IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Device Security Policies

RSS Feed   
Device Security Policies Reports
Special Report: 2019 Email Security Trends
sponsored by Barracuda
ANALYST REPORT: How can you keep your pulse on the evolving threat landscape? Download the following report, which illustrates the current state of email security and spotlights trends around security spending, malware and phishing, Office 365 security, and more.
Posted: 06 Aug 2019 | Published: 06 Aug 2019


The Simple Guide to Encryption Key Management
sponsored by Virtru
WHITE PAPER: In today's world, interactions are increasingly happening online which pose security risks when you need to share sensitive data, including encryption keys. In this white paper, learn about the different components of encryption key management, so that you know the right questions to ask when evaluating new and existing encryption technologies.
Posted: 12 Aug 2019 | Published: 12 Aug 2019


Testing Security Effectiveness with the MITRE ATT&CK™ Framework
sponsored by Cymulate
PRODUCT OVERVIEW: The MITRE ATT&CK framework has gained traction thanks to its comprehensive mapping of adversary tactics and techniques used to infiltrate a network, compromise systems and act on malicious threat actor objectives. In this solution brief, learn how Cymulate can help organizations model threat simulations with the MITRE ATT&CK Framework.
Posted: 31 Jul 2019 | Published: 31 Jul 2019


Cybersecurity Effectiveness Podcast: Mark Bagley
sponsored by Verodin
PODCAST: Cyber threat research is not all created equal – especially in the realm of security instrumentation. In this podcast, Mark Bagley, VP of Product at Verodin, highlights the core objectives of the Behavioral Research Team (BRT) and provides direction for scaling your organization's defenses with improved durability and efficiency in mind.
Posted: 28 Aug 2019 | Premiered: Aug 28, 2019


Sydney Opera House Case Study
sponsored by Blackberry Cylance
CASE STUDY: The Sydney Opera House embarked on a renewal process which included updating their endpoint security system. They were looking for a solution that could help address a number of challenges including cyberattacks and compliance. Download this case study to learn why they choose to deploy CylancePROTECT.
Posted: 09 Aug 2019 | Published: 09 Aug 2019

Blackberry Cylance

Are You Getting What You Were Promised?
sponsored by Cisco Umbrella
RESOURCE: Are you getting what you were promised? People make a lot of claim about network security but Cisco would rather show you proof. Download this infographic to learn about Cisco Umbrella including how it compares to other vendors and what Cisco customers are saying.
Posted: 30 Aug 2019 | Published: 30 Aug 2019

Cisco Umbrella

Cybersecurity Effectiveness Podcast: Raj Samani
sponsored by Verodin
PODCAST: In a security professional's career, a nearly perfect success rate can be quickly and detrimentally tarnished by one mistake that puts the company at risk. In this podcast, Raj Samani, Fellow and Chief Scientist at McAfee, shares his professional journey in security.
Posted: 29 Aug 2019 | Premiered: Aug 29, 2019


Security, Risk and Governance Breach Defense: Anatomy of a Breach
sponsored by Micro Focus
WEBCAST: The odds of experiencing a data breach are 1 in 4. And as seen from breaches including Equifax, Yahoo and Uber, the effects are costly. But how can organizations keep secure? There needs to be a plan. In this webcast, Rob MacDonald discusses how organizations can use the NIST Framework to strengthen their defenses against a breach.
Posted: 08 Aug 2019 | Premiered: Aug 8, 2019

Micro Focus

Machine Learning in Security
sponsored by Micro Focus
WEBCAST: In this webcast, Mario Daigle, VP of Product for Interset, a Micro Focus company, discusses 2 main categories of machine learning—supervised and unsupervised—and how they can be applied practically in the context of solving cybersecurity problems.
Posted: 08 Aug 2019 | Premiered: Aug 8, 2019

Micro Focus

Airline Stops Automated Attacks on Web & Mobile
sponsored by Shape Security
CASE STUDY: A top 10 global airline was facing 2 major types of attacks including credential stuffing and fare scraping. When account lockouts peaked due to these attacks, the airline knew it needed to find a solution to stop credential stuffing attacks immediately. In this case study, learn why they decided to deploy Shape Enterprise Defense.
Posted: 20 Aug 2019 | Published: 20 Aug 2019

Shape Security

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.


All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement