Standards  >  

Information Security Standards

RSS Feed   
Information Security Standards Reports
 
What is Okta Access Gateway
sponsored by Okta
VIDEO: Securely connecting users to applications isn’t a new problem. Historically, organizations opted for on-premise single sign-on (SSO) tools to address this. However, SSO tools are unable to meet the security and scalability needs of today’s hybrid IT environments. Watch this video to see how Okta addresses this need.
Posted: 09 Oct 2020 | Premiered: 09 Oct 2020

Okta

Driving Real Behaviour Change
sponsored by Proofpoint
EBOOK: There are key factors that determine the success or failure of any security awareness program: timing, engagement, and knowledge of the role of data all contribute to a metrics-based plan for security awareness in an organization. But how do you get started? Dive into this detailed e-book to learn how to begin to drive changes in behavior.
Posted: 16 Oct 2020 | Published: 30 Jun 2020

Proofpoint

Benefits of Migrating from Web Access Management (WAM)
sponsored by Okta
PRODUCT OVERVIEW: For organizations favoring hybrid IT environments, web access management (WAM) tools have historically offered effective security. However, as these organizations grew, WAM began to show signs of cracking. Read this white paper to learn more about the disadvantages of WAM and how to secure hybrid IT environments.
Posted: 08 Oct 2020 | Published: 08 Oct 2020

Okta

How Okta's Cloud First IT Strategy Enables a Dynamic Work Environment
sponsored by Okta
VIDEO: Back in 2009, 30% of organizations were using some sort of cloud computing. Since then, it has erupted into one of the most important aspects of an organization’s work environment. Watch this webinar to discover how cloud has changed and the role it plays in enabling today’s dynamic workforce.
Posted: 28 Sep 2020 | Premiered: 28 Sep 2020

Okta

Responding to Public Sector Cybersecurity Threats: Views of Public Sector Professionals and Where-to From Here
sponsored by BlackBerry
WHITE PAPER: If you’re working in the public sector in Australia, look at this in-depth report about the state of cybersecurity on the continent, presented by Blackberry. It details key findings, presents critical themes for a rock-solid cybersecurity strategy and outlines the ‘Essential Eight’ Maturity Model for security technology.
Posted: 16 Oct 2020 | Published: 16 Oct 2020

BlackBerry

What is Operational Resilience?
sponsored by LogicGate
RESOURCE: According to Gartner, operational resilience is a set of techniques that allows people, processes and information systems to adapt to changing patterns. How do businesses not just prepare but succeed when faced with the unexpected? Read this quick article to get an understanding of how organizations comprehend their respective risk.
Posted: 02 Oct 2020 | Published: 17 Sep 2020

LogicGate

Webroot Threat Report
sponsored by ColorTokens
WHITE PAPER: Each year, Webroot releases a threat report highlighting a look back at trending threats, successful security tactics, and more. Download this year’s report for a closer look into: malware, ransomware, phishing, high-risk URLs, malicious IP addresses, security awareness training & more.
Posted: 07 Oct 2020 | Published: 07 Oct 2020

ColorTokens

Behavioral Solution for Online Fraud Prevention
sponsored by Buguroo
WHITE PAPER: Buguroo was recently announced as winners of the 2020 Frost & Sullivan Best Practices Award for their innovative behavioral biometrics solution – which looks to help organizations in the banking and financial services industry detect and prevent fraud. Read this report to learn more about Buguroo’s award-winning offering.
Posted: 14 Oct 2020 | Published: 14 Oct 2020

Buguroo

AI, CWPPs & DevSecOps: The Future of Cybersecurity
sponsored by Rezilion
EGUIDE: Artificial intelligence, DevSecOps and cloud security have all emerged as transformative technologies within the cybersecurity industry. This e-guide explores each of these areas by providing 3 expert articles. Read on to unlock your copy.
Posted: 25 Sep 2020 | Published: 01 Sep 2020

Rezilion

The Business Executive’s Guide to Cybersecurity
sponsored by Dell SecureWorks
WHITE PAPER: The days of cybersecurity being a siloed business function is no longer appropriate when considering the financial, reputational and legal implications of today’s cyberthreats. This white paper provides a guide for communication and collaboration between technical and non-technical business leaders – read on to learn more.
Posted: 01 Oct 2020 | Published: 01 Oct 2020

Dell SecureWorks
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info