Standards  >  

Information Security Standards

RSS Feed   
Information Security Standards Reports
 
Sports-Centric Streaming Service fuboTV Sees 50% ROI - Just from Auth0's Security
sponsored by Auth0
CASE STUDY: Read this case study to find out how fuboTV partnered with Auth0 in order to improve and scale their authentication and authorization workflows.
Posted: 28 Nov 2018 | Published: 28 Nov 2018

Auth0

Inadequate Penetration Testing Puts Sensitive Data in the Crosshairs
sponsored by InteliSecure
WHITE PAPER: In this white paper, find out why some organizations see penetration testing as a box to check in order to meet compliance requirements and why they must dispel this myth if they want value from the testing.
Posted: 02 Jul 2018 | Published: 02 Jul 2018

InteliSecure

Combatting Botnet Traffic with Behavioral Analysis
sponsored by ThreatX
RESOURCE: Find out how to detect and block a number of different distributed attacks with a robust security approach that's designed to grant you visibility into malicious traffic.
Posted: 29 Aug 2018 | Published: 28 Jun 2018

ThreatX

Secure your Office 365 Environment
sponsored by Forcepoint
EBOOK: Many organizations have yet to fully migrate their users and apps over to a cloud-based Office 365 environment – largely due to security, compliance, and performance concerns. Discover 4 keys for building your Microsoft Office 365 security and performance strategy that will help you overcome these concerns.
Posted: 24 Oct 2018 | Published: 24 Oct 2018

Forcepoint

Your Guide to Integrated Risk Management Vendors
sponsored by ServiceNow
RESEARCH CONTENT: In this Gartner Magic Quadrant report for security and risk management leaders, get a breakdown of the current field of integrated risk management tools and find out which platforms offer the capabilities you need to secure your enterprise and improve compliance.
Posted: 30 Jul 2018 | Published: 16 Jul 2018

ServiceNow

Tightly Coupling Applications and Security for Infinite Scale
sponsored by ThreatX
RESOURCE: Find out how to modernize security so it can keep up with the demands of microservices and container-based app development.
Posted: 29 Aug 2018 | Published: 20 Aug 2018

ThreatX

Remove the Guesswork from Securing your Business
sponsored by CompuCom Systems, Inc.
WHITE PAPER: Discover a security best practices questionnaire and a cybersecurity protection checklist to see how your business's defensive strategies measure up against modern threats.
Posted: 16 Nov 2018 | Published: 16 Nov 2018

CompuCom Systems, Inc.

Email Security that Matters at the Macro-Security Level
sponsored by GreenPages Inc.
WHITE PAPER: Find out how digital transformation is expanding attack surfaces and learn how to defend against the email threats that traditional security approaches have failed to keep up with.
Posted: 12 Jul 2018 | Published: 12 Jul 2018

GreenPages Inc.

How to Simplify Security and Shrink the Attack Surface
sponsored by VMware
WHITE PAPER: Modern applications are dynamic and distributed – and the attack surface keeps growing as a result. To secure your business, you need security integrated into your infrastructure, not bolted-on. Download the e-book to learn how to reduce the attack surface and simplify security.
Posted: 29 Oct 2018 | Published: 31 Aug 2018

VMware

Fighting Fraud with Intelligent Access Management
sponsored by IBM
WHITE PAPER: Find out how you can become a leader in the fight against fraud with intelligent access management and authorization, designed for holistic fraud prevention.
Posted: 24 Jul 2018 | Published: 31 Jul 2016

IBM
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement