IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed   
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 

Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Management White Papers (View All Report Types)
126 - 150 of 1166 Matches Previous Page  |  Next Page
An Anchor of Trust in a Digital World: Risk Management Strategies for Digital Processes
sponsored by Thales
WHITE PAPER: A growing number of entities have integrated Hardware Security Modules (HSMs) into their information risk management deployments. In this white paper, learn about hardware security modules and the attributes that position HSMs as an attractive component in information risk management.
Posted: 27 Apr 2020 | Published: 27 Apr 2020

Thales

Passwordless Authentication: How Giving Up Passwords Can Improve Security
sponsored by Thales
WHITE PAPER: Although they were once effective for security, weak or stolen passwords are the root cause of 81% of today’s cyberattacks. Today’s sophisticated hackers know how to target and steal weak credentials. So, where do passwords go from here? In this white paper, discover how passwordless authentication can help to improve security.
Posted: 27 Apr 2020 | Published: 31 Jan 2020

Thales

Skybox for Cloud: Extending and Unifying Security Management in Hybrid Networks
sponsored by Skybox Security
WHITE PAPER: Hybrid and multi–cloud deployments are opening up new cybersecurity challenges where inconsistent levels of visibility, misconfigurations and deployment of uncertified policies are all becoming more prevalent. In this white paper, learn more about these cloud security challenges and see how Skybox can help.
Posted: 27 Apr 2020 | Published: 27 Apr 2020

Skybox Security

Smart Automation for Security Policy Management
sponsored by Skybox Security
WHITE PAPER: Gartner predicts that by the end of 2020 as many as 99% of firewall breaches will be a result of misconfigurations rather than software issues. To address misconfigurations, security teams are turning to analytics-driven automation tools. Read on to learn more about their capabilities & how they can help meet your security needs.
Posted: 24 Apr 2020 | Published: 24 Apr 2020

Skybox Security

Decisive Technology for Decisive Moments
sponsored by Thales
WHITE PAPER: Regardless of your current strategic initiatives, a partnership with a trusted cybersecurity provider is critical to your overall success. This white paper highlights success Thales has had in the role of strategic partner for leading enterprises across industries. Read on to see what these industry leaders have to say about Thales.
Posted: 24 Apr 2020 | Published: 31 Mar 2020

Thales

Secure Remote Access for Employees
sponsored by Thales
WHITE PAPER: In today’s business environment, employees require constant access to information and services. It’s become more critical than ever for organizations to take a calculated approach towards how they secure remote access. This guide highlights several effective approaches for you to consider.
Posted: 24 Apr 2020 | Published: 31 Mar 2020

Thales

Advantages of Using A Hosted Payment Page
sponsored by SFG
WHITE PAPER: For organizations interested in selling their products or services online, establishing payment processing and ensuring PCI compliance can be an enormous barrier to entry. To ease the workload, organizations are turning to hosted payment pages. This whitepaper explores how hosted pages work and highlights their key benefits.
Posted: 24 Apr 2020 | Published: 24 Apr 2020

SFG

Risk-Based Vulnerability Management
sponsored by Skybox Security
WHITE PAPER: Traditional vulnerability management was a bit like whack-a-mole: It relied on actively monitoring an environment for threats, then moving in to patch them as soon as they popped up. But what if you had the context to know where the ‘moles’ were most like pop up, and when? Read on to learn about this unique approach.
Posted: 23 Apr 2020 | Published: 23 Apr 2020

Skybox Security

AI For Cybersecurity
sponsored by IronNet
WHITE PAPER: With the cost and frequency of cyberattacks expected to continue to rise, what can organizations do to meet these sophisticated threats? This white paper breaks down how artificial intelligence, when used effectively, can strengthen threat detection and response. Read on to learn more.
Posted: 23 Apr 2020 | Published: 16 Apr 2020

IronNet

Thales looks to extend SafeNet Trusted Access beyond FIDO with a touch of PKI
sponsored by Thales
WHITE PAPER: In this report, discover 451 Research’s key findings from their survey into the usage of STA amongst enterprises. The study also highlights the enhancements Thales introduced to the STA platform, and how it equates to comparable offerings. Read on to get started.
Posted: 23 Apr 2020 | Published: 07 Apr 2020

Thales

Shifting Cloud Security Left with Infrastructure as Code
sponsored by DivvyCloud
WHITE PAPER: DevOps has forever changed the software development lifecycle for the better. But what is the role of DevOps in ensuring cloud security and compliance? This white paper highlights how addressing key challenges can be addressed by shifting cloud security left – avoiding misconfigurations and misalignments. Read on to learn more.
Posted: 22 Apr 2020 | Published: 22 Apr 2020

DivvyCloud

2020 State of Enterprise Cloud Adoption and Security
sponsored by DivvyCloud
WHITE PAPER: Cloud usage has been growing steadily over recent years, and that trend is expected to continue. However, misconfigurations and data breaches have led to security concerns. This report highlights the findings from a 2019 study into enterprise cloud adoption as well as security and compliance challenges. Read on to uncover the results.
Posted: 22 Apr 2020 | Published: 22 Apr 2020

DivvyCloud

Hybrid IT-OT Security Management
sponsored by Skybox Security
WHITE PAPER: OT and IT environments have historically been managed and secured separately to focus on the unique vulnerabilities that plague each environment. However, a unified approach that combines IT and OT environments positions organizations to identify and combat threats most effectively. Read on to learn more about this hybrid approach.
Posted: 22 Apr 2020 | Published: 07 Apr 2020

Skybox Security

Cybersecurity for Community Banks and Credit Unions
sponsored by Guardicore
WHITE PAPER: In order to meet customer expectations for cybersecurity as well as regulatory requirements, financial institutions like banks and credit unions are putting the security of sensitive data at the top of their priorities. In this white paper, explore key challenges these financial institutions are facing and how to overcome them.
Posted: 22 Apr 2020 | Published: 22 Apr 2020

Guardicore

The Right Roles for SIEM and EDR
sponsored by Cybereason
WHITE PAPER: While most organizations recognize the need for security incident response and threat hunting, many are uncertain how to go about configuring a setup that meets their needs. In this white paper, explore the and benefits of configuring SIEM technologies with new tools like EDR and SOAR.
Posted: 21 Apr 2020 | Published: 22 Apr 2019

Cybereason

Five Stages to Create A Closed-Loop Security Process with MITRE ATT&CK
sponsored by Cybereason
WHITE PAPER: Prior to MITRE ATT&CK, a security framework that allowed for realistic testing and provided a basis for improvement of security operations process and technology didn’t fully exist. In this white paper, discover the key components of the MITRE ATT&CK framework and 5 stages for creating a closed-loop security process.
Posted: 21 Apr 2020 | Published: 21 Apr 2020

Cybereason

Securely Maintain Business Continuity with A Remote Workforce
sponsored by Cybereason
WHITE PAPER: In response to social distancing recommendations, organizations have had to rapidly enable their entire staff to work remotely. However, such a dramatic shift can often lead to security oversights, which result in vulnerabilities. Read on to unlock a checklist and ensure your organization didn’t miss any vital preparation steps.
Posted: 20 Apr 2020 | Published: 17 Mar 2020

Cybereason

Navigate the Cybersecurity Skills Shortage with Cyber Hygiene Automation
sponsored by Automox
WHITE PAPER: For today’s IT teams and the businesses that they support, the shortage of cybersecurity professionals is a growing concern. In fact, the global security workforce would need to grow by at 145% to meet current demand. This white paper explores how organizations can address the skills gap in order to fine-tune their security approach.
Posted: 15 Apr 2020 | Published: 15 Apr 2020


How to Stay Secure as a Retailer Using Cloud to Improve the Customer Experience
sponsored by DivvyCloud
WHITE PAPER: Today’s retailers are facing stress on several fronts: Customer demands for improved experience, competitive pressures, and the need to ensure regulatory compliance. This cloud security guide for retailers breaks down these common challenges and offers pragmatic advice for developing a roadmap for security and compliance.
Posted: 14 Apr 2020 | Published: 14 Apr 2020

DivvyCloud

Keeping your Cloud out of the News
sponsored by DivvyCloud
WHITE PAPER: It’s a common misconception that embracing cloud requires forfeiture of security. In fact, Gartner predicts that through 2022, at least 95% of cloud security failures will be the customer’s fault, not the provider. This white paper illustrates where the faults lie and explores how DivvyCloud may be able to help.
Posted: 14 Apr 2020 | Published: 14 Apr 2020

DivvyCloud

2020 State of Malware Report
sponsored by Malwarebytes
WHITE PAPER: Each year, cybercriminals come up with more creative ways to infect organizations, devices and users in order to cause disruptions. In this 2020 State of Malware Report, take a closer look at some of the key attack trends in 2019 and see how the threat landscape has evolved over the last decade.
Posted: 14 Apr 2020 | Published: 29 Feb 2020

Malwarebytes

Zero Trust’s Blind Spot: How Proactive Cyber Hygiene Preserves Zero Trust
sponsored by Automox
WHITE PAPER: Although zero-trust has grown in popularity, it should only serve as a piece of the cybersecurity puzzle rather than a standalone solution. In this white paper, discover why organizations should look to make widespread security improvements in order to fill in the gaps of zero-trust and get the most out of their security tools.
Posted: 14 Apr 2020 | Published: 14 Apr 2020


Data Privacy at Automox: Why SaaS Applications Deliver Superior Security
sponsored by Automox
WHITE PAPER: Cloud computing has seen a meteoric rise from emerging trend to backbone of most technology infrastructures. The growing list of benefits that come from a cloud transformation often overshadow the most common concern – security. In this white paper, learn more about the current cloud security landscape and where it’s expected to go.
Posted: 14 Apr 2020 | Published: 14 Apr 2020


How Vendor Email Compromise Works
sponsored by Armorblox
WHITE PAPER: The FBI updated their estimate of how much money was lost due to Business Email Compromise (BEC) attacks to $26 billion over the past three years, making it one of the costliest forms of cyberattack. Recently, Vendor Email Compromise (VEC), a variant of BEC, has emerged. In this blog post, learn more about VEC and how it differs from BEC.
Posted: 14 Apr 2020 | Published: 14 Apr 2020

Armorblox

Payroll Fraud: When Direct Deposits Go Rogue
sponsored by Armorblox
WHITE PAPER: One thing all employees can agree on the sense of accomplishment that comes on salary day. Imagine the feeling of disappointment upon realizing that a cybercriminal diverted your wages to their own account. Payroll fraud is a growing problem. In this white paper, take a closer look at what defines payroll fraud and what makes it successful.
Posted: 13 Apr 2020 | Published: 13 Apr 2020

Armorblox
126 - 150 of 1166 Matches Previous Page    4 5 6 7 8 9    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info