IT Management  >   Systems Operations  >  

Closed Loop Security

RSS Feed   
Closed Loop Security Reports
 
Royal Holloway: Testing antivirus efficacy in Linux
sponsored by ComputerWeekly.com
EZINE: Antivirus software plays an important part in protecting users and networks from malware, so installing and keeping it up-to-date is essential in securing computing devices. Yet Linux users believe this OS can only be marginally affected by malicious software. In this Royal Holloway article, we evaluate the effectiveness of some antivirus products.
Posted: 25 Mar 2021 | Published: 25 Mar 2021

ComputerWeekly.com

How do you solve a problem like security training?
sponsored by ComputerWeekly.com
EGUIDE: In this E-Guide, we will the tricky topic of security awareness training. Firstly, we try to answer the burning question of how to get employees to pay attention to training and take it seriously. Then, we take a look at some security awareness best practices that you can use to craft training your users will actually benefit from.
Posted: 27 Aug 2021 | Published: 27 Aug 2021

ComputerWeekly.com

Computer Weekly - 14 September 2021: Is 3D printing about to hit the mainstream?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out about the emerging consumer services using 3D printing and ask if the technology is about to go mainstream. Our latest buyer's guide looks at the importance of sustainable datacentres. And we analyse the risks of increasing contactless card spending limits and whether tech could help. Read the issue now.
Posted: 10 Sep 2021 | Published: 14 Sep 2021

ComputerWeekly.com

5 Essential Components of a Ransomeware Protection Plan
sponsored by Infrascale
QSO INCENTIVE: Simply answer a few quick questions about your current ransomware prevention strategy to discover 5 essential components that your ransomware protection plan should cover.
Posted: 22 Sep 2021 | Published: 22 Sep 2021

TOPICS:  Malware | Security
Infrascale

Zero trust: Taking back control of IT security
sponsored by ComputerWeekly.com
EGUIDE: In this E-Guide we go in-depth to explore the concept of zerotrust. First, Cliff Saran explores some of the basics of zerotrust, exploring how the advent of mobile computing, remote working, and software-as-a-service (SaaS) had already started the shift in security focus away from the perimeter – even before the Covid-19 pandemic.
Posted: 06 Aug 2021 | Published: 06 Aug 2021

ComputerWeekly.com

IBM Security MaaS360 with Watson Interactive Demo
sponsored by IBM
EBOOK: PH
Posted: 19 Nov 2021 | Published: 19 Nov 2021

TOPICS:  Security
IBM

It Leads The Way: How The Pandemic Empowered It
sponsored by Tanium
WHITE PAPER: Once you realize you can move all your users to WFH in days instead of years, you start to wonder what else you can do quickly. If massive changes are possible, how should IT organizations budget for 2021 and 2022? Read on to see what C-level decision-makers think on the matter.
Posted: 24 Mar 2021 | Published: 24 Mar 2021

TOPICS:  Security
Tanium

SIEM Integrations to Enrich MSP Threat Intelligence
sponsored by Malwarebytes
PRODUCT OVERVIEW: This paper offers up use cases for how to support your security team with SIEM integration, including correlating security data, magnifying visualization, and more. Open now to take a look.
Posted: 24 Jun 2021 | Published: 24 Jun 2021

TOPICS:  Security
Malwarebytes

Cyber Security: 2021 Worst in Show
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide: Throughout 2021, there has been a strong focus worldwide on how to combat cyber security attacks for most businesses. In this e-guide we take a look at the best of the worst of those attacks to happen throughout January to June this year and how businesses can learn/adapt from these attacks.
Posted: 08 Oct 2021 | Published: 08 Oct 2021

ComputerWeekly.com

10 Essential Capabilities of a Modern SOC
sponsored by Splunk
WHITE PAPER: To build a modern SOC, organizations need a security operations platform that supports 10 key capabilities. Tap into this e-book to find out what they are.
Posted: 07 Apr 2021 | Published: 07 Apr 2021

TOPICS:  Security
Splunk
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences