IT Management  >   Systems Operations  >  

Computer Security

RSS Feed   
DEFINITION: A trusted platform module (TPM) is a specialized chip that can be installed on the motherboard of a personal computer for the purpose of hardware authentication . The TPM authenticates the computer in question rather than the user. To do so, TPM stores information specific to the host system, such as encryption keys, digital certificate s and password s.TPM minimizes the risk that data on the computer  … 

Computer Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
Computer Security Reports
 
The Future of Remote Work: Securing A Distributed Workforce
sponsored by VMware International Unlimited Company
RESOURCE: Nearly all non-essential employees have been working remotely since March, a trend that is likely to continue for the foreseeable future. To help organizations acclimate, VMware offers their Carbon Black Cloud tool, which looks to consolidate and unify security efforts across all control points – read on to explore the key features.
Posted: 22 Oct 2020 | Published: 22 Oct 2020

VMware International Unlimited Company

Driving Real Behaviour Change
sponsored by Proofpoint
EBOOK: There are key factors that determine the success or failure of any security awareness program: timing, engagement, and knowledge of the role of data all contribute to a metrics-based plan for security awareness in an organization. But how do you get started? Dive into this detailed e-book to learn how to begin to drive changes in behavior.
Posted: 16 Oct 2020 | Published: 30 Jun 2020

Proofpoint

Customer Series: How to go from IoT Concept to Market Rapidly with Dynamis
sponsored by Particle
WEBCAST: This webcast provides advice to help launch your idea into production using IoT. Learn common go-to-market challenges and how you can overcome them by partnering with Particle. Download the webcast now.
Posted: 16 Oct 2020 | Premiered: Oct 16, 2020

Particle

Cybersecurity Automation for Dummies
sponsored by Infoblox
EBOOK: Automation is quickly becoming one of the most valuable capabilities for providing security across growing network landscapes. This eBook, Cybersecurity Automation for Dummies, provides additional insight and expert guidance regarding the role of automation in security programs.
Posted: 20 Oct 2020 | Published: 20 Oct 2020

Infoblox

How Much is Too Much Cybersecurity Noise?
sponsored by Dell SecureWorks
WHITE PAPER: For security professionals, cybersecurity alert volume has gotten to the point where it’s almost too noisy to sift through – creating significant security challenges. So, what can security teams do to make sense of the noise? Read this white paper to find out.
Posted: 19 Oct 2020 | Published: 19 Oct 2020

Dell SecureWorks

How to Improve ROI and Operational Efficiency for Cybersecurity
sponsored by Vectra AI
PRODUCT OVERVIEW: The effects of the cybersecurity skills gap are most prominent when it comes to threat detection and response – teams are overworked by the sheer volume of alerts, not to mention the effort it takes to flag and isolate threats before it’s too late. Read this white paper for an overview of Vectra’s AI offering, which aims to remedy this gap.
Posted: 22 Oct 2020 | Published: 22 Oct 2020

Vectra AI

SANS Using Zero Trust to Enable Secure Remote Access
sponsored by BlackBerry
WHITE PAPER: Zero trust is a model in which all assets in an IT operating environment are considered untrusted by default until network traffic and behavior is validated and approved.
Posted: 15 Oct 2020 | Published: 15 Oct 2020

TOPICS:  Security
BlackBerry

How Secureworks Offers a Holistic Approach to Security
sponsored by Dell SecureWorks
WHITE PAPER: In today’s increasingly dangerous threat landscape, only a unified, integrated approach to security can help your organization address these challenges. This white paper talks about how SecureWorks leverages artificial intelligence and machine learning to help organizations build a holistic cybersecurity approach – read on to learn more.
Posted: 23 Oct 2020 | Published: 23 Oct 2020

Dell SecureWorks

Unmasking BEC and EAC
sponsored by Proofpoint
EBOOK: Tap into The Complete Guide to Stopping Business Email Compromise, Email Account Compromise and Today’s Biggest Impostor Threats for concrete steps on how to keep your users safe.
Posted: 16 Oct 2020 | Published: 16 Oct 2020

Proofpoint

Is Your Enterprise Network Future Ready?
sponsored by VMware International Unlimited Company
WHITE PAPER: To keep up with the rapid pace of their businesses, many organizations have adopted a multi-cloud strategy. However, complexity can add up quickly. In this white paper, learn how building a foundation of consistent networking and security across clouds can help simplify multi-cloud operations.
Posted: 14 Oct 2020 | Published: 14 Oct 2020

VMware International Unlimited Company
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info