IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed   
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 

Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Management White Papers (View All Report Types)
1 - 25 of 1068 Matches Previous Page  |  Next Page
5 Best Practices in Cloud Security for Aviation
sponsored by ShieldX
WHITE PAPER: It can be challenging for all industries, including aviation, to apply conventional information security principles to the cloud. This white paper outlines 5 best practices from Alaska Air and IDT about how they were able to resolve the security challenges presented by moving core services to the cloud.
Posted: 15 Oct 2019 | Published: 15 Oct 2019

ShieldX

Harnessing Containers for the Big Data Era
sponsored by Aporeto
WHITE PAPER: With the rise of DevOps, Kubernetes has become extremely popular and with good reason, but securing Kubernetes can be challenging. In this white paper, uncover 3 best practices for securing workloads deployed in a Kubernetes cluster.
Posted: 14 Oct 2019 | Published: 31 Jul 2019

Aporeto

RMM & Patch Management: The First Line of Defense Against Cyber Threats
sponsored by Datto, Inc.
WHITE PAPER: Read the following paper to examine why remote monitoring and management (RMM) and patch management offer a strong defense against cyber threats like ransomware, as well as the benefits of building out these services as an MSP.
Posted: 14 Oct 2019 | Published: 14 Oct 2019

Datto, Inc.

Top 5 Reasons Why Savvy MSPs Are Adopting Managed Security Services
sponsored by Avast Software
WHITE PAPER: Small and medium-sized businesses (SMBs) are under attack by a variety of cyberthreats, but these organizations either do not realize how vulnerable they are or do not have the necessary time, resources, or skills to address the issues. This white paper introduces managed security services as a key strategy for evolving your business.
Posted: 11 Oct 2019 | Published: 31 May 2019

Avast Software

The Cyber-Pandemic: IT Attacks in the Healthcare Sector
sponsored by Panda Security
WHITE PAPER: The healthcare industry is moving to store all information electronically which is, without a doubt, beneficial for patients and caregivers. However, this has generated serious security problems for the healthcare industry. In this white paper, learn about attacks to the healthcare industry and how these attacks can be avoided in the future.
Posted: 10 Oct 2019 | Published: 10 Oct 2019

Panda Security

Cyber Insecurity: Managing Threats from Within
sponsored by Proofpoint
WHITE PAPER: Data breaches are having increasingly disastrous consequences for business. Explore the frequency and severity of people-centric data breaches in this Cyber Insecurity: Managing Threats from Within white paper.
Posted: 09 Oct 2019 | Published: 09 Oct 2019

Proofpoint

Top 5 Reports CISOs Live For
sponsored by Thycotic
WHITE PAPER: Privileged credentials represent 1 of your great security risks. In this white paper, learn about the top 5 privileged account security reports CISOs live for.
Posted: 08 Oct 2019 | Published: 08 Oct 2019

Thycotic

Securing the Web Perimeter
sponsored by Cloudflare
WHITE PAPER: In this white paper, learn how WordPress, VPNs, outdated TLS, and web apps built with modern stacks can increase the risk of security breaches and how to reduce that risk.
Posted: 04 Oct 2019 | Published: 04 Oct 2019

Cloudflare

A DevSecOps Guide
sponsored by Aqua Security
WHITE PAPER: After understanding the value of a DevOps mindset, making the cultural shift and reaping the benefits, many companies are aiming for the next big step: integrating development, operations, and security into one organization. In this white paper, learn how to successfully implement DevSecOps in your organization.
Posted: 27 Sep 2019 | Published: 27 Sep 2019

Aqua Security

Supporting NERC CIP Compliance
sponsored by Claroty
WHITE PAPER: Electric industry asset owners are subject to mandatory cybersecurity regulations known as the NERC CIP standards. In this white paper, learn how Claroty's fully integrated platform supports entities' compliance efforts while helping to improve the cybersecurity and operational reliability of power generation and transmission systems.
Posted: 27 Sep 2019 | Published: 27 Sep 2019

Claroty

How To Achieve And Maintain Compliance For Your Organization's Electronic Communications Data
sponsored by Smarsh
WHITE PAPER: When it comes to the rapid adoption of modern communication and collaboration tools, it's imperative organizations get ahead of capturing and archiving significant volumes of data. In this white paper, learn how to address common compliance challenges that are associated with electronic communications data.
Posted: 27 Sep 2019 | Published: 27 Sep 2019

Smarsh

Top Reasons Why Identity Governance Matters for Chief Information Officers
sponsored by Imprivata
WHITE PAPER: Forward-looking CIOs are turning to healthcare-specific technologies to automate identity governance functions, reduce operating expenses, and free up staff to focus on business-critical tasks. In this white paper, learn how Imprivata Identity Governance can help address Identity and Access Management challenges for CIOs.
Posted: 26 Sep 2019 | Published: 26 Sep 2019

Imprivata

The Real Risk to ICS Environments
sponsored by Dragos
WHITE PAPER: The cyber risk to industrial control systems (ICS) is significant, growing and largely unmanaged against the real threats facing ICS. In this white paper, learn how applying ICS-specific threat intelligence to GRC can greatly reduce an organization's risk profile and help meet compliance mandates.
Posted: 26 Sep 2019 | Published: 11 Jul 2019

Dragos

Threat Intelligence: Far-Fetched Idea or Must-Have Security Tactic? How Every Ciso Can Make It a Priority
sponsored by Mimecast
WHITE PAPER: If threat intelligence isn't part of your cyber resilience strategy in some capacity, you have a massive gap on your hands. And you may be blindsided by a phishing attack, malware incident or worse. In this white paper, learn how CISOs can make threat intelligence a priority in their cyber resilience planning.
Posted: 24 Sep 2019 | Published: 24 Sep 2019

Mimecast

The Future of Security Operations
sponsored by IBM
WHITE PAPER: Download the "The Future of Security Operations" for an explanation of how security orchestration and automation can help security teams address the skills shortage, alert overload, and increasingly sophisticated cyberattacks.
Posted: 24 Sep 2019 | Published: 24 Sep 2019

IBM

Solving the Cyber Skills Crunch: A New Model for Cybersecurity
sponsored by Cyberfort
WHITE PAPER: Organizations are continuing to struggle to attract cybersecurity staff with the right level of experience and knowledge at the right price. An external cyber partner can help organizations to bypass this ongoing cyber skills shortage. In this white paper, learn how partnering with experienced cybersecurity experts can help your businesses.
Posted: 23 Sep 2019 | Published: 23 Sep 2019

Cyberfort

The First 72-Hours: How to Approach the Initial Hours of a Security Incident
sponsored by Fidelis
WHITE PAPER: Over the course of responding to thousands of critical security incidents, Fidelis Security has seen organizations approach the initial hours of an incident in every conceivable way. In this white paper, discover the 1st steps security teams should take when responding to an incident.
Posted: 20 Sep 2019 | Published: 20 Sep 2019

Fidelis

Small Organizations Still Need Big Security
sponsored by Blackberry Cylance
WHITE PAPER: Damage to a company's reputation is a major concern, so all companies, large and small, seek brand protection in every medium. Where small and large enterprises diverge is in resources to combat these threats. In this white paper, learn about cybersecurity strategies that small business can implement to help secure their organization.
Posted: 20 Sep 2019 | Published: 31 Jul 2019

Blackberry Cylance

Artificial Intelligence: The Smarter Approach To Information Security
sponsored by Blackberry Cylance
WHITE PAPER: The news headlines are replete with stories of devastating data breaches, compromising the data of millions. Traditional AV solutions are ineffective at preventing breaches. In this white paper, learn how an AI-driven security solution can help your organization combat cyber attacks.
Posted: 20 Sep 2019 | Published: 20 Sep 2019

Blackberry Cylance

A Field Guide to Understanding the Tactics, Techniques and Attack Vectors Used by Cybercriminals
sponsored by Radware
WHITE PAPER: The threat landscape is as diverse as it is sophisticated, thanks largely to the fact that the skills and tools behind launching cyberattacks have become commoditized. In Radware's Hacker's Almanac, gain an understanding the threat landscape and current tactics, techniques and procedures used by today's cybercriminals.
Posted: 20 Sep 2019 | Published: 20 Sep 2019

Radware

SSL Attacks on the Rise
sponsored by Radware
WHITE PAPER: As is always the trend, mass adoption of certain technologies is followed closely by efforts to exploit its wide use through a number of security threats. SSL is no exception to this rule. Download this white paper, to learn everything you need to know about SSL attacks and how to protect against them.
Posted: 19 Sep 2019 | Published: 19 Sep 2019

Radware

Ransomware Prevention i s Possible
sponsored by Blackberry Cylance
WHITE PAPER: All it takes is a couple clicks for ransomware to infect your entire network, encrypting every file, every drive, every server it can gain access to, and within minutes, your organization's most important data is locked. In this white paper, learn how preventing ransomware is possible.
Posted: 19 Sep 2019 | Published: 19 Sep 2019

Blackberry Cylance

Six Steps for Building a Robust Incident Response Function
sponsored by IBM
WHITE PAPER: In the white paper "Six Steps for Building a Robust Incident Response Function" IBM Resilient provides a framework for security teams to build a strong incident response program and deliver organization-wide coordination and optimizations to accomplish these goals.
Posted: 19 Sep 2019 | Published: 19 Sep 2019

IBM

2019 State of OT/ICS Cybersecurity Survey
sponsored by Nozomi Networks
WHITE PAPER: In this 2019 SANS OT/ICS cybersecurity survey, explore the challenges with design, operation and risk management of an industrial control system (ICS), its cyber assets and communication protocols, and supporting operations.
Posted: 18 Sep 2019 | Published: 12 Jun 2019

Nozomi Networks

The New Age of Fraud
sponsored by Concur Technologies
WHITE PAPER: Today, there is a realization that fraud is an enterprise risk that falls in the same realm as supply chain, disaster and regulatory risks. But how can companies prevent, detect and mitigate this risk? In this white paper, examine how companies are putting a microscope on employee spend to better prevent and detect fraud across their business.
Posted: 18 Sep 2019 | Published: 31 Aug 2019

Concur Technologies
1 - 25 of 1068 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement