IT Management  >   Systems Operations  >   Security  >  

IT Security Management

RSS Feed   
IT Security Management Reports
 
A Security Engineer’s Nightmare
sponsored by Cribl.io
WHITE PAPER: For security pros, preventing breaches and ensuring data privacy is hectic enough – having an incompetent system on top of these challenges can introduce new levels of stress. Read this white paper to learn how Cribl is helping security engineers log information and incidents so they can focus their efforts on more important tasks.
Posted: 19 Nov 2020 | Published: 19 Nov 2020

Cribl.io

Understanding the Shared Security Model for Cloud Data Protection
sponsored by InteliSecure
EGUIDE: The new normal has organizations continuing to enable a largely remote workforce – leading to mass cloud migrations. Contrary to a popular misconception about cloud, these migrations could actually strengthen your security posture. Read this InteliSecure guide to find out how.
Posted: 24 Nov 2020 | Published: 24 Nov 2020

InteliSecure

Spotting a Denial-of-Service (DoS) Attack
sponsored by Farsight Security
RESOURCE: DoS attacks are an increasingly serious threat to today’s businesses, capable of rendering organizations virtually invisible online and cutting off interaction with customers. They can last for hours, days or even longer and cost organizations significant time, money and resources. View this infographic to see how to mitigate these attacks.
Posted: 24 Nov 2020 | Published: 24 Nov 2020

Farsight Security

Remote Workforce Security Report 2021
sponsored by Dtex
RESEARCH CONTENT: Securing the remote workforce has become a critical priority for organizations affected by the closing of offices and workplaces in the wake of the ongoing COVID-19 pandemic. Download this Remote Workforce Security Report to learn more about how you can protect your organization against evolving threats and during challenging times.
Posted: 24 Nov 2020 | Published: 24 Nov 2020

Dtex

Firewall Best Practices to Block Ransomware
sponsored by Sophos
WHITE PAPER: Modern firewalls are highly effective at defending against ransomware attacks, but they need to be given the chance to do their job. In this whitepaper, discover how these attacks work, how they can be stopped, and best practices for configuring your firewall and network to give you the best protection possible.
Posted: 20 Nov 2020 | Published: 31 Aug 2020

Sophos

10 Tips to Strengthen your Insider Threat Program
sponsored by Dtex
EBOOK: With the commonality of remote work creating more vulnerability than ever, strengthening threat detection has become paramount. But how do you go about putting your eggs in the right security baskets? Read this explosive e-book for 10 tips for strengthening your insider threat program.
Posted: 19 Nov 2020 | Published: 19 Nov 2020

Dtex

How to Elevate Your Threat Intelligence Program
sponsored by DomainTools
WEBCAST: According to the SANS 2020 Cyber Threat Intelligence Survey, 82% of organizations find value in threat intelligence, however, only 4% of respondents had processes in place to measure effectiveness. So, how do you demonstrate and quantify the value of your threat intelligence program? View this Forrester-sponsored webcast to learn the answer.
Posted: 25 Nov 2020 | Premiered: Nov 25, 2020

DomainTools

Reduce API Security Risks with Automated and Continuous API Scanning
sponsored by WhiteHat Security
WEBCAST: Digital businesses have widespread API usage, making it easier for organizations to share data and integrate with customer applications. However, APIs have increasingly become a target for attackers, leading to many serious data breaches in recent history. How do we reduce API security risks? View this webcast to learn why testing may be the key.
Posted: 20 Nov 2020 | Premiered: Jul 15, 2020

WhiteHat Security

How Higher Education Can Combat Hackers with IAM Automation
sponsored by Hitachi Vantara
RESOURCE: Threat actors target colleges and universities because of their vast wealth of personal information, extensive pools of research and ever-growing collections of data, and the number of attacks on these institutions is increasing – in large part due to automation. How can these attacks be defended? View this article to learn the answer.
Posted: 12 Nov 2020 | Published: 15 Oct 2020

Hitachi Vantara

IT Risk Management: Comparing Top Vendors & Offerings
sponsored by ServiceNow
RESEARCH CONTENT: Gartner predicts that by 2025, 50% of global midmarket and large enterprises will depend on risk management tools to address risks in their organizations. This Magic Quadrant report highlights and evaluates the most prominent risk management vendors and offerings in today’s market – read on to unlock the full report.
Posted: 23 Nov 2020 | Published: 11 Aug 2020

ServiceNow
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info