 Jan 2019

Beta Systems

Expanding the Sphere of Supervision Value
sponsored by Smarsh
WHITE PAPER: Download this guide to learn more about how information risk affects organizations of all types, the expanded value of supervision software for more than FINRA risk, and how Smarsh can help protect your organization from these risks.
Posted: 03 Nov 2020 | Published: 03 Nov 2020

Smarsh

Methodology of an IAM Introduction
sponsored by Beta Systems
WHITE PAPER: IAM projects fail more often than one thinks, but why? Well, sometimes people think too big or too small, or they don't plan at all and often they simply underestimate the complexity of the overall project. For a successful IAM implementation, one must understand all the factors at play. Access this white paper to learn them.
Posted: 03 Nov 2020 | Published: 03 Nov 2020

Beta Systems

Isolation Best Practices for Financial Services Institutions
sponsored by Menlo Security
WHITE PAPER: Phishing and ransomware attacks, while not necessarily new, are becoming increasingly sophisticated, hard to detect, and dangerous. Read these isolation best practices for yourself to learn how smart financial service institutions are applying this relatively simple concept to stop dangerous attacks before they can reach vulnerable users.
Posted: 02 Nov 2020 | Published: 02 Nov 2020

Menlo Security

Top 10 Considerations When Choosing a Modern Single Sign-On Solution
sponsored by CyberArk Software, Inc
WHITE PAPER: With 80% of all breaches involving compromised or weak credentials, implementing an SSO can provide more robust credential controls and eliminate unnecessary risk. But not all SSO solutions are created equal, and choosing the right one can be challenging. Dive into this white paper to learn the top 10 considerations for selecting an SSO.
Posted: 02 Nov 2020 | Published: 02 Nov 2020

CyberArk Software, Inc

Electronic Communications Compliance Scary Stories
sponsored by Smarsh
WHITE PAPER: Even the most well-meaning organizations can find themselves in alarming situations if they aren't prepared to retain, monitor, and produce employee communications. The spooky stories outlined in this book detail the horrors of being unprepared for an audit, a legal investigation, or even scarier monsters.
Posted: 02 Nov 2020 | Published: 02 Nov 2020

Smarsh

Enable and Protect Your Remote Workforce
sponsored by AT&T and Palo Alto
WHITE PAPER: Download this white paper to learn about the cybersecurity challenges associated with an increasingly remote and virtual workforce, and what to look for in a remote security solution.
Posted: 30 Oct 2020 | Published: 30 Oct 2020

AT&T and Palo Alto

Secure SD-WAN: A Comprehensive Guide
sponsored by Fortinet, Inc.
WHITE PAPER: With the rapid rise in SaaS and IaaS use, many network engineering and operations leaders are looking to replace their outdated WAN infrastructures with SD-WAN. While selecting the right SD-WAN for a particular use case may require a few compromises, security shouldn’t be one of them. Access this guide to learn about secure SD-WAN.
Posted: 29 Oct 2020 | Published: 03 Oct 2019

Fortinet, Inc.

Protecting Privileged Access in DevOps & Cloud Environments
sponsored by CyberArk Software, Inc
WHITE PAPER: Privileged access credentials are an especially attractive target amongst cybercriminals – putting DevOps and cloud environments at great risk. This research report was written to help CISOs and security leaders address these challenges by highlighting key attack types and specific risks targeting these environments.
Posted: 29 Oct 2020 | Published: 29 Oct 2020

CyberArk Software, Inc

Risk Management Best Practices for Privileged Access Management (PAM)
sponsored by Quest
WHITE PAPER: Applying risk management best practices to privileged access management (PAM) can provide a solid framework for threat awareness, and it can help organizations organically meet the rising number of compliance requirements. Read this white paper to learn 8 best practices for applying risk management to PAM.
Posted: 28 Oct 2020 | Published: 28 Oct 2020

Quest

Tips for Preparing an RFP for SOC-as-a-Service & Evaluation Criteria
sponsored by Cysiv
WHITE PAPER: A 24/7 SOC identifies, investigates and resolves threats that target infrastructure, sensitive data, and ongoing business operations. But building a SOC can be time-consuming, complex and expensive, which is why organizations are turning to SOC-as-a-Service (SOCaaS). Read this guide to learn tips for preparing an RFP for a SOCaaS provider.
Posted: 28 Oct 2020 | Published: 28 Oct 2020

Cysiv

5 Ways to Detect Application Security Vulnerabilities Earlier to Lower Cost and Risk using Azure DevOps
sponsored by Lunavi
WHITE PAPER: One of the most persistent problems with creating a secure environment for application development is that security measures often seem to be a step behind or come a moment too late. Read on to learn how, by integrating automated security validation into your continuous integration pipeline, you can finally achieve security that’s up to par.
Posted: 28 Oct 2020 | Published: 22 Oct 2020

Lunavi

Blueprint for a Future-Ready Workforce
sponsored by VMware International Unlimited Company
WHITE PAPER: When global events caused companies to rapidly pivot to remote work, IT had to act fast. In terms of PC lifecycle management, it quickly became apparent that legacy approaches were no longer adequate. Advance your strategy by reading this white paper, which offers a blueprint for your journey to a future-ready workspace on Windows 10.
Posted: 27 Oct 2020 | Published: 31 Jul 2020

VMware International Unlimited Company
26 - 50 of 893 Matches Previous Page    1 2 3 4 5    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info