IT Management  >   Systems Operations  >  

Security

RSS Feed   
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 

Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security White Papers (View All Report Types)
1 - 25 of 1098 Matches Previous Page  |  Next Page
Why a Purpose Built MDR is the Answer to your Integration Challenges
sponsored by CyberMaxx
WHITE PAPER: Even best of breed security products and systems are extremely complex to manage. With this white paper, learn how a modern MDR solution can allow for manageable integrations and orchestration capabilities.
Posted: 16 Aug 2021 | Published: 23 Aug 2021

TOPICS:  Security

4 Tactics to Protect Against Harmful Ransomware
sponsored by CyberMaxx
WHITE PAPER: Federal agencies warn organizations to adopt a heightened state of awareness following the rampant ransomware attacks of early 2021. In this white paper, experts share 4 proactive measures you can take to protect your organization. Take this short survey to unlock the tactics.
Posted: 16 Aug 2021 | Published: 16 Aug 2021

TOPICS:  Security

3 Reasons your Operational Workflows are Suffering
sponsored by CyberMaxx
WHITE PAPER: Operational workflows for healthcare cybersecurity are complex. With this white paper, find 3 reasons why operational workflows are suffering and how to MDR can help. Take this survey to access the white paper.
Posted: 16 Aug 2021 | Published: 23 Aug 2021

TOPICS:  Security

3 Key Components of a SOC Why a Hybrid Solution May be Best
sponsored by CyberMaxx
WHITE PAPER: There are many challenges that come with building a SOC in-house, including finding and retaining IT talent. Read this white paper to explore the 3 key components of a SOC and discover why a hybrid solution may be best.
Posted: 16 Aug 2021 | Published: 16 Aug 2021

TOPICS:  Security

The Top 3 Benefits of SIEM as a Service vs Purchasing Off-The-Shelf
sponsored by CyberMaxx
WHITE PAPER: While SIEM can still support on-premises workloads, it now allows for prioritize and contextualize alerts to quickly identify and catch threat actors, ultimately saving your healthcare organization valuable time. Access the white paper to learn more.
Posted: 16 Aug 2021 | Published: 24 Aug 2021

TOPICS:  Security

Ransomware and the Cost of Downtime
sponsored by Datto, Inc.
WHITE PAPER: According to a recent study, in the first half of 2020 ransomware attacks grew by 715% as cybercriminals began exploiting the pandemic. Take a deep dive into this infographic to learn more about ransomware attacks, the true cost of downtime, and how a business continuity and disaster recovery (BCDR) platform can help protect your clients.
Posted: 13 May 2021 | Published: 13 May 2021

TOPICS:  Security
Datto, Inc.

The U.S. Legal Industry: Balancing Protection and Profit
sponsored by F-Secure
WHITE PAPER: Download this report for some of the cyber-risks law firms face in the U.S., and potential methods of affordable risk mitigation.
Posted: 03 May 2021 | Published: 03 May 2021

TOPICS:  Security
F-Secure

Accelerate Cloud Migration through Secure, Automated Access into AWS Resources
sponsored by AWS Okta
WHITE PAPER: Learn how you can accelerate your cloud migration with Okta and AWS in this white paper.
Posted: 23 Apr 2021 | Published: 23 Apr 2021

TOPICS:  Security

5 Tips for Evaluating AI-Driven Security Solutions
sponsored by BlackBerry
WHITE PAPER: In this new era of cybersecurity, vendors like to boast about their supposed AI capabilities. The problem is that AI has become a favorite term of marketers and has been watered down to buzzword status. Read this evaluation guide to learn how to cut through the noise and evaluate AI solutions.
Posted: 22 Apr 2021 | Published: 22 Apr 2021

TOPICS:  Security
BlackBerry

2021 State of Open-Source Security Report
sponsored by Contrast Security
WHITE PAPER: Open-source libraries are growing in complexity, increasing risk while making it more difficult to secure modern applications. The 2021 State of Open-source Security Report uses telemetry from actual applications protected by Contrast OSS and Contrast Assess to reveal trends about library usage, vulnerabilities, and best practices. Read it here.
Posted: 15 Apr 2021 | Published: 15 Apr 2021

TOPICS:  Security
Contrast Security

Incident Response In The New Work From Home Economy
sponsored by Tanium
WHITE PAPER: This paper discusses the challenges for incident handlers to respond to breaches in the new work-from-home economy and what tactics, techniques, and tools can be used to respond to incidents, including those affecting workloads in the cloud.
Posted: 12 Apr 2021 | Published: 12 Apr 2021

TOPICS:  Security
Tanium

Protecting Cloud Workloads from 2021’s Top Cloud Threat
sponsored by Radware
WHITE PAPER: Get an overview of the security challenges brought about by migrating computing workloads to public cloud environments and learn how Radware addresses those challenges and assists organizations in protecting themselves.
Posted: 07 Apr 2021 | Published: 07 Apr 2021

TOPICS:  Security
Radware

10 Essential Capabilities of aModern SOC
sponsored by Splunk
WHITE PAPER: To build a modern SOC, organizations need a security operations platform that supports 10 key capabilities. Tap into this e-book to find out what they are.
Posted: 07 Apr 2021 | Published: 07 Apr 2021

TOPICS:  Security
Splunk

It Leads The Way: How The Pandemic Empowered It
sponsored by Tanium
WHITE PAPER: Once you realize you can move all your users to WFH in days instead of years, you start to wonder what else you can do quickly. If massive changes are possible, how should IT organizations budget for 2021 and 2022? Read on to see what C-level decision-makers think on the matter.
Posted: 24 Mar 2021 | Published: 24 Mar 2021

TOPICS:  Security
Tanium

How It Resilience Gaps Impact Your Business
sponsored by Tanium
WHITE PAPER: This report presents the results of a two-phase survey, conducted among 4,000+ business decision-makers and over 500 CIOs and CISOs, about the challenges IT leaders are facing today when balancing business security and continuity.
Posted: 24 Mar 2021 | Published: 24 Mar 2021

TOPICS:  Security
Tanium

Now’s the Time for an Integrated, Holistic and Cloud-Delivered Cybersecurity Model for Business Communications Services
sponsored by NWN Corporation
WHITE PAPER: Today's work-from-anywhere environment is giving organizations a golden opportunity to reevaluate their approach to cybersecurity and migrate to a model that is tightly aligned with the challenges their organization is facing. Download this white paper to learn more.
Posted: 19 Mar 2021 | Published: 19 Mar 2021

TOPICS:  Security
NWN Corporation

CISSP Exam Guide: Chapter 1: Security and Risk Management
sponsored by McGraw Hill
WHITE PAPER: In this 174-page chapter download from McGraw Hill, learn everything you need to know about the first domain, security and risk management, to help you excel at your CISSP exam.
Posted: 08 Mar 2021 | Published: 31 Dec 2020

McGraw Hill

MITRE ATT&CK White Paper
sponsored by IronNet
WHITE PAPER: The MITRE ATT&CK Framework provides valuable and objective insights into the target of a threat and its current phase. Download this whitepaper to read about the 5 ways for a CISO to use the MITRE ATT&CK Framework including increasing your visibility of the threat landscape and strengthening your defensive posture now and over time.
Posted: 05 Mar 2021 | Published: 05 Mar 2021

IronNet

Securing Medical Technology Devices from 21st Century Cyber Criminals and Malware Attacks
sponsored by BlackBerry
WHITE PAPER: Over the past ten years, healthcare organizations have become the most targeted industry for cyber criminals, sustaining over 24% of all breaches. Learn about the benefits of the Blackberry Spark UES Suite including reduced risk against attacks such as zero-day threats and previously unknown malware.
Posted: 05 Mar 2021 | Published: 05 Mar 2021

BlackBerry

BEST PRACTICES DNS: The First Principle Of Enterprise Security
sponsored by Infoblox
WHITE PAPER: For today’s WFH and soon-to-be-hybrid workforces, security teams must exploit DNS. As the foundation of enterprise networks, DNS can provide a layer of security intelligence otherwise not seen by security operations centers. Leverage this report to learn 5 critical questions organizations must ask of DNS security vendors.
Posted: 25 Feb 2021 | Published: 25 Feb 2021

Infoblox

Secure Sd-Wan For The Cloud-First Enterprise Without Compromise
sponsored by Aruba Networks
WHITE PAPER: As enterprises move to the cloud, security challenges multiply. Examine this white paper to learn how Zscaler and Silver Peak are combining their respective Cloud Security and Unity EdgeConnect SD-WAN platforms to address these challenges. And, see how they’re collaborating to deliver security orchestration for consistent security policies.
Posted: 25 Feb 2021 | Published: 31 May 2019

Aruba Networks

3 Threat Vectors Addressed by Zero Trust App Sec
sponsored by Traceable
WHITE PAPER: Zero trust has been around for some time, but implementations of a zero-trust model for network and application security are few and far between. Now, you can explore how a zero-trust approach can help protect applications from 3 dangerous threat vectors. Read the full blog post to learn what they are and what you can do.
Posted: 23 Feb 2021 | Published: 23 Feb 2021

Traceable

Text Message and Social Media Compliance Best Practices for Law Enforcement Agencies
sponsored by Smarsh
WHITE PAPER: The popularity of workplace SMS/text messaging and social media has exploded in recent years. Because of this, law enforcement needs to be aware of certain guidelines and considerations when allowing officers and agency employees to use these communication tools. Use this guide to learn how to stay SMS and social media compliant.
Posted: 23 Feb 2021 | Published: 23 Feb 2021

Smarsh

MOBILE AUTHENTICATION: The Future Of Mobile Security And User Engagement
sponsored by Infobip
WHITE PAPER: Read this report to discover the numerous mobile security threats businesses are facing and learn how a variety mobile authentication and security strategies can be used to mitigate these risks.
Posted: 22 Feb 2021 | Published: 22 Feb 2021

Infobip

Security Observability: Why Tracing?
sponsored by Traceable
WHITE PAPER: Cyberattacks can cost affected organizations as much as $13 million per year. What if you could reduce the time to detect a cyberattack all the way down to zero? How much could you save by detecting and stopping an attack while it’s still happening? Leverage this white paper to learn the 4 pillars of security observability.
Posted: 22 Feb 2021 | Published: 22 Feb 2021

Traceable
1 - 25 of 1098 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences