IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Information Security Policies

RSS Feed   
Information Security Policies Reports
 
How a Leading Hearing Aid Provider Enhances its Security Strategy
sponsored by Forcepoint
CASE STUDY: Discover how AudioNova, one of the largest providers of hearing aids in Europe with over 1,200 stores in 13 countries, was able to overcome its biggest security challenge, security management consolidation, with a highly scalable and flexible cloud solution.
Posted: 05 Sep 2018 | Published: 31 Dec 2017

Forcepoint

Cyber security in the Nordics
sponsored by ComputerWeekly.com
EGUIDE: With the digitisation of life and work comes the 24-hour threat of cyber attacks. The Nordic region's pioneering spirit in the digital arena could easily turn heads, some of which may have malicious intent.
Posted: 31 Jul 2017 | Published: 31 Jul 2017

ComputerWeekly.com

State of the Channel Ransomware Report: Canadian Edition
sponsored by Datto, Inc.
EBOOK: More than 200 Canadian MSPs share their ransomware hardships and triumphs, with specifics on how ransomware is targeting customers—in particular, SMBs—and recommendations for recovery and business continuity. Read on for a unique look into the state of ransomware.
Posted: 07 Dec 2018 | Published: 31 Dec 2017

Datto, Inc.

Data protection: A business imperative
sponsored by IBM
EGUIDE: In this e-guide: While many organisations are focusing on the huge fines for non-compliance and the significant financial and reputational costs of data breaches, it is the fact that good data protection and privacy practices builds consumer trust and enables the innovative use of data that should be driving organisations to act.
Posted: 03 Aug 2018 | Published: 03 Aug 2018

IBM

Primer for Protection Against Cyberattacks: Business Email Compromise
sponsored by TrendMicro
WHITE PAPER: In this primer, learn how business email compromise (BEC) attacks make inroads to businesses of all sizes. Then explore some strategies on how you can avoid becoming a victim of this scam.
Posted: 30 Nov 2017 | Published: 30 Nov 2017

TrendMicro

Internet Security Threat Report
sponsored by Symantec
WHITE PAPER: In this comprehensive guide, review some of the major security attacks and vulnerabilities from 2016, and learn how it can inform your policy moving into the future.
Posted: 08 Aug 2017 | Published: 28 Apr 2017

Symantec

Protecting Microservices and APIs with ABAC, OAuth and OpenID Connect
sponsored by Axiomatics
WHITE PAPER: This resource outlines a set of examples where security standards work together in addressing requirements that are difficult or impossible to meet by using OAuth or OIDC alone. Find out how your organization can combine security capabilities to separate privacy concerns and more.
Posted: 17 Jun 2018 | Published: 15 Jun 2018

Axiomatics

GDPR 101: Key Information MSPs Should Know
sponsored by Solarwinds MSP
EBOOK: In this e-book, learn 10 invaluable tips for how to manage and prepare for the GDPR that apply directly to MSPs.
Posted: 23 May 2018 | Published: 31 Dec 2017

Solarwinds MSP

Adapt Security for Hybrid Cloud Environments
sponsored by Citrix
EGUIDE: In this expert e-guide, find out how you can overcome the security challenges of hybrid cloud, and learn about the organizational and cultural changes that accompany this shift in security.
Posted: 23 May 2018 | Published: 18 May 2018

Citrix

The Five Essential Capabilities Of An Analytics-Driven SOC
sponsored by Splunk
WHITE PAPER: This white paper outlines how you can gain visibility into potential vulnerabilities by adopting an analytics-driven SOC. Read on to find 5 capabilities that are "must-haves" in this type of system.
Posted: 02 Mar 2018 | Published: 02 Mar 2018

Splunk
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement