IT Management  >   Systems Operations  >  

Computer Security

RSS Feed   
DEFINITION: A trusted platform module (TPM) is a specialized chip that can be installed on the motherboard of a personal computer for the purpose of hardware authentication . The TPM authenticates the computer in question rather than the user. To do so, TPM stores information specific to the host system, such as encryption keys, digital certificate s and password s.TPM minimizes the risk that data on the computer  … 

Computer Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
Computer Security Reports
 
Make Trusted Data Privacy Compliance Reporting Easy With ALTR Monitor
sponsored by ALTR
PRODUCT OVERVIEW: Data privacy has transformed from industry-specific regulations into broader compliance concerns which require transparency into the access and use of sensitive data. However, traditional database logs and monitoring products don't return complete information. In this solution brief, explore how ALTR Monitor provides a tamperproof record of data.
Posted: 11 Jun 2019 | Published: 11 Jun 2019

ALTR

Is Your Business Data Protected? Take Our 5 Question Data Security Quiz to Find Out
sponsored by ECi
EBOOK: Is your data protected enough? Take this data security quiz to determine if your level of data security is adequate for your business.
Posted: 14 Jun 2019 | Published: 14 Jun 2019

ECi

Come Hack With Me: The Anatomy of a Data Breach
sponsored by Radware
WEBCAST: Migrating your computing workloads to the public cloud exposes them to a host of new vulnerabilities and attack vectors. In this webinar, Eyal Arazi will take an in-depth look at 2 cloud-native data breaches of organizations running in the public cloud and how they could have possibly been averted.
Posted: 13 Jun 2019 | Premiered: Jun 11, 2019

Radware

Salesforce Uses Bug Bounties to Protect Customer Data
sponsored by HackerOne
CASE STUDY: Salesforce's Bug Bounty program is one of their many efforts that contributes to the security of their products, and therefore, their customers. In this case study, learn how Salesforce has worked with HackerOne to successfully implement their bug bounty program. Also, explore the benefits Salesforce has seen.
Posted: 14 Jun 2019 | Published: 14 Jun 2019

HackerOne

Cyber Intrusion Services
sponsored by CrowdStrike
WHITE PAPER: In this report, discover how the CrowdStrike Falcon can deliver the visibility and operational expertise necessary to stop breaches before adversaries can take control of your entire network, as well as stories from the front lines of incident response in 2018 and insights that matter for 2019.
Posted: 04 Jun 2019 | Published: 04 Jun 2019

CrowdStrike

Understanding the Limitations of Microsoft O365 Security
sponsored by Forcepoint
VIDEO: Microsoft Office 365 includes native security at various levels, depending on your license. But is that enough? In this webinar, discover Osterman Research key findings and what's driving these organizations' decisions, including, key priorities for securing O365, barriers to adoption and full migration of users, and more.
Posted: 29 May 2019 | Premiered: 29 May 2019

Forcepoint

Who Watches the Watchers?
sponsored by Forcepoint
VIDEO: Tune into this webcast as, Forcepoint Chief Scientist, Dr. Richard Ford, looks at analytic techniques that are effective at protecting information from those who already have legitimate access to it.
Posted: 11 Jun 2019 | Premiered: 11 Jun 2019

Forcepoint

Protecting the Unprotectable with Next Generation Authentication
sponsored by Silverfort
VIDEO: Not trusting anyone by default, even those already inside the network perimeter, has to be the new reality. The security model of zero trust. In this webinar, learn why traditional MFA won't cope with zero trust requirements, why passwords are no longer a reliable factor of authentication, and more.
Posted: 28 May 2019 | Premiered: 21 May 2019

Silverfort

DevOps Security for Cloud and Containers
sponsored by Lacework
EBOOK: In this e-book, learn how technology differences between development, staging, and product environments can lead to much larger security problems, how microservices deployed as containers help eliminate vulnerabilities, and much more.
Posted: 30 May 2019 | Published: 30 May 2019

Lacework

Finally, a Killer Application of Blockchain
sponsored by ALTR
ANALYST REPORT: Download this Advisory Report from Outsell Analyst, William Jan, to learn how ALTR's proprietary blockchain technology has reinvented data security to address today's security must-haves.
Posted: 10 Jun 2019 | Published: 10 Jun 2019

ALTR
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement