IT Agents  >   IT Workforce  >   Executive Management  >  

Information Security Officers

RSS Feed   
Information Security Officers Reports
 
CISO’s Guide to DevOps: Learning to Cooperate with DevOps
sponsored by ShieldX
WHITE PAPER: Today’s CISOs are under pressure to establish data security protocols while enabling an agile development environment. The following guide is a checklist designed to help CISOs with the issue of incorporating security into DevOps. Read on for tips and tricks on improving how you work with DevOps.
Posted: 27 Jan 2020 | Published: 31 Oct 2018

ShieldX

A CISO’s Guide to Hybrid Cloud Security
sponsored by vArmour
WHITE PAPER: Today’s organizations are adopting cloud at an unprecedented rate to bolster their business operations. As a result, CISOs & their security teams struggle to keep pace with providing data protection and compliance. Download this guide to discover how to achieve continuous security and compliance across hybrid cloud environments.
Posted: 29 Jan 2020 | Published: 29 Jan 2020


A CISO’s Guide to Micro-Segmentation
sponsored by ShieldX
WHITE PAPER: Micro-segmentation is growing increasingly popular amongst organizations that operate within multi-cloud environments. It focuses on the workload-level, and only allows permissions based on what the specific task requires. Download this guide for a comprehensive checklist that can help take the pain out of micro-segmentation adoption.
Posted: 23 Jan 2020 | Published: 31 Oct 2018

ShieldX

Research Highlights: Security Operations Transformation
sponsored by ServiceNow
ANALYST REPORT: Security operations remain inefficient and ineffective, and staffing and skills shortages are a reality that must be addressed. This is based on a recent survey of 372 IT and cybersecurity professionals in North America. This ESG research report is jam-packed with insights about the complex challenges of security operations.
Posted: 06 Mar 2020 | Published: 31 Dec 2019

ServiceNow

Information Security Magazine, January 2009: Look Who's Coming to Dinner--the Security Steering Committee
sponsored by Information Security Magazine
EZINE: This special issue of Information Security Magazine explains the ins and outs of security steering committees. Learn who needs to be there, why they need to be there, what they need to be doing, and how to help them do it.
Posted: 07 May 2009 | Published: 01 Jan 2009

Information Security Magazine

How Secure is your sudo? - The Good, the Bad, and the Ugly of Privileged Identity Management (PIM)
sponsored by BeyondTrust Corporation
WHITE PAPER: This white paper will illustrate certain positive situations where open source solutions like sudo often work in smaller scale enterprises. However, this white paper will also spotlight red flags that relate to larger companies or companies experiencing significant IT growth. Read this paper to learn more.
Posted: 21 May 2010 | Published: 20 May 2010

BeyondTrust Corporation

Information Security Magazine - April 2013
sponsored by SearchSecurity.com
EZINE: This month's issue takes a comprehensive look at existing identity and access management (IAM) solutions and explores how establishing a centralized IAM system not only combats the challenges SaaS and mobile devices, but provides better overall operational consistency across your entire infrastructure.
Posted: 03 Apr 2013 | Published: 03 Apr 2013

SearchSecurity.com

Cybersecurity Threats: Managing Enterprise Risk and Ensuring Regulatory Compliance
sponsored by Silver Tail Systems
EGUIDE: This e-guide discusses the NERC compliance security threats, better cybersecurity through risk management, and what enterprise security administrators can do to defend themselves against such attacks.
Posted: 22 Feb 2011 | Published: 22 Feb 2011

Silver Tail Systems

Cloud Security: Enterprise Point of View
sponsored by Dimension Data
VIRTUAL SEMINAR: Access this webcast today to listen as Darren O'Loughlin, CSO for Dimension Data's global business enabling IT as a Service, shares strategic objectives for securing applications and workloads on an enterprise-class cloud.
Posted: 29 Jan 2015 | Premiered: 26 Nov 2014

Dimension Data

Mind the Gap: CISOs Work to Narrow the Breach-to-Detection Gap for Better Security
sponsored by Tripwire, Inc.
WHITE PAPER: Compliance is indeed a conscientious effort toward securing corpo­rate assets. IT organizations have committed much time and money to the cause. Despite security breaches still happening many still fly under the radar. This paper outlines what precautions need to be taken to avoid future security breaches.
Posted: 08 Feb 2011 | Published: 08 Feb 2011

Tripwire, Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info