IT Agents  >   IT Workforce  >   Information Technology Professionals  >   IT Managers  >  

IT Security Managers

RSS Feed   
IT Security Managers Reports
 
Application Control for Dummies
sponsored by VMware International Unlimited Company
EBOOK: Application control offers a simple solution to a complex problem by flipping the security paradigm when it comes to blacklisting vs whitelisting applications. The following eBook, Application Control for Dummies, provides an overview of the history, capabilities and benefits of application control – as well as guidance for getting started.
Posted: 27 Oct 2020 | Published: 27 Oct 2020

VMware International Unlimited Company

Computer Weekly - 7 April 2020: Adapting IT to the new normal
sponsored by ComputerWeekly.com
EGUIDE: In this week's Computer Weekly, we talk to four top IT leaders to find out how they are supporting their organisations through the coronavirus crisis. We look at the security best practices recommended by experts to ensure safe remote working for staff. And the CISO of Equifax explains why the firm is moving to public cloud. Read the issue now.
Posted: 23 Oct 2020 | Published: 23 Oct 2020

ComputerWeekly.com

Securing Public Clouds: Understand the Cloud Shared Responsibility Model
sponsored by Radware
WHITE PAPER: As organizations continue to adopt cloud services, one key issue remains – each public cloud user and provider has their own unique security policies and approaches, making it difficult to achieve standard, unified security. This white paper overviews the cloud shared security model, which aims to address these challenges.
Posted: 19 Oct 2020 | Published: 19 Oct 2020

Radware

How to Approach an Identity Management & Governance Program
sponsored by Quest
WHITE PAPER: Although already widespread in use, identity and access management (IAM) programs are expected to continue to grow in popularity, especially among remote workforces. This white paper underlines the importance of a diligent IAM program and provides readers with the 5 basic tenets of an effective approach to IAM.
Posted: 26 Oct 2020 | Published: 26 Oct 2020

Quest

The Trusted Data Center and Server Infrastructure: Mid-Market Organizations
sponsored by Dell Technologies Partner Program
EBOOK: For highly competitive mid-market organizations, a data center outage can have devastating effects on the company’s reputation, legal standing and bottom line. This eBook provides best practices and strategic insights that mid-market IT leaders can use to improve the security and reliability of their IT environments.
Posted: 26 Oct 2020 | Published: 30 Nov 2019

Dell Technologies Partner Program

Emergency Preparedness: Was Your Company Ready for COVID-19?
sponsored by VMware International Unlimited Company
WHITE PAPER: Emergency preparedness is tricky – it’s nearly impossible to plan for every emergency or incident. This research report from Osterman Research provides an in-depth analysis of emergency preparedness plans pre-COVID-19 and offers best practices for improving incident readiness going forward.
Posted: 22 Oct 2020 | Published: 30 Apr 2020

VMware International Unlimited Company

What is Security's Role in Digital Transformation?
sponsored by Rackspace
RESOURCE: The past few years have seen massive upticks of digital transformations – offering businesses the ability to enhance the speed, agility and quality of their DevOps teams and lifecycles. But given the current threat landscape, it's critical to understand the role of security in digital transformations – read on to learn more.
Posted: 13 Oct 2020 | Published: 25 Feb 2020

Rackspace

New Account Fraud: Uncovering the Tools And Tactics Of A New Breed Of Scams
sponsored by Buguroo
WHITE PAPER: To enhance customer experience, banks are closing branches in favor of digital services to meet the growing demand of tech-savvy users. A big risk of this change is new account fraud, which is a cyber scam where bad actors use stolen or synthetic identities to open accounts and borrow money. Read this white paper to get a closer look.
Posted: 16 Oct 2020 | Published: 16 Oct 2020

Buguroo

Prevent Fraud and Phishing Attacks With DMARC
sponsored by Mimecast
PRODUCT OVERVIEW: The FBI estimates that between 2013 and 2018, cybercriminals stole more than $12 billion using business email compromise (BEC) attacks. To prevent BEC and phishing, organizations are turning to email authentication tools. Read this Forrester report, which analyzes the features and capabilities of Mimecast’s email authentication offering.
Posted: 21 Oct 2020 | Published: 31 Mar 2020

Mimecast

Cybersecurity in the Remote Work Era: A Global Risk Report
sponsored by Keeper Security Inc
WHITE PAPER: One of the business functions most affected by the spread of COVID-19 and the subsequent era of remote work is IT security. Read this comprehensive research report, Cybersecurity in the Remote Work Era: A Global Risk Report, for a closer look at the new risks to look out for, how security postures have changed, and other key findings.
Posted: 19 Oct 2020 | Published: 19 Oct 2020

Keeper Security Inc
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info