IT Management  >   Systems Operations  >   Security  >  

IT Security Management

RSS Feed   
IT Security Management Reports
 
Armor Anywhere: Technical Solution Brief
sponsored by Armor
RESOURCE: Learn how your organization can adopt a managed security service that fortifies and unifies your on-premise, cloud and hybrid IT security defenses to enable you to prevent, detect and respond to cyberthreats in real-time.
Posted: 28 Nov 2018 | Published: 28 Nov 2018

Armor

Managing the Risk of Post-Breach or "Resident" Attacks
sponsored by Illusive Networks
RESEARCH CONTENT: Find out what Ponemon Institute discovered about organizations' readiness for insider threats when they surveyed 627 IT and IT security practitioners in the United States about their understanding of attackers who operate internally.
Posted: 16 Nov 2018 | Published: 16 Nov 2018

Illusive Networks

Beat the Top 3 Security Challenges in Office 365
sponsored by Proofpoint, Inc.
VIDEO: Compromised accounts can be used to launch attacks or access sensitive data in the cloud. This is why organizations are taking security measures to defend your cloud collaboration tools against cybercriminals, especially in Office 365 applications. Download this webcast to learn how you can overcome these security challenges, today.
Posted: 31 Oct 2018 | Premiered: 29 Oct 2018

Proofpoint, Inc.

The Financial Services Industry is Under Attack
sponsored by Nominet
RESOURCE: This resource brings into focus the dangers that cyberthreats pose for the financial services industry. Read on for more about the threat landscape.
Posted: 12 Nov 2018 | Published: 12 Nov 2018


The Threat Intelligence Handbook: A Practical Guide for Security Teams to Unlocking the Power of Intelligence
sponsored by Recorded Future
EBOOK: It's easy to find descriptions of what threat intelligence is. But it's harder to learn how to use it to truly make your organization safe from cybercriminals. Continue reading to learn how threat intelligence can help everyone in cybersecurity anticipate problems, respond faster to attacks, and make better decisions on how to reduce risk.
Posted: 14 Nov 2018 | Published: 14 Nov 2018

Recorded Future

Managing Fraud Risk in the Digital Age
sponsored by SAS
WHITE PAPER: Learn how to detect, prevent and manage fraud in real time – from a single platform and uncover 4 steps your organization can take to fight fraud.
Posted: 02 Nov 2018 | Published: 02 Nov 2018

SAS

Beginner's Guide to AWS Security Monitoring
sponsored by AlienVault
RESOURCE: Download this guide to bolster your approach to AWS security monitoring and learn the biggest 3 concerns in cloud security.
Posted: 01 Nov 2018 | Published: 01 Nov 2018

AlienVault

Infographic: 6 emerging trends in security
sponsored by ComputerWeekly.com
EGUIDE: In this infographic, we outline 6 emerging trends in security that cybersecurity pros - and their employers - need to prep for in the next year. These ideas are taken from a keynote by analyst Peter Firstbrook at Gartner Symposium 2018.
Posted: 15 Nov 2018 | Published: 15 Nov 2018

ComputerWeekly.com

Detecting and Preventing Banking Application Fraud
sponsored by SAS
RESOURCE: Preventing application fraud starts with validating the identity of an individual using a digital device. Are they really who they say they are? Download this white paper for analytics-driven methods for validating financial services applications and spotting trouble at all three stages of bust-out fraud schemes.
Posted: 01 Nov 2018 | Published: 01 Nov 2018

SAS

Ensure your Data is Protected Without Impacting User Productivity
sponsored by Druva Software
RESOURCE: Download this resource for an overview of an integrated data protection and governance system designed for today's mobile enterprise.
Posted: 12 Nov 2018 | Published: 12 Nov 2018

Druva Software
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement