IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Information Security Policies

RSS Feed   
Information Security Policies Reports
 
Spear Phishing: Top Threats and Trends Vol. 5
sponsored by Barracuda
RESEARCH CONTENT: As their speedy exploitation of fears around the COVID-19 pandemic show, cybercriminals adapt quickly to current events and new tactics. This in-depth report takes a look at the evolving trends in spear-phishing and the new ways attackers are tricking their victims – read on unlock this exclusive insight.
Posted: 29 Dec 2020 | Published: 29 Dec 2020

Barracuda

Computer Weekly - 23 March 2021: Would the UK really nuke a cyber attacker?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, did the UK's defence and security review really suggest a nuclear response to a cyber attack? Data visualisation has been widely used to explain the Covid-19 pandemic, but not always that effectively. And jewellery retailer Pandora explains how it kept the personal touch as customers went online. Read the issue now.
Posted: 22 Mar 2021 | Published: 23 Mar 2021

ComputerWeekly.com

Security Think Tank: Critical National Infrastructure
sponsored by ComputerWeekly.com
EGUIDE: We asked our regular panel of cyber experts, the Computer Weekly Security Think Tank, to consider and highlight the risks posed to industrial control systems (ICS) and other elements of operational technology (OT), and advise on what steps CNI operators should be taking to address them.
Posted: 27 Apr 2021 | Published: 27 Apr 2021

ComputerWeekly.com

Axis Security Video
sponsored by Axis Security
VIDEO: VPNs, despite their long-standing rate of success in securing corporate networks, do not hold up in a remote world. In particular, offering third parties remote VPN access presents a major risk to your network. Watch this video by Axis Security to see how you can deliver secure access to third parties without their ever touching your network.
Posted: 11 Jan 2021 | Premiered: 09 Sep 2020

Axis Security

SIEM, SOAR or both? Our security experts weigh in
sponsored by ComputerWeekly.com
EGUIDE: In this E-Guide we turn to the Computer Weekly Security Think Tank, a hand-picked panel of cyber security insiders, experts, analysts, and advocates with over a century's worth of collective experience between them, to explore the topic of Security Information and Event Management (SIEM), and Security Orchestration, Automation and Response, (SOAR).
Posted: 06 Aug 2021 | Published: 06 Aug 2021

ComputerWeekly.com

7 Experts on Transitioning to MDR
sponsored by GoSecure
EBOOK: Managed detection and response (MDR) can help you quickly identify and mitigate cyberattacks. But it’s not always clear when a company should move to MDR, nor is it clear how to get the greatest value from an MDR service. In this e-book, hear from 7 security experts as they offer advice to organizations considering MDR.
Posted: 02 Mar 2021 | Published: 02 Mar 2021

GoSecure

FortiSOAR Empowers Security Operations to Accelerate Incident Response
sponsored by Fortinet, Inc.
WHITE PAPER: As enterprises build out their security operations centers (SOCs), they’re finding that their current security installs are more disparate than they thought, tasking them with increasing visibility. But security skills are in short supply. Download this white paper to learn how SOAR can empower your SOC and accelerate incident response.
Posted: 19 Mar 2021 | Published: 12 May 2020

Fortinet, Inc.

Simplify Cloud Compliance For Banking & Financial Services
sponsored by WinMagic
CASE STUDY: Banks and financial services institutions are embracing cloud computing – but as industry-specific compliance grows increasingly complex, it becomes critical to ensure they meet data privacy and cloud compliance needs. Read this use case to learn how WinMagic is helping banks address cloud risks and compliance gaps.
Posted: 29 Dec 2020 | Published: 29 Dec 2020

WinMagic

Royal Holloway: The Computer Misuse Act and the characteristics of convicted hackers
sponsored by ComputerWeekly.com
RESEARCH CONTENT: In this Royal Holloway article, the authors go beyond the perpetuated stereotypes often found in media surrounding hackers by analysing the characteristics of real-life convicted hackers in the UK, who were charged under the Computer Misuse Act
Posted: 01 Apr 2021 | Published: 07 Apr 2021

ComputerWeekly.com

Internal Firewalls for dummies
sponsored by VMware
EBOOK: Although some operating systems are more secure than others, most used today were not designed for security from the ground up, leaving many holes in IT infrastructure as a result. Security teams need to think about compartmentalizing their network to limit damage from intrusions. Leverage this e-book to see how internal firewalls can help.
Posted: 02 Mar 2021 | Published: 02 Mar 2021

VMware
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences