Business of Information Technology  >   Business Management  >   Financial Management  >   Budgeting  >   IT Spending  >  

Cybersecurity Spending

RSS Feed   
Cybersecurity Spending Reports
 
CEB IT Budget Benchmark 2015 to 2016
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Corporate IT budgets are expected to grow by just 2.0% in the coming year, with budgets for 'keeping the lights on' expected to surpass capital spending for the first time since 2009, this report from CEB reveals.
Posted: 15 Dec 2015 | Published: 15 Dec 2015

ComputerWeekly.com

CIO Trends #6: Nordics
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, read how the High North and Baltic Sea collaboration is about to undergo a serious and redefining makeover to counter possible threats posed by a military-resurgent Russia. Read how pooling technologies and competencies was a focal point during summit meetings between Nordic and Baltic government leaders and defence leaders.
Posted: 15 Dec 2017 | Published: 15 Dec 2017

ComputerWeekly.com

Your expert guide to the highlights of Infosecurity Europe 2017
sponsored by ComputerWeekly.com
EGUIDE: Security technologist Bruce Schneier's insights and warnings around the regulation of IoT security and forensic cyber psychologist Mary Aiken's comments around the tensions between encryption and state security were the top highlights of the keynote presentations at Infosecurity Europe 2017 in London.
Posted: 19 Jun 2017 | Published: 19 Jun 2017

ComputerWeekly.com

Study on Cybercrime's Cost to Business
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This exclusive whitepaper covers the results of a survey that analyzed the cost of cyber-crime.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

Hewlett Packard Enterprise

How To Limit Privileged Accounts And Boost Security
sponsored by Devolutions
EGUIDE: Too many privileged accounts can result in access abuse in enterprises.This expert e-guide details which account privileges should be limited to reduce security incidents, how pervasive the risk is, and the challenges associated with privileged accounts.
Posted: 20 Mar 2017 | Published: 15 Mar 2017

Devolutions

Resolve Web Security Issues with Industry Experts' Advice
sponsored by Veracode, Inc.
EGUIDE: Learn how to bridge the communication divide between app developers and security pros, as well as foster secure coding practices in your enterprise to mitigate the vulnerabilities in your web applications.
Posted: 22 May 2017 | Published: 18 May 2017

Veracode, Inc.

Cybersecurity: The Latest Battleground for MSPs
sponsored by SkOUT
EGUIDE: Our experts share their knowledge of the managed security services market in the following guide, so read on to learn how your organization can capitalize on the opportunities therein.
Posted: 03 Jul 2019 | Published: 01 Jul 2019

SkOUT

Policy Based Encryption: Protecting your Business Against Email Risks
sponsored by Apptix
WHITE PAPER: This white paper features a cloud-based gateway service offering policy-based encryption to protect your business email exchanges.
Posted: 18 Apr 2014 | Published: 31 Dec 2013

Apptix

Real Time Endpoint Compliance for Continuous Diagnostics and Mitigation
sponsored by IBM
WHITE PAPER: Access this white paper to explore an endpoint management solution that will help federal agencies continuously monitor, manage, and detect vulnerabilities across their critical networks.
Posted: 08 Apr 2014 | Published: 31 Oct 2013

IBM

Web Security – Virtual Appliance
sponsored by Cisco Systems, Inc.
WEBCAST: Watch this webcast to see how you can best protect your Web-accessible assets with a strong protection solution that ensures security wherever your data goes.
Posted: 22 Apr 2014 | Premiered: Apr 22, 2014

Cisco Systems, Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement