Standards  >  

Information Security Standards

RSS Feed   
Information Security Standards Reports
 
5 steps to secure the enterprise and be fit for a flexible future
sponsored by Avanade
WHITE PAPER: From drastic shifts in remote capabilities to exacerbated security risks, COVID-19 has completely changed the cybersecurity landscape. The most effective way to approach securing your enterprise in the ‘new normal’ is to rethink cybersecurity strategies and challenges. Download this Avanade strategy guide to help guide your restructuring.
Posted: 17 Jul 2020 | Published: 17 Jul 2020

Avanade

University Hospital Gets the Most Out of Mobility with Total Access Control
sponsored by PortSys
CASE STUDY: For Milton Keynes University Hospital (MKUH), enabling and securing access for every device, regardless of location, became critical as they looked to modernize their operations. In this case study, discover why MKUH decided to partner with PortSys and implement a zero-trust approach to access management in the form of Total Access Control.
Posted: 05 Aug 2020 | Published: 05 Aug 2020

PortSys

The FedRAMP Journey
sponsored by AWS - Anitian
PRODUCT OVERVIEW: The Federal Risk and Authorization Management Program (FedRAMP) is traditionally a complex process requiring time and resources. The following solution brief takes a closer look at the Anitian Compliance Automation Platform, designed to reduce the costs and complexity when it comes to FedRAMP readiness.
Posted: 13 Aug 2020 | Published: 13 Aug 2020


Incorporate Information Protection into Microsoft Teams from the Start
sponsored by Nucleus Cyber
RESOURCE: Microsoft Teams’ user base has nearly doubled over the past few months. However, new users face the risk of misconfiguration during initial setup, which can lead to data exposure and even theft. This article highlights 3 key practices new Microsoft Teams users should implement in order to avoid these risks.
Posted: 06 Aug 2020 | Published: 28 May 2020

Nucleus Cyber

Privileged Access Management Policy Template
sponsored by Thycotic
WHITE PAPER: In order to protect privileged accounts against misuse, organizations are establishing privileged access management (PAM) policies. The following guide highlights a 10-step process for customizing a PAM policy template, designed to help your team build a policy based around your unique security and compliance requirements.
Posted: 28 Jul 2020 | Published: 28 Jul 2020

Thycotic

The Evolution of Automation: Unite People and Opportunity for Growth
sponsored by Red Hat
VIDEO: To ensure the productivity and security needs of today’s organizations are being met, IT leaders are embracing the benefits of automation for unifying their people and processes. Watch this webinar for an in-depth look at the Red Hat Ansible automation platform – its key features, capabilities and success stories.
Posted: 24 Jul 2020 | Premiered: 05 Jun 2020

Red Hat

Cyberthreat Hunting Guide
sponsored by Bitdefender
RESOURCE: Threat hunting is the proactive search for cyber threats within a network, including those that have already slipped past endpoint security defenses. In today’s security zeitgeist, it is more commonplace to use AI and machine learning to hunt threats as it can keep networks ahead of the curve. Read this guide to learn more.
Posted: 29 Jul 2020 | Published: 29 Jul 2020

Bitdefender

Managed Detection and Response (MDR) Buyer’s Guide
sponsored by CrowdStrike
WHITE PAPER: By 2024, Gartner predicts that 25% of organizations will be using MDR services. But what exactly is MDR, and why does Gartner predict the rise in popularity? Download this MDR buyer’s guide to learn more about MDR, including core elements and how to navigate the vetting process.
Posted: 13 Aug 2020 | Published: 13 Aug 2020

CrowdStrike

Cloud is the dream, don’t let risk and compliance be your nightmare
sponsored by Xtravirt
WHITE PAPER: Organizations worldwide are adopting cloud capabilities at an unprecedented rate in order to ensure flexibility and scalability in uncertain times. However, effective cloud environments require cloud-ready compliance and risk considerations. Download this white paper to evaluate and gauge your organization’s cloud security readiness.
Posted: 11 Aug 2020 | Published: 11 Aug 2020

Xtravirt

MITRE ATT&CK: The Power of Prevention
sponsored by BlackBerry
VIDEO: In this brief webinar, join industry experts as they provide insight into optimizing the MITRE ATT&CK framework using artificial intelligence and machine learning – providing an overview of the framework and why it’s important, as well as the role of AI for enhance threat detection and prevention.
Posted: 21 Jul 2020 | Premiered: 21 Jul 2020

BlackBerry
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info