IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Information Security Policies

RSS Feed   
Information Security Policies Reports
 
Ransomware Galore: The Four You Shouldn't Ignore
sponsored by Cisco Umbrella
WHITE PAPER: Ransomware is a growing issue that isn't going away anytime soon. Most organizations have already renewed their focus on data backup and recovery. But beyond that, do you know what your top defensive priorities should be? In this white paper, explore 4 things your organization must do to defend against ransomware.
Posted: 02 May 2019 | Published: 02 May 2019

Cisco Umbrella

Telstra Security Report 2019
sponsored by Telstra
RESEARCH CONTENT: As our lives become more connected, cybersecurity has emerged as a top-of-mind issue for business leaders and governments. With cybercrime increasing, many organizations are experiencing breaches. Download the Telstra Security Report 2019 to learn more about the current security landscape and explore how security professionals are managing risk.
Posted: 17 Apr 2019 | Published: 17 Apr 2019

Telstra

How to Automate an API Security Program
sponsored by Data Theorem
WEBCAST: Join Doug Dooley, COO at Data Theorem, as he discusses the need to automate API security. As modern companies grow, they expose their data to an increasing number of outside applications. It's critical that DevOps and Security teams are aligned on how to scale their API connections while automating the protection of their data.
Posted: 10 Jun 2019 | Premiered: Jun 10, 2019

Data Theorem

SOAR Platforms: Everything You Need to Know About Security Orchestration, Automation, and Response
sponsored by ThreatConnect
WHITE PAPER: The increase of data and alerts means that quick decision-making and execution needs to find a way to scale. To counter this, many have turned to new technologies designed to automate and orchestrate some aspects of their cybersecurity operations. In this white paper, explore everything you need to know about SOAR.
Posted: 30 Apr 2019 | Published: 30 Apr 2019

ThreatConnect

Podcast: Privileged Account Governance and Incident Response
sponsored by One Identity
PODCAST: A lot of organizations believe they have the right policies in place to minimize their risks. But, that is rarely the case especially when it comes to privileged accounts. In this podcast, listen as Kevin Beaver and Richard Hosgood discuss privileged account management and how One Identity Safeguard can help organizations address incident response.
Posted: 13 Jun 2019 | Premiered: Jun 13, 2019

One Identity

Privileged Account Governance and Incident Response
sponsored by One Identity
RESOURCE: A lot of organizations believe they have the right policies in place to minimize their risks. But, that is rarely the case especially when it comes to privileged accounts. In this video transcript, Kevin Beaver and Richard Hosgood discuss privileged account management and how One Identity Safeguard can help organizations address incident response.
Posted: 24 Jun 2019 | Published: 24 Jun 2019

One Identity

Employees Behaving Badly? Why Awareness Training Matters
sponsored by Mimecast
WHITE PAPER: Making awareness training part of your cyber-resilience planning is essential to keeping your organization secure. In general, employees are not doing bad things on purpose, but their actions can greatly impact the security of your organization and data. In this white paper, discover 6 ways to make security awareness a part of your culture.
Posted: 18 Apr 2019 | Published: 17 Oct 2018

Mimecast

Smarter Data Protection with Machine Learning
sponsored by TITUS
WHITE PAPER: Protecting sensitive data is critical, but it can be difficult to achieve without first enhancing how data is kept. Many organizations struggle to accurately identify complex data as it moves throughout workflows. In this white paper, learn how machine learning offers a way for organizations to better protect their sensitive data.
Posted: 20 May 2019 | Published: 30 Nov 2018

TITUS

5 Principles of Effective IT Security
sponsored by VMware
WHITE PAPER: Keeping data, applications, and devices secure has always been a top priority for IT security professionals. In order to do this, IT security teams should focus on reducing their attack surface to make their applications less vulnerable to attacks. In this white paper, explore 5 core principles to an effective application security strategy.
Posted: 17 Jun 2019 | Published: 30 Apr 2019

VMware

The Present and Future of Security Operations
sponsored by Splunk
WHITE PAPER: In this white paper, learn about several technologies, processes, and philosophical trends that may help CISOs overcome today's security operations challenges and develop a well-organized and operative future-oriented strategy.
Posted: 20 May 2019 | Published: 31 Mar 2019

Splunk
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement