IT Agents  >   IT Workforce  >   Information Technology Professionals  >   IT Managers  >  

IT Security Managers

RSS Feed   
IT Security Managers Reports
 
Cyber Resilience for Dummies
sponsored by mimecast
EBOOK: Today’s organizations are more connected than ever – IoT and cloud technologies enable massive, interconnected ecosystems. In order to ensure the security of these fragile networks, security leaders are opting for cyber resilience practices. Download your copy of Cyber Resilience for Dummies to learn more about the cyber resilience imperative.
Posted: 03 Apr 2020 | Published: 03 Apr 2020

mimecast

Ensuring Cloud Security and Compliance in the Financial Services Industry
sponsored by DivvyCloud
WHITE PAPER: In order to meet customer demands, financial service organizations are embracing mobile banking applications. However, teams should be aware of the additional security threats associated with organizational changes. Download this white paper and learn how to ensure cloud security and compliance while embracing digital transformation.
Posted: 06 Apr 2020 | Published: 06 Apr 2020

DivvyCloud

Morphisec Allows Citizens Medical Center to Focus on Saving Lives
sponsored by Morphisec, Inc.
CASE STUDY: In this case study, follow the journey of Citizens Medical Center, a hospital in Texas, as they partner with Morphisec to address the endpoint security needs of their increasingly distributed environment while overcoming challenges related to budgetary constraints and access to talent. Download now to learn more.
Posted: 18 Mar 2020 | Published: 18 Mar 2020

Morphisec, Inc.

What Is Microsoft 365 Business Premium?
sponsored by TechData - Microsoft
VIDEO: Small and medium-sized businesses account for 95% of global organizations and are the target of 43% of cyberattacks. So, how can small and medium-sized organizations ensure they’re as protected as the large companies? Watch this video to find out.
Posted: 06 Apr 2020 | Premiered: 24 Jan 2020

TechData - Microsoft

2020 Cloud Misconfigurations Report
sponsored by DivvyCloud
WHITE PAPER: Across 2018 and 2019, data breaches caused by cloud misconfiguration resulted in the exposure of over 33 billion records, which led to a loss of nearly $5 trillion. In this report, explore the underlying causes of this threat and discover best practices for avoiding a misconfiguration-related incident.
Posted: 08 Apr 2020 | Published: 08 Apr 2020

DivvyCloud

Why Critical National Infrastructure (CNI) Providers Need CNI-Ready Security
sponsored by Nominet
WHITE PAPER: In the public sector, ensuring the security and availability of critical national infrastructures (CNIs) is paramount. CNI providers maintain key functions ranging from energy to healthcare to transportation, and everything in-between. In this white paper, learn why CNI providers need CNI-ready security and discover how to address this need.
Posted: 31 Mar 2020 | Published: 31 Mar 2020


Creating a Security Culture at Your Business
sponsored by TechData - Microsoft
VIDEO: The most persistent threat to the security of an organization is its own employees. 2/3 of employees use the same password everywhere, and too few can recognize a genuine email from a phishing scam. In this video, learn how Microsoft may be able to address these challenges and help you form a security culture.
Posted: 08 Apr 2020 | Premiered: 24 Jan 2020

TechData - Microsoft

AWS Certified Security - Specialty Tips
sponsored by IO Connect Services
RESOURCE: Those who have take the exam can attest – passing the AWS Certified Security – Specialty exam is challenging. The exam requires you to be well-versed in troubleshooting as well as familiar with a myriad of security tools. The following post contains areas to focus on and expert tips for passing the exam. Continue to see the study guide now.
Posted: 18 Mar 2020 | Published: 09 Dec 2019

IO Connect Services

How Do Vulnerabilities Get into Software?
sponsored by Veracode, Inc.
WHITE PAPER: Despite the best efforts of IT security teams, vulnerabilities in applications are bound to happen. In fact, research shows that 3 out of 4 apps produced by software vendors fail to meet security standards. Download this white paper to discover the 4 most common causes that lead to software vulnerabilities and ensure your readiness.
Posted: 01 Apr 2020 | Published: 01 Apr 2020

Veracode, Inc.

Prioritizing Client-Side Website Security: Doing Nothing Is the Most Expensive Choice
sponsored by Tala Security
WHITE PAPER: When it comes to budgeting for investments in website security, the high price tags associated with acquiring additional tools or personnel makes some business leaders hesitant. In this white paper, learn how to calculate ROI by looking at the cost of breaches and discover the price of inaction.
Posted: 01 Apr 2020 | Published: 01 Apr 2020

Tala Security
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info