Software  >   Systems Software  >  

Auditing Software (Security)

RSS Feed   
Auditing Software (Security) Reports
 
Vendor Research Report for IT Risk Management
sponsored by MetricStream
ANALYST REPORT: By 2025, 50% of businesses will depend on risk management solutions. As such, security and risk management leaders are hunting for such solutions based on cybersecurity initiatives, board risk oversight and digital compliance obligations. Use this Gartner Magic Quadrant to evaluate the strengths and cautions of various players in the space.
Posted: 21 Jan 2021 | Published: 11 Aug 2020

MetricStream

Inky 2020 End of Year Phishing Report
sponsored by Inky Technology
RESEARCH CONTENT: With most people working remote in 2020, reliance on email for communication grew even higher – leading to a stark rise in phishing attacks. This report reflects on the top threat types and security strategies for phishing in 2020 and offers insight into what to expect in 2021 – read on to unlock the full report.
Posted: 20 Jan 2021 | Published: 20 Jan 2021

Inky Technology

Global CISO Playbook for the New Normal
sponsored by Fidelis
EBOOK: It’s arguable that CISOs have the toughest job in the world right now. Growing cyber terrains, evolving threat landscapes and skill shortages are all placing more pressure on these professionals than ever before. Download this e-book to hear from the CISO of Fidelis Cybersecurity as he outlines strategies and best practices for cyber defense.
Posted: 15 Jan 2021 | Published: 15 Jan 2021

Fidelis

A Next-Generation Approach to KYC
sponsored by Socure
WHITE PAPER: While KYC has become an essential practice in the fight against financial crime, programs can often be burdensome and resource intensive. This whitepaper highlights 3 essential elements required for a safe, seamless and successful KYC program – read on to get started.
Posted: 11 Jan 2021 | Published: 11 Jan 2021

Socure

IAM: Globalization & Large-Scale Enterprise
sponsored by IC Consult
WHITE PAPER: A growing number of workloads and IT services are moving to the cloud, and IAM is no exception. Moving IAM to the cloud helps avoid the integration, management and licensing complexity of hybrid IT environments (some workloads running on-prem, others in parallel in the cloud). Download this white paper to explore Identity-as-a-Service (IDaaS).
Posted: 12 Jan 2021 | Published: 12 May 2020

IC Consult

Ransomware Tabletop Exercise
sponsored by CI Security
WEBCAST: Most organizations don’t have a plan to react to ransomware, and the ones that do may not have fully updated it. Be prepared for the worst – watch this webcast to see Mike Simon, CTO of CI Security, lead a 60-minute virtual tabletop exercise featuring a ransomware attack simulation and how a company responds to it.
Posted: 07 Jan 2021 | Premiered: Dec 8, 2020

CI Security

Using Online Identities in Professional Investigations
sponsored by Pipl
WHITE PAPER: As interactions have become more and more digital, online identities have emerged to replace the traditional notion of a user identity. Read this white paper to learn more about the changing nature of identity and how Pipl leverages online identity data to enhance investigations into today’s cyberthreats.
Posted: 20 Jan 2021 | Published: 20 Jan 2021

Pipl

How to Secure the Voice and Video Apps Your Workforce Depends On
sponsored by LogMeIn Rescue
WEBCAST: Given there’s no sign organizations will soon return to office-based work, IT teams must focus on providing security for voice and video applications. In this webinar, explore the most common threats, such as VoIP and video attacks, and learn how security teams can best counter them through effective prevention, detection and mitigation strategies.
Posted: 05 Jan 2021 | Premiered: Jan 5, 2021

LogMeIn Rescue

The 2020 Trust Report: eCommerce and Retail Executive Summary
sponsored by Synack
ANALYST REPORT: This 2020 Trust Report 1-Page Executive Summary allows you to quickly benchmark your organization’s security against others in eCommerce and Retail. You’ll also learn how organizations that adopt this one testing strategy harden their assets by 23%.
Posted: 07 Jan 2021 | Published: 07 Jan 2021

Synack

Cover Your Bases: Best Practices for Protecting Remote Work
sponsored by Okta
EBOOK: You have a network to protect, and this means not compromising when it comes to access management, authentication, onboarding and training. In a remote world, you need contextualized, cloud-first identity control that’s flexible, so you can handle all this and more, no problem. Download this Okta best practice guide for details.
Posted: 19 Jan 2021 | Published: 19 Jan 2021

Okta
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info