IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed   
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 

Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Management White Papers (View All Report Types)
26 - 50 of 1227 Matches Previous Page  |  Next Page
Lockdown Lessons
sponsored by Webroot
WHITE PAPER: Network security is the immune system of an organization. If a business does not maintain a healthy immune system, then it’s vulnerable to a host of rapidly evolving threats. If you want to learn how to best secure your network, read this white paper from Webroot, which details best practices and innovative methods of protection.
Posted: 29 Jul 2020 | Published: 29 Jul 2020

Webroot

Lockdown Lessons: Closing Security Gaps
sponsored by Webroot
WHITE PAPER: It’s known that keys to security include finding the best technology and putting protocols in place to keep intruders out and employees vigilant. But simple processes such as updating systems, installing patches and disabling unnecessary services can also go a long way. Read this white paper to learn more about gaps to close in your network.
Posted: 29 Jul 2020 | Published: 29 Jul 2020

Webroot

BitterAPT Revisited: The Untold Evolution of an Android Espionage Tool
sponsored by Bitdefender
WHITE PAPER: A malware threat group targeting Pakistani nationals, known as Bitter, became infamous in 2016. In 2019, their campaigns had expanded to other countries in South Asia, East Asia and the Middle East. So, how have their espionage and malware tactics changed over the years? Download this in-depth report to find out.
Posted: 28 Jul 2020 | Published: 28 Jul 2020

Bitdefender

Privileged Access Management Policy Template
sponsored by Thycotic
WHITE PAPER: In order to protect privileged accounts against misuse, organizations are establishing privileged access management (PAM) policies. The following guide highlights a 10-step process for customizing a PAM policy template, designed to help your team build a policy based around your unique security and compliance requirements.
Posted: 28 Jul 2020 | Published: 28 Jul 2020

Thycotic

Kingminer –a Crypto-Jacking Botnet Under the Scope
sponsored by Bitdefender
WHITE PAPER: Kingminer is a piece of crypto-jacking malware that has been around since early 2018. It is an infection that begins from an SQL server process and exploits configuration flaws to obtain access to said server and schedules malicious commands for execution. Read this white paper for a technical analysis and how to know if you’ve been compromised.
Posted: 27 Jul 2020 | Published: 27 Jul 2020

Bitdefender

TikTok Case Study
sponsored by Lookout
WHITE PAPER: Social media companies have been known to breach privacy laws regarding user data, and TikTok, a video sharing app, may be the latest culprit. US, Chinese and Russian governments are all of the belief that TikTok is covertly being used to collect user data, and organizations are digging to find answers. Open this white paper to learn more.
Posted: 24 Jul 2020 | Published: 24 Jul 2020

Lookout

Mobile Phishing: Myths & Facts Facing Every Modern Enterprise Today
sponsored by Lookout
WHITE PAPER: It may surprise you that the rate at which people fall for mobile phishing attacks has increased 85% every year since 2011. Organizations are constantly working to defend against phishing, but methods of defense against email attacks may not likewise prevent mobile attacks. Read this white paper for 3 myths and 3 facts on mobile phishing.
Posted: 23 Jul 2020 | Published: 23 Jul 2020

Lookout

Lookout Discovery: Chinese Surveillanceware
sponsored by Lookout
WHITE PAPER: The Lookout Threat Intelligence team discovered 4 malware tools connected to advanced mobile threat campaigns active since 2013. China was the main target, but at total of twelve languages were targeted. To learn how to avoid these attacks, tap this brief to learn about Lookout's Threat Advisory Service & how it monitors networks/mobile devices.
Posted: 23 Jul 2020 | Published: 23 Jul 2020

Lookout

Don’t Just Educate: Create Cybersafe Behavior
sponsored by Mimecast
WHITE PAPER: Building a cyber-resilient culture involves more than a cut-and-paste security training program that ticks the compliance checklist. In this Forrester study, discover how applying proven behavioral science to SA&T programs can yield organization-wide cultural change and improve security at the people-level.
Posted: 23 Jul 2020 | Published: 30 Apr 2020

Mimecast

Enterprise Data Protection Solutions, Explained
sponsored by Forcepoint
WHITE PAPER: Incomplete or sub-par data protection practices can have devastating impacts for an organization – and choosing the right data protection partner is no easy task. To help you get started, download this enterprise data protection buyer’s guide to key evaluation criteria, questions to consider, a comparison of top vendors, and more.
Posted: 22 Jul 2020 | Published: 22 Jul 2020

Forcepoint

The Road to Digital Transformation: Enabling OT-IT Convergence
sponsored by Orange Business Services
WHITE PAPER: This IDC InfoBrief, The Road to Digital Transformation: Enabling OT-IT Convergence, provides an in-depth look at the obstacles and opportunities as they relate to embracing digital transformation through operational technology (OT) and information technology (IT) convergence. Read on to leverage IDC’s expert guidance.
Posted: 22 Jul 2020 | Published: 31 May 2020

Orange Business Services

Threat Intelligence Report: RSA Conference Edition 2020
sponsored by Mimecast
WHITE PAPER: The Mimecast Threat Intelligence Report: RSA Conference Edition provides a comprehensive analysis of the key findings, trends and recommendations observed by Mimecast’s Threat Center team from October to December 2019. Download the report to discover their results – such as the rise of significant cyberattack campaigns by 145% over last quarter.
Posted: 22 Jul 2020 | Published: 22 Jul 2020

Mimecast

Reaching Beyond The Perimeter: A Deep Dive into Mimecast’s Email Security 3.0 Strategy
sponsored by Mimecast
WHITE PAPER: Cybercriminals are at the peak of their powers. They’ve developed specialized tools to dig right into the hearts of businesses and leave without a trace. Email is at the center of this, with 60% of all email sent to organizations being spam or malicious. How does your organization plan to defend? Read this white paper for ideas on strategy.
Posted: 22 Jul 2020 | Published: 22 Jul 2020

Mimecast

Protecting Workloads and Hybrid in Multi-Cloud Environments
sponsored by Guardicore
WHITE PAPER: Businesses may be moving to the cloud, but with 98% of enterprises running on-premise servers, data centers aren’t going anywhere. A hybrid cloud model uses both on-prem data centers and a public cloud to optimize functionality. Read this white paper for information on how to keep these dual-workloads secure.
Posted: 22 Jul 2020 | Published: 22 Jul 2020

Guardicore

Endpoint Security: A White Paper
sponsored by Orange Business Services
WHITE PAPER: With endpoints under constant threat from phishing, malware, spyware and viruses, IT departments must consider how they are protecting their employees’ devices. Browse this white paper for a look at how to effectively monitor endpoints as well as the challenges involved in choosing, deploying and managing an endpoint monitoring capability.
Posted: 21 Jul 2020 | Published: 21 Jul 2020

Orange Business Services

Web Security Technical Deep Dive
sponsored by Mimecast
WHITE PAPER: In this time of uncertainty, cloud and internet-based technologies are under greater threat than ever before. An influx of malware and phishing attacks means that businesses, if not properly protected, are in jeopardy. Read this technical deep dive to learn what you can do to ramp up web security.
Posted: 21 Jul 2020 | Published: 21 Jul 2020

Mimecast

Lessons in Threat Detection
sponsored by Orange Business Services
WHITE PAPER: The UK’s 2018 Cyber Security Breaches Survey found that 43% of businesses had experienced a cybersecurity breach in the last 12 months.With threats on the horizon, some businesses have decided that the best way to learn about their security is to hack… themselves?Jump into this white paper to see what one organization learned from doing so.
Posted: 21 Jul 2020 | Published: 21 Jul 2020

Orange Business Services

Combating the Threat of Business Email Compromise
sponsored by Mimecast
WHITE PAPER: According to the FBI, business email compromise (BEC) cost U.S. organizations more than $1.7 billion last year. According to Gartner, BEC phishing attacks will double every year.In this white paper, read about some of the key challenges business face when it comes to email security and how to be prepared for coming threats.
Posted: 20 Jul 2020 | Published: 20 Jul 2020

Mimecast

How to Help Prevent Increasingly Rampant Brand Exploitation
sponsored by Mimecast
WHITE PAPER: A company’s reputation and trustworthiness is critical to their livelihood – which is why brand exploitation attacks present such a dangerous prospect. Download this white paper to enhance your organization’s preparedness and awareness of these lures, which provides an overview of key brand exploitation challenges and solutions.
Posted: 20 Jul 2020 | Published: 20 Jul 2020

Mimecast

The Business Case for Cysiv SOC-as-a-Service
sponsored by Cysiv
WHITE PAPER: Like most modern technology purchases, organizations interested in investing in a security operations center (SOC) can decide between an on-premise SOC or SOC-as-a-Service, depending on their organization’s specific needs. Download this white paper to discover the benefits of the SOC-as-a-Service model by looking at Cysiv’s SOC-aaS offering.
Posted: 20 Jul 2020 | Published: 20 Jul 2020

Cysiv

Cyber Resilience for Email
sponsored by Mimecast
WHITE PAPER: Did you know that 91% of all cyberattacks start with an email?In the world today, businesses are struggling to keep up with hackers. They need an approach that provides holistic protection, is adaptable and durable, and allows them to recover their data in the event of an attack.Read this white paper for a close look at one such approach.
Posted: 20 Jul 2020 | Published: 20 Jul 2020

Mimecast

Faster Threat Detection and Response with Data Science and Next-gen SIEM
sponsored by Cysiv
WHITE PAPER: Download this white paper for a closer look at Cysiv’s data science-driven approach to more quickly, effectively and efficiently investigate cyber threats within their next-gen security information and event management (SIEM) platform.
Posted: 17 Jul 2020 | Published: 22 Apr 2020

Cysiv

5 steps to secure the enterprise and be fit for a flexible future
sponsored by Avanade
WHITE PAPER: From drastic shifts in remote capabilities to exacerbated security risks, COVID-19 has completely changed the cybersecurity landscape. The most effective way to approach securing your enterprise in the ‘new normal’ is to rethink cybersecurity strategies and challenges. Download this Avanade strategy guide to help guide your restructuring.
Posted: 17 Jul 2020 | Published: 17 Jul 2020

Avanade

3 Indicators to Monitor for Business Email Compromise (BEC)
sponsored by CI Security
WHITE PAPER: Since March 2020, cybercriminals have been exploiting email inboxes at an unprecedented rate with 19-related phishing attacks and business email compromise (BEC) scams. This white paper identifies the 3 most common indicators of a BEC attack, the FBI’s list of BEC red flags, and best practices for lowering your risk.
Posted: 17 Jul 2020 | Published: 17 Jul 2020

CI Security

Why Does Cybersecurity Training Fail?
sponsored by Mimecast
WHITE PAPER: The Verizon 2018 Data Breach Investigations Report found that email attacks were the cause of 96% of data breach incidents. Despite this, 34% of employees don’t see the importance of security measures.The verdict is in: Cybersecurity training fails. Why? What can you do to fix it?Dive into this white paper to learn how to solve this major problem.
Posted: 17 Jul 2020 | Published: 17 Jul 2020

Mimecast
26 - 50 of 1227 Matches Previous Page    1 2 3 4 5    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info