IT Management  >   Systems Operations  >   Security  >  

Auditing (Computer Security)

RSS Feed   
Auditing (Computer Security) Reports
 
SIEM, SOAR or both? Our security experts weigh in
sponsored by ComputerWeekly.com
EGUIDE: In this E-Guide we turn to the Computer Weekly Security Think Tank, a hand-picked panel of cyber security insiders, experts, analysts, and advocates with over a century's worth of collective experience between them, to explore the topic of Security Information and Event Management (SIEM), and Security Orchestration, Automation and Response, (SOAR).
Posted: 21 Dec 2020 | Published: 21 Dec 2020

ComputerWeekly.com

Towards an Autonomous Vehicle Enabled Society: Cyber Attacks and Countermeasures
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Cyber-attacks against autonomous vehicles could have grave implications for safety, privacy, reputation of manufacturers, and public perception.
Posted: 05 Aug 2016 | Published: 05 Aug 2016

ComputerWeekly.com

E-Guide: Database Tools for Auditing and Forensics
sponsored by SearchSecurity.com
EGUIDE: This e-guide presents the best practices for tuning database auditing tools. Continue reading this e-guide to learn more about these best practices which will allow you to audit without forfeiting  database performance.
Posted: 22 Mar 2011 | Published: 22 Mar 2011

SearchSecurity.com

E-Guide: Evaluating cloud security concerns
sponsored by SearchSecurity.com
EGUIDE: The benefits of cloud computing such as reduced costs and greater efficiency are widely understood by today’s organisations, but security still remains a top concern. This expert tip provides advice on how to evaluate cloud computing providers and highlights some of the risks that must be considered when evaluating cloud solutions.
Posted: 29 Jun 2011 | Published: 29 Jun 2011

SearchSecurity.com

MSPs: The 5 essentials from your endpoint security partner
sponsored by Malwarebytes
EBOOK: When it comes to managing cybersecurity, safeguarding client endpoints is a critical piece of the MSP service offering—as well as a complicated one. Read this e-book to view 5 essentials that MSPs need from their endpoint security providers and for tips and solutions to ensure your MSP is successful in this area.
Posted: 06 Jul 2020 | Published: 06 Jul 2020

Malwarebytes

Panda Security and Minopex - Case Study
sponsored by Panda Security
CASE STUDY: Learn how a mining organization was able to integrate a cloud systems management tool into their existing security solutions to streamline audits, make diagnoses and resolve incidents wherever they are and whenever they arise.
Posted: 12 Jul 2013 | Published: 12 Jul 2013

Panda Security

How To Limit Privileged Accounts And Boost Security
sponsored by Devolutions
EGUIDE: Too many privileged accounts can result in access abuse in enterprises.This expert e-guide details which account privileges should be limited to reduce security incidents, how pervasive the risk is, and the challenges associated with privileged accounts.
Posted: 20 Mar 2017 | Published: 15 Mar 2017

Devolutions

SearchSecurity.com E-Guide: Database Security Best Practices: Tuning database audit tools
sponsored by IBM
EGUIDE: Auditing is a key component to security and compliance, and a widely accepted practice by IT operations. In this expert tip, you’ll find an in-depth overview of the tools required to create and collect successful database audits, as well as a set of best practices for tuning audit tools.
Posted: 25 Aug 2011 | Published: 25 Aug 2011

IBM

Security Rating Scores for Third-Party Vendors Catching On
sponsored by BitSight
EGUIDE: In this e-guide discover why implementing security rating scores for third-party vendors is catching on, and if their impact is showing to be an overall positive one for the industry.
Posted: 23 Feb 2017 | Published: 15 Feb 2017

BitSight

Salvation Army Protects the Integrity of Data and Global Brand
sponsored by Lumension
WHITE PAPER: In this white paper, uncover device control software that enables authorized devices and applications to access organizations' networks to ensure security policies and requirements are met.
Posted: 14 Oct 2013 | Published: 14 Oct 2013

Lumension
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences