IT Management  >   Systems Operations  >   Security  >  

Computer Security Management

RSS Feed   
Computer Security Management Reports
 
Protecting Against Third-Party Breaches Requires Continuous Monitoring
sponsored by BitSight
RESOURCE: With growing numbers of data breaches being traced to third parties with lax security processes, organizations are implementing "always-on" vendor risk management programs. Read on for insights on continuous monitoring and third-party risks.
Posted: 31 Oct 2018 | Published: 31 Oct 2018

BitSight

2018 Application Security Statistics Report
sponsored by WhiteHat Security
WHITE PAPER: This application security statistics report provides an analysis of the state of application security, brings to the forefront evolutionary trends, and highlights best practices that result in better application security over time. The report also presents challenges and opportunities to secure the applications.
Posted: 07 Dec 2018 | Published: 31 Dec 2018

WhiteHat Security

The ROI of Security Orchestration and Automation
sponsored by Rapid7
WHITE PAPER: As the technology we use at work expands, speed has never been more important for security operations teams. Security orchestration and automation is becoming a vital aspect of many organizations' security strategies. In this white paper, learn how many companies are using it to successfully tackle common security processes and investigation types.
Posted: 13 Dec 2018 | Published: 13 Dec 2018

Rapid7

Cloud Security: Are You Ready?
sponsored by Symantec
RESOURCE: Download this white paper for a look at some of the key elements and best practices for midsize enterprises looking to ensure security in their cloud implementations.
Posted: 15 Nov 2018 | Published: 15 Nov 2018

Symantec

Defending against Encrypted Threats
sponsored by F5 Networks
WHITE PAPER: In a world dominated by SSL/TLS encrypted traffic, find out how to overcome various challenges with inbound and outbound traffic inspection so that you can effectively neutralize malware attacks, intelligently route traffic, and more.
Posted: 03 Dec 2018 | Published: 03 Dec 2018

F5 Networks

Email Fraud Defense (EFD)
sponsored by Proofpoint, Inc.
VIDEO: Learn how to block fraudulent emails before they reach your employees, customers, and partners with Proofpoint Email Fraud Defense (EFD).
Posted: 01 Nov 2018 | Premiered: 29 Oct 2018

Proofpoint, Inc.

Top Five Ways Your Bank Can Benefit from IFRS 9 and CECL
sponsored by SAS
RESOURCE: Download this resource for the top 5 ways your bank can benefit from IFRS 9 and CECL.
Posted: 05 Nov 2018 | Published: 05 Nov 2018

SAS

Zero Trust Threat Prevention, Q3 2018
sponsored by Cyxtera
RESEARCH CONTENT: This Forrester Tech Tide report presents an analysis of the maturity and business value of the 25 technology categories that support Zero Trust threat prevention. Read on to find out which one is the best for your organization.
Posted: 03 Dec 2018 | Published: 12 Jul 2018

Cyxtera

Security Automation Best Practices
sponsored by Rapid7
WHITE PAPER: While processes make it possible to get a job done faster, creating ones that solve practical problems and result in measureable efficiency gains can be a time-consuming task. In this white paper, learn how to make your security team successful with the help of automation.
Posted: 13 Dec 2018 | Published: 13 Dec 2018

Rapid7

Increase Visibility into SSL Encryption to Boost Security
sponsored by F5 Networks
WHITE PAPER: Regaining visibility into encrypted traffic is one of the most important steps you can take to protect your apps, your data, and your business. Find out how SSL/TLS orchestration can help you get that visibility and deliver high-performance decryption and encryption of outbound TLS traffic—without slowing your traffic down.
Posted: 30 Nov 2018 | Published: 30 Nov 2018

F5 Networks
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement