IT Management  >   Systems Operations  >   Security  >  

Computer Security Management

RSS Feed   
Computer Security Management Reports
 
2019 LexisNexis True Cost of Fraud Study
sponsored by LexisNexis® Risk Solutions
WEBCAST: A recent study by LexisNexis Risk Solutions was conducted to help safely navigate the increasing risk of fraud. The research was able to provide a snapshot of current fraud trends and key pain points among financial services and lending companies in the US. Continue to this webcast to uncover the insights from the research.
Posted: 27 Nov 2019 | Premiered: Nov 27, 2019

LexisNexis® Risk Solutions

Guide to Eliminating the Top 3 Security Pain Points
sponsored by Menlo Security
WEBCAST: In this webinar, leverage the knowledge of industry experts at 451 research and Menlo Security to uncover the most significant information security pain points and strategic recommendations for eliminating them.
Posted: 26 Nov 2019 | Premiered: Sep 26, 2019

Menlo Security

2019 State of the Firewall
sponsored by FireMon
RESOURCE: The gap between innovation and security can lead to errors, accidental exposure, or service disruptions. In this 2019 state of the firewall infographic, learn why network security risk is at an all-time high and more.
Posted: 21 Nov 2019 | Published: 21 Nov 2019

FireMon

Splunk IT Security Predictions 2020
sponsored by Splunk
WHITE PAPER: Technology continues to redesign every aspect of how we live and work. It also creates new security vulnerabilities that savvy attackers are exposing. Being aware of the potential threats allows individuals and organizations to protect their data. In this white paper, uncover some of the most pertinent security considerations for 2020.
Posted: 09 Dec 2019 | Published: 09 Dec 2019

Splunk

Top CASB Use Cases
sponsored by BitGlass
RESOURCE: CASBs have quickly risen to prominence and become go-to solutions for securing cloud and mobile. However, because these platforms offer a wide range of capabilities, it can be challenging to identify which use cases are most relevant to an organization’s needs. IT leaders must consider all common CASB use cases to evaluate competing solutions.
Posted: 22 Nov 2019 | Published: 22 Nov 2019

BitGlass

What to Look for in a Zero Trust Solution in 2020
sponsored by PortSys
WHITE PAPER: The zero-trust approach to access control isn’t a new concept. In fact, it’s been around for nearly 10 years. Although the concept is simple, organizations struggle to understand the most effective ways to implement it. This white paper explores the concept behind zero-trust, why it’s effective, and the primary ways it can be implemented.
Posted: 13 Dec 2019 | Published: 13 Dec 2019

PortSys

Anatomy of Magecart Attacks
sponsored by PerimeterX
WEBCAST: Magecart is an umbrella name for cybercriminal groups practicing digital skimming, that hack their way into your customers credit card details, but what makes these attacks so unique? In this webinar, join industry experts at PerimeterX as they explore the anatomy and impacts of magecart skimming attacks.
Posted: 11 Dec 2019 | Premiered: Dec 11, 2019

PerimeterX

Is the Cloud Transforming Security?
sponsored by Menlo Security
WEBCAST: As IT teams continue to prioritize cloud transformation, it’s imperative to also reconsider security tactics in order to realize the full benefits of cloud services.In this webinar, leverage industry expertise around cloud transformation, security implications, and explore the benefits of isolation tactics.
Posted: 27 Nov 2019 | Premiered: Nov 27, 2019

Menlo Security

Mobile Phishing: Myths and Facts Facing Every Modern Enterprise Today
sponsored by Lookout
WHITE PAPER: Traditional phishing protection methods don’t apply to mobile devices, and cyberattackers are taking exposing this vulnerability. In fact, the rate at which people are falling for phishing attacks on mobile has increased 85% annually since 2011. In this white paper, dissect the myths and facts around mobile phishing.
Posted: 21 Nov 2019 | Published: 21 Nov 2019

Lookout

Addressing CCPA: Legacy ERP and Data Privacy Compliance
sponsored by Appsian
PRODUCT OVERVIEW: With the 2020 launch date for CCPA looming, organizations are scrambling to ensure they have appropriate security measures in place. In this solution brief, highlight the gaps within current security capabilities and explore how organizations can enhance their legacy ERP apps to ensure CCPA compliance.
Posted: 25 Nov 2019 | Published: 25 Nov 2019

Appsian
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement