IT Management  >   Systems Operations  >   Security  >  

IT Security Management

RSS Feed   
IT Security Management Reports
 
RSA Conference 2019 Security Operations Center Findings Summary
sponsored by RSA Conference
RESOURCE: The RSA Conference SOC analyzed the Moscone Center wireless traffic which is an open network during the week of the conference. The goal of the RSAC SOC is to use technology to educate conference attendees about what happens on a typical wireless network. Download this resource to explore key findings from the educational exhibit.
Posted: 29 Jul 2019 | Published: 29 Jul 2019

RSA Conference

ICS Activity Groups and the Threat Landscape
sponsored by Dragos
WHITE PAPER: Throughout 2018, the amount of activity targeting industrial control systems (ICS) increased substantially. Also in 2018, ICS security risk grew even absent any destructive attacks. In this white paper, explore threat activity groups targeting ICS and details about their activity, methodologies, victimologies, and future concerns.
Posted: 05 Aug 2019 | Published: 05 Aug 2019

Dragos

7 Steps to Secure Your Supply Chain
sponsored by RackTop Systems
RESOURCE: Supply chain security requires a multifaceted approach to protecting the checkpoints, assets and infrastructures involved with the production of a product. In this resource, explore 7 steps to securing your supply chain.
Posted: 08 Aug 2019 | Published: 08 Aug 2019

RackTop Systems

Fortinet Private Cloud Security Solutions: Use Cases for Comprehensive Protection
sponsored by Fortinet, Inc.
WHITE PAPER: Organizations that invest in hybrid cloud infrastructures often realize significant business value, however; private clouds bring their own unique security challenges. In this white paper, explore 5 key uses cases for private cloud security and discover the benefits of Fortinet's private cloud security solution.
Posted: 13 Aug 2019 | Published: 02 Apr 2019

Fortinet, Inc.

Acalvio Deception and the NIST Cybersecurity Framework 1.1
sponsored by Acalvio
WHITE PAPER: The NIST Cybersecurity Framework 1.1 (CSF) is being widely adopted by organizations of all types as they seek to minimize risk. In this white paper, explore an overview of the CSF core controls and learn how Acalvio supports the NIST Cybersecurity Framework.
Posted: 23 Jul 2019 | Published: 30 Jun 2018

Acalvio

Adopting Productivity: How SOCs can Evolve to Advanced Fusion Centers
sponsored by Optiv
RESOURCE: In this infographic, learn how security operations centers can evolve to advance fusion centers.
Posted: 01 Aug 2019 | Published: 01 Aug 2019

Optiv

DIY or NSP? Finding the optimal approach to deploying a next-generation SD-WAN
sponsored by Windstream Communications
WHITE PAPER: In this white paper from Windstream Enterprise, discover the key considerations as organizations demand a rapid response to updating the WAN to support a modern digital business.
Posted: 22 Jul 2019 | Published: 22 Jul 2019

Windstream Communications

Privacy by Design: The Key to Unlock Your Compliance Strategy
sponsored by Immuta, Inc
WHITE PAPER: Privacy by Design (PbD), and its EU version Data Protection by Design (DPbD), aim to implement privacy controls from the outset. In this white paper, explore the beginnings of a framework for operationalizing PbD.
Posted: 06 Aug 2019 | Published: 06 Aug 2019

Immuta, Inc

Security Gets Smart with AI
sponsored by Blackberry Cylance
ANALYST REPORT: In this research report, explore key findings from a SANS survey of cybersecurity professionals who are involved with or interested in the use of AI for improving the security of their organization.
Posted: 09 Aug 2019 | Published: 31 Mar 2019

Blackberry Cylance

Closing the People, Processes and Technology Gap: How Innovation Can Strengthen Your Cybersecurity Program
sponsored by Optiv
RESOURCE: A robust security model is built on 3 pillars—people, processes and technology. Unfortunately, a failure to innovate could negatively affect your ability to excel at all 3. In this blog, explore these 3 pillars and discover 5 steps to solving the people, process and technologies equation.
Posted: 05 Aug 2019 | Published: 24 Jul 2019

Optiv
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement