IT Management  >   Systems Operations  >   Security  >  

IT Security Management

RSS Feed   
IT Security Management Reports
 
Threats Using Coronavirus as a Lure
sponsored by Trend Micro
WEBCAST: As the coronavirus continues to spread, so too does the wave of cyberattacks and campaigns that leverage the pandemic as their entry point. In this webinar, join Jon Clay, Director of Global Threat Communications at Trend Micro, as he highlights current threat trends and common tactics being used by hackers.
Posted: 26 May 2020 | Premiered: May 26, 2020

Trend Micro

Your Vulnerability Management Process Isn't Working
sponsored by Vulcan
RESOURCE: When it comes to vulnerability discover and remediation, it’s easy to get caught up in the details. Every now and then it’s important for CISOs to take a step back and make sure you’re not missing the security forest for the vulnerability trees. This article focuses on three common, but costly, mistakes that IT and security leaders should avoid.
Posted: 19 May 2020 | Published: 21 Mar 2019

Vulcan

DaaS Proactive Security Management
sponsored by HP Inc
RESOURCE: Managing the security of each user device is complicated, especially at large organizations with a mix of operating systems and device types. In this blog post, take a closer look at HP’s Proactive Security Management suite, designed to help organizations monitor their endpoints and proactively address and mitigate security issues.
Posted: 29 May 2020 | Published: 29 May 2020

HP Inc

Secure Modern Applications with Diamanti
sponsored by Diamanti
RESOURCE: Ensuring the security of business applications is a fundamental aspect of being a security leader. Volume encryption and SEDs provide excellent ways to secure application data, but which one should you choose? Read this article to learn more about the Diamanti platform, which comes with both measures already built-in.
Posted: 27 May 2020 | Published: 05 May 2020

Diamanti

What is Security's Role in Digital Transformation?
sponsored by Rackspace
RESOURCE: When digital transformations first gained popularity, Gartner noticed a general lack of prioritization around security, predicting major service failures by 2020. Luckily, today, some 79% of global executives rank cyberattacks as one of their tip priorities. Read this article to learn more about the role of security in digital transformation.
Posted: 04 Jun 2020 | Published: 25 Feb 2020

Rackspace

COVID-19: Keeping Your Vulnerability Management Program on Track
sponsored by Vulcan
RESOURCE: As organizations shift towards remote working models to promote social distancing, vulnerability management programs are likely experiencing disruption. While there are significant challenges with remote work, the current situation doesn’t come without benefits for vulnerability management programs. Read this blog post to find out what they are.
Posted: 28 May 2020 | Published: 26 Mar 2020

Vulcan

2019 CrowdStrike Global Security Attitude Survey
sponsored by CrowdStrike
WHITE PAPER: Each year, CrowdStrike conducts a Global Security Attitude Survey to better understand the current state of incident detection and response. The industry ideal is set at the 1-10-60 rule: 1 minute to detect, 10 minutes to understand, and 60 minutes to contain. Read the research results and see how close organizations came to this benchmark.
Posted: 14 May 2020 | Published: 14 May 2020

CrowdStrike

10 Endpoint Security Problems and How the Cloud Solves Them
sponsored by VMware International Unlimited Company
WHITE PAPER: In today’s world of increasingly frequent and complex threats, the responsibility of protecting endpoints can no longer be left to traditional security tactics. In this whitepaper, discover why & how organizations are embracing cloud-based endpoint security platforms.
Posted: 18 May 2020 | Published: 18 May 2020

VMware International Unlimited Company

Cognitions of a Cybercriminal
sponsored by VMware International Unlimited Company
WHITE PAPER: Cybercriminals grow increasingly creative each year, finding new ways to bypass security methods without detection. This white paper is designed to help CISOs in their pursuit of cybercriminals by offering an inside look into the mindset of their behavior and breaking down their attack patterns. Access now to reserve your copy.
Posted: 15 May 2020 | Published: 31 Jul 2019

VMware International Unlimited Company

Combating Threats & Protecting Enterprise Data Across the Modern Workspace
sponsored by VMware International Unlimited Company
DATA SHEET: According to experts, attacks involving “island hopping”, which bypass security tactics with lateral movement within a network, are becoming increasingly troublesome. So, what can organizations do to counter this threat? This data sheet explores a potential answer. Read on to learn more.
Posted: 13 May 2020 | Published: 13 May 2020

VMware International Unlimited Company
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info