IT Management  >   Systems Operations  >  

Computer Security

RSS Feed   
DEFINITION: A trusted platform module (TPM) is a specialized chip that can be installed on the motherboard of a personal computer for the purpose of hardware authentication . The TPM authenticates the computer in question rather than the user. To do so, TPM stores information specific to the host system, such as encryption keys, digital certificate s and password s.TPM minimizes the risk that data on the computer  … 

Computer Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
Computer Security Reports
 
Cyber Security: 2021 Worst in Show
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide: Throughout 2021, there has been a strong focus worldwide on how to combat cyber security attacks for most businesses. In this e-guide we take a look at the best of the worst of those attacks to happen throughout January to June this year and how businesses can learn/adapt from these attacks.
Posted: 09 Jun 2021 | Published: 09 Jun 2021

ComputerWeekly.com

Inventa for Hospitality
sponsored by 1Touch.io
DATA SHEET: Learn why businesses in the hospitality industry are using 1touch.io’s Inventa Platform, an AI-based data discovery platform that automatically detects and classifies any data types, regardless if it’s structured or unstructured.
Posted: 02 Mar 2021 | Published: 02 Mar 2021

TOPICS:  Security
1Touch.io

The Ultimate Guide to Securing Today's Remote Workforce
sponsored by TechTarget
RESOURCE: After Gartner re-examined its 2020 forecast in the wake of the pandemic, analysts now recommend securing the remote workforce as a top priority for enterprises. In fact, password security and remote access for employees are areas that need to be addressed first. Learn more about what security experts and analysts recommend in our new guide.
Posted: 29 Mar 2021 | Published: 31 Jul 2021

TechTarget

CW Europe - March-May 2021: Nordic tech startups create blueprint for post-Covid working environment
sponsored by ComputerWeekly.com
EZINE: Business can learn lessons from Nordic tech startups to prepare employees to return to the office after Covid restrictions end.
Posted: 26 Feb 2021 | Published: 11 Mar 2021

ComputerWeekly.com

Protecting Against the Hidden Threats of New Technologies
sponsored by Traceable
RESOURCE: Software development is being revolutionized by tools like GraphQL, but these new technologies also bring unknown security risks with them. Read this Traceable post to learn some of the biggest challenges facing modern application security, the shortcomings of legacy security, and strategies and solutions tackling this new wave of problems.
Posted: 22 Feb 2021 | Published: 22 Feb 2021

Traceable

A Computer Weekly e-guide to SASE
sponsored by ComputerWeekly.com
EGUIDE: Covid has changed everything. Yet while it has truly as introduced many new things to many spheres of activity, in terms of networking it has actually acted as an accelerant to phenomena that were just gaining momentum before the first lockdowns and stay at home orders were being made. secure access service edge (SASE) is one such case.
Posted: 29 Jul 2021 | Published: 28 Jul 2021

ComputerWeekly.com

The CISOs Guide to Extending Zero Trust to the Endpoint
sponsored by Hysolate
WHITE PAPER: Zero trust is a holistic approach to network security, requiring the verification of each person and device whenever it attempts to access resources on a private network, regardless of whether they are already inside the perimeter. Open up this paper to explore everything you need to know about zero trust for your organization.
Posted: 23 Jun 2021 | Published: 23 Jun 2021

TOPICS:  Security
Hysolate

7 Experts on Transitioning to MDR
sponsored by GoSecure
EBOOK: Managed detection and response (MDR) can help you quickly identify and mitigate cyberattacks. But it’s not always clear when a company should move to MDR, nor is it clear how to get the greatest value from an MDR service. In this e-book, hear from 7 security experts as they offer advice to organizations considering MDR.
Posted: 02 Mar 2021 | Published: 02 Mar 2021

GoSecure

Leve raging AI to Automate Vulnerability Management
sponsored by Dell SecureWorks
DATA SHEET: Today’s organizations need vulnerability management (VM) solutions that are built to maximize risk reduction. With the power of ML, these same organizations can minimize the manual burden on InfoSec and IT operations teams. Download this data sheet to explore how Secureworks’ VM solution strives to do all this and more.
Posted: 23 Feb 2021 | Published: 23 Feb 2021

Dell SecureWorks

Security in the supply chain: Lessons learned from SolarWinds
sponsored by TechTarget
RESOURCE: Explore some of the key lessons we've learned from SolarWinds, and tips for applying them to your supply chain, in our expert guide—which you can download after a brief survey.
Posted: 30 Jul 2021 | Published: 31 Jul 2021

TechTarget
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences