Business of Information Technology  >   Business Management  >   Financial Management  >   Budgeting  >   IT Spending  >  

Information Security Spending

RSS Feed   
Information Security Spending Reports
 
Detecting and Defending Against SSRF
sponsored by WhiteHat Security
WEBCAST: Server-side request forgery (SSRF) attacks are a critical threat to be aware of in today’s landscape – targeting restricted information by manipulating server sent requests in order to gain access. This WhiteHat webinar provides a comprehensive overview of SSRF, how it operates, common weak points, and how to defend against it – watch now.
Posted: 25 Nov 2020 | Premiered: Nov 25, 2020

WhiteHat Security

Fast Forward IAM
sponsored by Beta Systems
PRODUCT OVERVIEW: In the era of cloud computing, every aspect of the organization – especially cybersecurity – needs to be scalable and cloud-focused. In this product overview, take a closer look at Beta System’s Fast Forward IAM, designed to protect, provision and manage access at the scale of cloud.
Posted: 05 Nov 2020 | Published: 05 Nov 2020

Beta Systems

Market Guide For Crisis/Emergency Management Solutions
sponsored by ServiceNow
RESEARCH CONTENT: The 2020 pandemic has led security and IT leaders to reevaluate their current crisis/emergency management (C/EM) programs and consider making alterations based on what they’ve learned from COVID-19. This Gartner Market Guide provides an overview of top C/EM tools, required capabilities and strategic recommendations – read on to get started.
Posted: 10 Nov 2020 | Published: 21 Aug 2020

ServiceNow

A Transformative Approach to Addressing Today’s Cybersecurity Threat Landscape
sponsored by Lumen
VIDEO: Given the severity of today’s cyberthreats and the penalties for regulatory noncompliance, business outcomes are heavily influenced (if not fully dictated) by an organization’s cybersecurity well-being. Watch this webinar to learn how to align cybersecurity with business objectives and address today’s threats.
Posted: 27 Oct 2020 | Premiered: 27 Oct 2020

Lumen

Firewall Best Practices to Block Ransomware
sponsored by Sophos
WHITE PAPER: Modern firewalls are highly effective at defending against ransomware attacks, but they need to be given the chance to do their job. In this whitepaper, discover how these attacks work, how they can be stopped, and best practices for configuring your firewall and network to give you the best protection possible.
Posted: 20 Nov 2020 | Published: 31 Aug 2020

Sophos

Application Security in the DevOps Environment
sponsored by HCL Software
RESEARCH CONTENT: Application security (AppSec) has grown in importance, especially in the DevOps environment. This report from the Ponemon Institute looks to understand the state of application vulnerabilities and testing, as well as AppSec risks, potential consequences, and best practices – read on to unlock the full report.
Posted: 12 Nov 2020 | Published: 12 Nov 2020

HCL Software

Mapping the Ransomware Landscape
sponsored by Claranet
WHITE PAPER: By 2021, ransomware is expected to have a global impact of $20 billion – these threats are growing in their severity, frequency and complexity. This guide from Claranet explores changes in the threat landscape, highlights emerging variants and offers best practices for your organization to implement – read on to get started.
Posted: 09 Nov 2020 | Published: 09 Nov 2020

Claranet

Turn a Mobile App Into a Major Win
sponsored by Onegini
CASE STUDY: For organizations in the healthcare industry, mobile applications and telemedicine are becoming the norm. Read this case study to see how VGZ, one of the largest health insurers in the Netherlands, was able to build an application that was secure, complaint and faster than their website – without sacrificing user experience.
Posted: 12 Nov 2020 | Published: 12 Nov 2020

Onegini

IAM Automation: The Secret to Governance and Cybersecurity Success in Higher Ed
sponsored by Hitachi Vantara
RESOURCE: Remote and hybrid learning models require increased remote access – underlining the importance of effective IAM security and governance. But how can schools keep up with the growing number of remote devices? Automation. Read this article to learn how to incorporate IAM automation into higher ed institutions.
Posted: 11 Nov 2020 | Published: 08 Sep 2020

Hitachi Vantara

Covid-19 Lessons Learned—Business Continuity Management
sponsored by ServiceNow
WHITE PAPER: Regardless of whether an organization had a business continuity management (BCM) program in place prior to COVID-19, 2020 has been a learning experience for the shortcomings of most BCM programs. This white paper highlights common oversights and lessons learned regarding BCM in the era of COVID-19 – read on to get started.
Posted: 11 Nov 2020 | Published: 11 Nov 2020

ServiceNow
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info