IT Management  >   Systems Operations  >  

Security

RSS Feed   
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 

Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security White Papers (View All Report Types)
1 - 25 of 1022 Matches Previous Page  |  Next Page
The CISOs Guide to Extending Zero Trust to the Endpoint
sponsored by Hysolate
WHITE PAPER: Zero trust is a holistic approach to network security, requiring the verification of each person and device whenever it attempts to access resources on a private network, regardless of whether they are already inside the perimeter. Open up this paper to explore everything you need to know about zero trust for your organization.
Posted: 23 Jun 2021 | Published: 23 Jun 2021

TOPICS:  Security
Hysolate

Ransomware and the Cost of Downtime
sponsored by Datto, Inc.
WHITE PAPER: According to a recent study, in the first half of 2020 ransomware attacks grew by 715% as cybercriminals began exploiting the pandemic. Take a deep dive into this infographic to learn more about ransomware attacks, the true cost of downtime, and how a business continuity and disaster recovery (BCDR) platform can help protect your clients.
Posted: 13 May 2021 | Published: 13 May 2021

TOPICS:  Security
Datto, Inc.

5 Tips for Evaluating AI-Driven Security Solutions
sponsored by BlackBerry
WHITE PAPER: In this new era of cybersecurity, vendors like to boast about their supposed AI capabilities. The problem is that AI has become a favorite term of marketers and has been watered down to buzzword status. Read this evaluation guide to learn how to cut through the noise and evaluate AI solutions.
Posted: 22 Apr 2021 | Published: 22 Apr 2021

TOPICS:  Security
BlackBerry

2021 State of Open-Source Security Report
sponsored by Contrast Security
WHITE PAPER: Open-source libraries are growing in complexity, increasing risk while making it more difficult to secure modern applications. The 2021 State of Open-source Security Report uses telemetry from actual applications protected by Contrast OSS and Contrast Assess to reveal trends about library usage, vulnerabilities, and best practices. Read it here.
Posted: 15 Apr 2021 | Published: 15 Apr 2021

TOPICS:  Security
Contrast Security

Incident Response In The New Work From Home Economy
sponsored by Tanium
WHITE PAPER: This paper discusses the challenges for incident handlers to respond to breaches in the new work-from-home economy and what tactics, techniques, and tools can be used to respond to incidents, including those affecting workloads in the cloud.
Posted: 12 Apr 2021 | Published: 12 Apr 2021

TOPICS:  Security
Tanium

10 Essential Capabilities of a Modern SOC
sponsored by Splunk
WHITE PAPER: To build a modern SOC, organizations need a security operations platform that supports 10 key capabilities. Tap into this e-book to find out what they are.
Posted: 07 Apr 2021 | Published: 07 Apr 2021

TOPICS:  Security
Splunk

Impacts of Cyberattacks on IoT Devices
sponsored by Palo Alto Networks
WHITE PAPER: Attack surfaces, threat vectors and vulnerabilities are 3 widely researched topics when it comes to the internet of things (IoT). However, there isn't nearly enough research on the impact successful cyberattacks have on IoT devices. Unit 42, the global threat intelligence team at Palo Alto Networks, took a closer look at this impact.
Posted: 01 Apr 2021 | Published: 01 Apr 2021

TOPICS:  Security
Palo Alto Networks

It Leads The Way: How The Pandemic Empowered It
sponsored by Tanium
WHITE PAPER: Once you realize you can move all your users to WFH in days instead of years, you start to wonder what else you can do quickly. If massive changes are possible, how should IT organizations budget for 2021 and 2022? Read on to see what C-level decision-makers think on the matter.
Posted: 24 Mar 2021 | Published: 24 Mar 2021

TOPICS:  Security
Tanium

How It Resilience Gaps Impact Your Business
sponsored by Tanium
WHITE PAPER: This report presents the results of a two-phase survey, conducted among 4,000+ business decision-makers and over 500 CIOs and CISOs, about the challenges IT leaders are facing today when balancing business security and continuity.
Posted: 24 Mar 2021 | Published: 24 Mar 2021

TOPICS:  Security
Tanium

CISSP Exam Guide: Chapter 1: Security and Risk Management
sponsored by McGraw Hill
WHITE PAPER: In this 174-page chapter download from McGraw Hill, learn everything you need to know about the first domain, security and risk management, to help you excel at your CISSP exam.
Posted: 08 Mar 2021 | Published: 31 Dec 2020

McGraw Hill

MITRE ATT&CK White Paper
sponsored by IronNet
WHITE PAPER: The MITRE ATT&CK Framework provides valuable and objective insights into the target of a threat and its current phase. Download this whitepaper to read about the 5 ways for a CISO to use the MITRE ATT&CK Framework including increasing your visibility of the threat landscape and strengthening your defensive posture now and over time.
Posted: 05 Mar 2021 | Published: 05 Mar 2021

IronNet

Burdens Of Homegrown Customer Identity That Hinder Digital Transformation
sponsored by Okta
WHITE PAPER: When your organization is building to scale, you must place your customers first. Customer identity and access management (CIAM) are the front door to your company’s digital experiences. But many are still using homegrown CIAM, and this puts up roadbloacks to transformation. Dive into this white paper to see why your CIAM may need an update.
Posted: 01 Mar 2021 | Published: 01 Mar 2021

