IT Management  >   Systems Operations  >   Security  >  

Computer Audits

RSS Feed   
Computer Audits Reports
 
Identifying the Timeline Activities of a Cyber Breach
sponsored by Farsight Security
CASE STUDY: In this case study discover how the use of DNSDB in mapping malicious and benign infrastructure revealed the timeline and activity of a breach of the Anthem Healthcare System.
Posted: 05 May 2017 | Published: 05 May 2017

Farsight Security

Cyber Hygiene: If Tools Could Talk
sponsored by Merlin International
WHITE PAPER: The complexity of today’s IT infrastructures coupled with security tool fragmentation and misconfiguration makes cyber hygiene challenging for companies of all sizes. Download this white paper to learn more about how your organization can improve its cyber hygiene by conducting a self-evaluation of your current posture.
Posted: 29 May 2020 | Published: 15 May 2020

Merlin International

Special Report: 2019 Email Security Trends
sponsored by Barracuda
ANALYST REPORT: How can you keep your pulse on the evolving threat landscape? Download the following report, which illustrates the current state of email security and spotlights trends around security spending, malware and phishing, Office 365 security, and more.
Posted: 06 Aug 2019 | Published: 06 Aug 2019

Barracuda

A Holistic Approach to Securing Kubernetes That Integrates Culture and Technology
sponsored by DivvyCloud
WHITE PAPER: Today’s ever-evolving cloud and container environments paves the way for both innovation and security headaches. In this white paper, discover how integrating a holistic approach for meeting regulatory requirements with Kubernetes can help provide a competitive advantage.
Posted: 09 Apr 2020 | Published: 09 Apr 2020

DivvyCloud

Birst Security and Reliability
sponsored by Infor
WHITE PAPER: The following white paper provides an in-depth look at the key security capabilities of Birst, an Infor company. Download this white paper to learn how Birst ensure the protection and privacy of their customers data and discover how they maintain high data security standards.
Posted: 01 Jul 2020 | Published: 01 Jul 2020


New Topics on the New Security+ SY0-501 Exam
sponsored by Global Knowledge
WHITE PAPER: In 2017, the revised version of the CompTIA Security+ exam was made available, with more focus on risk management and mitigation. This white paper will guide you in your efforts to prepare for the exam by outlining the new topics included in the objectives list for the current version of the exam.
Posted: 16 Jan 2020 | Published: 16 Jan 2020

Global Knowledge

CISO’s Guide to Reducing Risk with Responsible Disclosure
sponsored by HackerOne
WHITE PAPER: Data breaches have devastated organizations over recent years. However, countless breaches were prevented due to hackers disclosing known security vulnerabilities to the organization through what’s known as vulnerability disclosure polices (VDPs). In this white paper, discover how CISO’s can leverage VDPs to reduce risk in their environments.
Posted: 21 Jul 2020 | Published: 21 Jul 2020

HackerOne

Building an Application Security Program: Why Education is Key
sponsored by tCell
EGUIDE: Gain insight into what an application security program might look like as it develops and what experts have to say about what it could mean for the future of application development.
Posted: 28 Mar 2017 | Published: 28 Mar 2017

tCell

7 Elements of Cybersecurity Readiness
sponsored by Cisco Umbrella and Dimension Data
EGUIDE: Discover the 7 elements of cybersecurity readiness an organization needs to possess for a high degree of situational awareness into its network operations and network utilization.
Posted: 29 Mar 2017 | Published: 20 Mar 2017

Cisco Umbrella and Dimension Data

Data Privacy: Where Should I House My Data?
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper offers 6 top recommendations on how to keep your data protected in the cloud and compliant with varying regulatory mandates across country borders.
Posted: 17 Apr 2014 | Published: 17 Apr 2014

IntraLinks, Inc
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info