Business of Information Technology  >   Business Management  >   Best Practices  >  

Security Best Practices

RSS Feed   
Security Best Practices White Papers (View All Report Types)
76 - 100 of 677 Matches Previous Page  |  Next Page
The State of PKI Security and Management: Survey Report
sponsored by AppViewX
WHITE PAPER: A 2019 study has revealed that businesses’ PKI setups have a long way to go before they’re considered truly secure and effective. In this whitepaper, find the results of the study that reveal the state of PKI in the industry today – including some surprising statistics.
Posted: 05 Nov 2019 | Published: 04 Nov 2019

AppViewX

Overcoming the Top 3 Bottlenecks in SSL/TLS Certificate Management
sponsored by AppViewX
WHITE PAPER: In this white paper, learn how to overcome the top 3 bottlenecks in SSL/TLS certificate management: Lack of discovery, manual management, inadequate reporting.
Posted: 01 Nov 2019 | Published: 01 Nov 2019

AppViewX

5 Business Impacts of Certificate Mismanagement
sponsored by AppViewX
WHITE PAPER: In this white paper, discover a checklist that will help you evaluate if your certificate management strategy has room for improvement. You will also find 5 reasons why certificate outages can affect your business
Posted: 01 Nov 2019 | Published: 01 Nov 2019

AppViewX

Who’s Stalking Mobile App Users?
sponsored by The Media Trust
WHITE PAPER: It’s difficult to disagree with the convenience of mobile applications, but have you ever considered the data being captured? Consumer awareness and regulations like GDPR & CCPA are creating a dramatic shift in app development and experience. In this report, find hidden vulnerabilities, the role of cookies & other findings.
Posted: 01 Nov 2019 | Published: 31 Oct 2019

The Media Trust

SSH Key Management in the Cloud
sponsored by AppViewX
WHITE PAPER: Enterprises want to keep their systems safe using SSH keys, but by failing to keep those keys secure, they are ultimately more at-risk. Without protecting their SSH keys, enterprises are as vulnerable as ever. Find out how AppViewX can help you automate SSH key management and keep them secure in the cloud and on-prem.
Posted: 30 Oct 2019 | Published: 30 Oct 2019

AppViewX

Advanced Data Protection for Midsize Enterprises
sponsored by InteliSecure
WHITE PAPER: Advanced data protection is no longer a choice for midsize organizations. Large enterprises have the resources to detect a breach & recover from an occurrence, while midsize enterprises typically can't afford a similar incident. But there is a silver lining: security systems are more capable and affordable than ever before.
Posted: 30 Oct 2019 | Published: 30 Oct 2019

InteliSecure

TITUS Times: The Politics of Data Protection
sponsored by TITUS
WHITE PAPER: Most breaches that occur at the end user level aren’t malicious. The ideal security strategy addresses people, processes and policy with serious consideration given to the end user. So, rather than dictate policies, involve your end users as you develop your security strategies. Discover why it is critical to focus on the end user’s point of view.
Posted: 29 Oct 2019 | Published: 29 Oct 2019

TITUS

Securing Your SWIFT Environment Using Micro-Segmentation
sponsored by Illumio
WHITE PAPER: All SWIFT customers must self-attest to their compliance with the SWIFT Customer Security Program (CSP). The program is designed to respond to the wave of cybercrime targeting SWIFT installations. In this white paper, explore 3 challenges that prove especially difficult for SWIFT customers looking to achieve compliance.
Posted: 25 Oct 2019 | Published: 25 Oct 2019

Illumio

Application Dependency Mapping
sponsored by Illumio
WHITE PAPER: To understand and eliminate the security blind spots in your application environment, the first step is to visualize all your application components and how they are interconnected. In this white paper, learn everything you need to know about application dependency mapping.
Posted: 25 Oct 2019 | Published: 25 Oct 2019

Illumio

Securing Cloud-Native Kubernetes Applications
sponsored by Radware
WHITE PAPER: When businesses look to optimize and accelerate application development life cycles and deliver their applications in public clouds, security becomes a greater challenge. In this white paper, learn how to ensure the timely development and deployment of secure applications across hybrid computing environments.
Posted: 23 Oct 2019 | Published: 23 Oct 2019

Radware

Who Owns Cloud Security?
sponsored by OneNeck IT
WHITE PAPER: As cybersecurity risks become more numerous, sophisticated and expensive, businesses are scrambling to fortify their defenses and running into an important question: Who actually owns cloud security? Download this white paper to find out.
Posted: 22 Oct 2019 | Published: 22 Oct 2019

OneNeck IT

Avoid Getting More Than You Bargained for in M&A Deals
sponsored by Avalara
WHITE PAPER: Sales tax is a common challenge during mergers and acquisitions, but rarely gets addressed early on. However, syncing sales tax management early in the process can save you from serious compliance headaches later. In this white paper, learn how to include sales tax compliance in your integration strategy.
Posted: 21 Oct 2019 | Published: 21 Oct 2019

Avalara

Upgrading Your ERP?
sponsored by Avalara
WHITE PAPER: Upgrading an ERP platform and integrating it with a modern tax automation solution becomes more urgent as the definition of nexus expands beyond physical presence. This white paper will address the urgency of tax automation, the limitations of legacy and on-premise solutions, and the advantages of cloud-based platforms.
Posted: 21 Oct 2019 | Published: 21 Oct 2019

Avalara

Network Security for a New Era
sponsored by TechData - HPE
WHITE PAPER: Mobile devices and smart objects are connecting to the same school networks, but they have very different security needs. Read this report for how K-12 leaders can manage the new security challenges of mobile devices and smart objects.
Posted: 21 Oct 2019 | Published: 21 Oct 2019

TechData - HPE

Secrets to a Stronger Strategy for Container Security
sponsored by Alert Logic
WHITE PAPER: AlertLogic experts have developed, tested, and refined 8 best practices for security in your environment. Read on for more explanation of these practices and some tips for how your Amazon Web Services (AWS) environment can help.
Posted: 17 Oct 2019 | Published: 17 Oct 2019

Alert Logic

Executive Report: Phishing by the Numbers
sponsored by Inky Technology
WHITE PAPER: View this report that breaks down some of the critical phishing attack statistics for the past year and reveals the 7 most common phishing themes to watch out for in 2020.
Posted: 16 Oct 2019 | Published: 16 Oct 2019

Inky Technology

Understanding Phishing: Fake Attachments
sponsored by Inky Technology
WHITE PAPER: Malicious fake attachments are a trend that has security pros on the alert.So how can you spot them at first glance and before they do serious damage? This special phishing report for security pros reveals exactly how it’s done.
Posted: 16 Oct 2019 | Published: 16 Oct 2019

Inky Technology

5 Best Practices in Cloud Security for Aviation
sponsored by ShieldX
WHITE PAPER: It can be challenging for all industries, including aviation, to apply conventional information security principles to the cloud. This white paper outlines 5 best practices from Alaska Air and IDT about how they were able to resolve the security challenges presented by moving core services to the cloud.
Posted: 15 Oct 2019 | Published: 15 Oct 2019

ShieldX

5 Best Practices in Cloud Security for Legal
sponsored by ShieldX
WHITE PAPER: Everyone is moving to the cloud. But unfortunately, cloud adoption is moving too fast for security to keep up. This e-book outlines a series of best practices from Alaska Air and IDT about how they were able to resolve the security challenges presented by moving core services to the cloud. Read on for 5 best practices these customers have shared.
Posted: 14 Oct 2019 | Published: 14 Oct 2019

ShieldX

Rethinking Security for Digital Transformation
sponsored by ZeroNorth
WHITE PAPER: As software becomes more critical to every business, understanding risk that may exists gains increasing importance. Download this report to learn how organizations currently tackle security in the context of digital transformation—and where these initiatives may go in the future.
Posted: 14 Oct 2019 | Published: 14 Oct 2019

ZeroNorth

Avoiding APTs: Defending your Critical Infrastructure
sponsored by Panda Security
WHITE PAPER: Cybersecurity technology is constantly innovating to stay ahead of the latest threats, including APTs. In this e-book, learn about APTs, the impacts they can have on critical infrastructure and ways you can proactively protect your organization.
Posted: 11 Oct 2019 | Published: 11 Oct 2019

Panda Security

Business Expansion and Sales Tax Nexus
sponsored by Avalara
WHITE PAPER: Planting your company flag in fertile new ground is one way to expand your business. But it can also bring up a crop of new compliance issues. This white paper will help you prepare for dealing with new tax requirements that spring up from growth.
Posted: 11 Oct 2019 | Published: 11 Oct 2019

Avalara

Top 5 Reasons Why Savvy MSPs Are Adopting Managed Security Services
sponsored by Avast Software
WHITE PAPER: Small and medium-sized businesses (SMBs) are under attack by a variety of cyberthreats, but these organizations either do not realize how vulnerable they are or do not have the necessary time, resources, or skills to address the issues. This white paper introduces managed security services as a key strategy for evolving your business.
Posted: 11 Oct 2019 | Published: 31 May 2019

Avast Software

3 Essential Components of a Managed Security Service for SMBs
sponsored by Avast Software
WHITE PAPER: This white paper examines the current attack surface for SMBs and looks at the 3 essential components of a managed security service, which include protection for data, devices, and people. Read on to learn more.
Posted: 10 Oct 2019 | Published: 10 Oct 2019

Avast Software

The Practical Security Guide to Prevent Cyber Extortion
sponsored by Panda Security
WHITE PAPER: What do you do if you are a victim of cyber extortion? Download The Practical Security Guide to Prevent Cyber Extortion for 5 recommendations on how to keep your company safe.
Posted: 09 Oct 2019 | Published: 09 Oct 2019

Panda Security
76 - 100 of 677 Matches Previous Page    2 3 4 5 6 7    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info