Okta

3 Threat Vectors Addressed By Zero Trust App Sec
sponsored by Traceable
WHITE PAPER: Zero trust has been around for some time, but implementations of a zero-trust model for network and application security are few and far between. Now, you can explore how a zero-trust approach can help protect applications from 3 dangerous threat vectors. Read the full blog post to learn what they are and what you can do.
Posted: 23 Feb 2021 | Published: 23 Feb 2021

Traceable

Text Message and Social Media Compliance Best Practices for Law Enforcement Agencies
sponsored by Smarsh
WHITE PAPER: The popularity of workplace SMS/text messaging and social media has exploded in recent years. Because of this, law enforcement needs to be aware of certain guidelines and considerations when allowing officers and agency employees to use these communication tools. Use this guide to learn how to stay SMS and social media compliant.
Posted: 23 Feb 2021 | Published: 23 Feb 2021

Smarsh

MOBILE AUTHENTICATION: The Future Of Mobile Security And User Engagement
sponsored by Infobip
WHITE PAPER: Read this report to discover the numerous mobile security threats businesses are facing and learn how a variety mobile authentication and security strategies can be used to mitigate these risks.
Posted: 22 Feb 2021 | Published: 22 Feb 2021

Infobip

Security Observability: Why Tracing?
sponsored by Traceable
WHITE PAPER: Cyberattacks can cost affected organizations as much as $13 million per year. What if you could reduce the time to detect a cyberattack all the way down to zero? How much could you save by detecting and stopping an attack while it’s still happening? Leverage this white paper to learn the 4 pillars of security observability.
Posted: 22 Feb 2021 | Published: 22 Feb 2021

Traceable

6 Ways BAS Increases Cybersecurity ROI
sponsored by Cymulate
WHITE PAPER: This white paper outlines 6 ways that BAS can increase your cybersecurity ROI. Download the PDF to get started.
Posted: 19 Feb 2021 | Published: 19 Feb 2021

TOPICS:  Security
Cymulate

Automated Endpoint Incident Response: An Enterprise Guide
sponsored by Malwarebytes
WHITE PAPER: Explore the current market influences that impact the need for automated cyber response and the key methods that can be adopted to compress response times.
Posted: 19 Feb 2021 | Published: 19 Feb 2021

Malwarebytes

Kaspersky Threat Intelligence
sponsored by Kaspersky
WHITE PAPER: Tracking, analyzing and mitigating evolving IT security threats is no easy feat. Enterprises across all sectors are facing a shortage of the up-to-the-minute, relevant data they need to help them manage the risks associated with IT security threats. View this white paper to see how Kaspersky’s Threat Intelligence strives to alleviate this issue.
Posted: 17 Feb 2021 | Published: 17 Feb 2021

Kaspersky

Cybersecurity Is Improving, But Is It Enough?
sponsored by eSentire
WHITE PAPER: Threat intelligence and security orchestration are leading the charge in increasingly flexible and dynamic IT environments. But what do IT leaders think? Leverage this 451 Research white paper to uncover critical survey data about modern cybersecurity trends and where attitudes are shifting as more and more companies adopt cloud.
Posted: 17 Feb 2021 | Published: 31 Oct 2019

eSentire

Kaspersky for Security Operations Center
sponsored by Kaspersky
WHITE PAPER: Many organizations are establishing Security Operations Centers (SOCs) to combat security issues as they arise, providing a swift response and a decisive resolution.In this white paper, learn about Kaspersky’s Security Training Program as well as their other advanced offerings that can help make your SOCs and security teams the best they can be.
Posted: 16 Feb 2021 | Published: 16 Feb 2021

TOPICS:  Security
Kaspersky

Exploring The Cymulate Edge How Targeted Cyberattack Simulations Differ From Penetration Tests & Vulnerability Scanning
sponsored by Cymulate
WHITE PAPER: Targeted cyberattack simulation, vulnerability scans, penetration testing – which of these is the most effective method of identifying weaknesses within your defenses and ensuring your security capabilities can handle the rigors of today’s cyberthreats? Read this white paper to find out.
Posted: 12 Feb 2021 | Published: 12 Feb 2021

Cymulate

The State Of Breach And Attack Simulation And The Need For Continuous Security Validation: A Study Of US And UK Organizations
sponsored by Cymulate
WHITE PAPER: In a recent Ponemon survey, 62% of respondents say their organizations had to acquire new security technologies to protect WFH, and yet 62% say their organizations did not validate these newly deployed security controls. Read on to uncover more results from The State of Breach and Attack Simulation and the Need for Continuous Security Validation.
Posted: 11 Feb 2021 | Published: 11 Feb 2021

TOPICS:  Security
Cymulate

High-Velocity Cloud Security At Scale
sponsored by BreakFree Solutions
WHITE PAPER: The key to realizing the full benefits of a cloud migration lies in striking a balance between transformative cloud capabilities and effective cloud security. Read this insight report to learn about BreakFree’s cloud security framework and discover how to implement it with JupiterOne.
Posted: 11 Feb 2021 | Published: 11 Feb 2021

BreakFree Solutions

The 3 Approaches Of Breach & Attack Simulation Technologies
sponsored by Cymulate
WHITE PAPER: Take a look at 3 different categories of Breach & Attack Simulations (BAS) so you can understand and select the more appropriate BAS solution for your organization.
Posted: 11 Feb 2021 | Published: 11 Feb 2021

TOPICS:  Security
Cymulate
1 - 25 of 1022 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences