IT Management  >   Systems Operations  >   Security  >  

Computer Security Management

RSS Feed   
Computer Security Management Reports
 
Global Data at Risk: State of the Web Report
sponsored by Tala Security
WHITE PAPER: 2020 has indisputably been defined as a year of unique events with significant, long-lasting implications. The following report explores the state of the web in order to provide you with emerging trends, threat vectors, hacker behavioral patterns and more – read on to unlock the Global Data at Risk: 2020 State of the Web Report.
Posted: 01 Sep 2020 | Published: 01 Sep 2020

Tala Security

5 Critical Requirements for Internal Firewalling in the Data Center
sponsored by VMware
WHITE PAPER: Forrester reports that 58% of companies faced a significant security incident in 2019 despite spending more to secure their networks. Much of this is due to overreliance on perimeter firewalls, which has been a handicap for organizations in recent years. Open this VMware report to get a glimpse at their next-generation firewall technology.
Posted: 01 Sep 2020 | Published: 31 Mar 2020

VMware

Thales Data Protection Portfolio
sponsored by Thales
PRODUCT OVERVIEW: In this solution brief, discover an overview of Thales’ data protection portfolio – a collection of capabilities and offerings designed to enable improved security, compliance and operational efficiency while reducing costs. Read on to learn more about the features and benefits of the portfolio.
Posted: 11 Sep 2020 | Published: 29 Feb 2020

Thales

Survey Report: Evolution of the CASB
sponsored by Proofpoint
ANALYST REPORT: In the wake of COVID-19, work-from-home orders issued by most companies and governments have accelerated the digitalization and adoption of remote services. The expansion of the virtual workforce and adoption of cloud has emphasized the need for security and compliance in the enterprise. View this report to get a perspective on the use of CASBs.
Posted: 04 Sep 2020 | Published: 04 Sep 2020

Proofpoint

10 Cybersecurity Best Practices for Securing Remote Workers
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: As a result of the pandemic, organizations are being forced to re-allocate their resources in order to focus on securing their predominantly remote workers. In order to help organizations adjust to the new normal, Arctic Wolf created this checklist of 10 WFH best practices – read on to get started.
Posted: 31 Aug 2020 | Published: 31 Aug 2020

Arctic Wolf Networks, Inc.

A Web of Weak Spots: Securing Your Supply Chain with NDR and Collective Defense
sponsored by IronNet
WHITE PAPER: Today’s supply chain is an extended enterprise with many back doors. Indirect attacks against weak links in the supply chain now account for 40% of security breaches. How can you better protect your data? Dig into this white paper to learn the 5 most common attacks and how network detection & response can help prevent them.
Posted: 03 Sep 2020 | Published: 03 Sep 2020

IronNet

The CIO’s Cybersecurity Checklist
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: CIOs have never been under more duress than they are under now. An enlarged attack surface coupled with a growing threat landscape means that senior leaders have to dot their i’s and cross their t’s when it comes to network security. Want to stay ahead? View this CIO cybersecurity checklist to know where you are and where you need to be.
Posted: 04 Sep 2020 | Published: 04 Sep 2020

Arctic Wolf Networks, Inc.

Complete Endpoint Protection
sponsored by Cybereason
DATA SHEET: In today’s fast-paced and increasingly distributed business environment, protecting the growing population of endpoints from cyberthreats has become increasingly challenging. In this data sheet, discover the key capabilities of Cybereason’s endpoint protection platform and see if it aligns with your endpoint security strategy.
Posted: 10 Sep 2020 | Published: 10 Sep 2020

Cybereason

KVC Health Systems Eliminates Email Security Incidents with Vade Secure
sponsored by Vade Secure
CASE STUDY: In this case study, discover how KVC was able to address the growing concerns around phishing-related attacks and explore how their partnership with Vade Secure enabled them to protect the sensitive healthcare data of their staff and patients.
Posted: 17 Sep 2020 | Published: 17 Sep 2020


Hacker vs CISO: Exploiting and Protecting Your WFH Workforce
sponsored by Tanium
WEBCAST: The hacker is the bane of the CISO, and vice versa. It’s not often that both of these enigmatic personas are in the same room to speak on organizational security and the threat landscape, and during an era of global remote work, their words are quite valuable. Watch this unique webcast to learn perspectives from two opposing security combatants.
Posted: 01 Sep 2020 | Premiered: Aug 28, 2020

Tanium
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info