IT Management  >   Systems Operations  >   Security  >  

Information Security

RSS Feed   
ALSO CALLED: Infosecurity
DEFINITION: COBIT (Control Objectives for Information and Related Technology) is an international open standard that defines requirements for the control and security of sensitive data and provides a reference framework. COBIT, which provides a reference framework, was introduced in the 1990s by the IT Governance Institute. Learn more about managing compliance at SearchCompliance.com. COBIT consists of an executive  … 

Information Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Information Security Reports
1 - 25 of 381 Matches Previous Page  |  Next Page
International Criminal Court
sponsored by Micro Focus
CASE STUDY: In this Micro Focus success story, discover how a 10-man-team out of the Netherlands successfully managed, migrated, and secured over 500GB of records with the help of Micro Focus.
Posted: 06 Dec 2018 | Published: 30 Sep 2018

Micro Focus

Reduce Risk and Protect Privacy Across Enterprise Systems
sponsored by Micro Focus
PRODUCT OVERVIEW: A staggering amount of organizations are storing sensitive business data in inactive file shares, creating an increased risk of data loss. With data breaches on the rise, poorly protected data makes your business an easy target. Discover the advantages of a secure content management system. Reduce the cost and complexity of securing your data.
Posted: 06 Dec 2018 | Published: 30 Jun 2018

Micro Focus

December ezine: Tech for good
sponsored by MicroScope
EZINE: Read about why more CEOs are discussing the positives of technology and why the channel will need to do the same
Posted: 29 Nov 2018 | Published: 29 Nov 2018

MicroScope

September ezine: Thinking digital in the world of storage
sponsored by MicroScope
EZINE: The full report of the recent MicroScope storage roundtable which discusses how cloud and GDPR has changed the industry
Posted: 06 Sep 2018 | Published: 06 Sep 2018

MicroScope

Recent Ransomware Attacks Got you? Don't Cry; Fight Back!
sponsored by SearchSecurity.com
EBOOK: Recent ransomware attacks may make you WannaCry, but there's no time for that. It's time to learn what you can do to minimize the threat and how to deal if the worst happens. Start here to discover how to fight back against hackers, today.
Posted: 24 Aug 2018 | Published: 24 Aug 2018

SearchSecurity.com

Embracing Cross-Border eCommerce
sponsored by Riskified
RESOURCE: North America is lagging behind in global eCommerce growth due to the fear of fraud. This resource shares best practices for effective fraud management when operating in new territories around the world so that you don't miss the opportunity to expand your business worldwide.
Posted: 09 Aug 2018 | Published: 31 Jan 2018

Riskified

Report: Securing the Enterprise Against Cyberattacks
sponsored by Akamai Technologies
ANALYST REPORT: 71% of IT and security professionals say they struggle to prevent targeted threats from negatively impacting their enterprise. Read this full Ponemon Institute report to discover top obstacles and security practices as identified by IT and IT security professionals.
Posted: 03 Aug 2018 | Published: 30 Jun 2018

Akamai Technologies

Definitive Guide to Data Classification
sponsored by Digital Guardian
RESOURCE: In the case of your growing data, prioritization comes from data classification. In this 8 part guide, you'll learn about what classification is, why it is important and even foundational to data security.
Posted: 17 Jul 2018 | Published: 17 Jul 2018

Digital Guardian

Get Smart About Threat Intel Tools and Services
sponsored by SearchSecurity.com
EBOOK: Learn how threat intelligence tools can improve enterprise security and where they should fit into the broader security scheme.
Posted: 25 Jun 2018 | Published: 25 Jun 2018

SearchSecurity.com

The difficulties of defending against web tracking
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This article in our Royal Holloway information security series introduces you to web tracking, provides an overview of how organisations track users and discusses a few of the difficulties you may face when trying to defend against tracking.
Posted: 22 May 2018 | Published: 22 May 2018

ComputerWeekly.com

LogRhythm '2018 Cybersecurity Perceptions and Practices Benchmark Survey'
sponsored by LogRhythm, Inc.
ANALYST REPORT: Find out why security teams need to be working more intentionally to take time to understand the full scope of an incident and determine how to best neutralize it.
Posted: 27 Apr 2018 | Published: 27 Apr 2018

LogRhythm, Inc.

Securing Business Information with Box
sponsored by Box
WHITE PAPER: Discover how to centralize control over content and collaboration in a way that facilitates productivity without sacrificing security and learn about Box's content management platform.
Posted: 09 Nov 2017 | Published: 09 Nov 2017

Box

Information Lifecycle Management: Harness The Power Of Your Data
sponsored by Cintra
WHITE PAPER: Discover how to create a comprehensive information lifecycle management (ILM) strategy. Find out how to take a 4 tiered approach to categorizing and managing your data and learn about the key pillars of ILM.
Posted: 05 Oct 2017 | Published: 31 Dec 2016

Cintra

The Life-Changing Magic of Information Governance
sponsored by Box
EBOOK: Learn how to create effective information governance with 3 keys to manage even cloud-based content soundly and securely throughout its entire lifecycle.
Posted: 15 Aug 2017 | Published: 15 Aug 2017

Box

ITSM strategy for an agile, secure digital transformation
sponsored by SearchCIO.com
EBOOK: As digital transformation forces companies to rethink IT ops, balancing reliability and speed will be vital to successfully updating their ITSM strategy.
Posted: 22 May 2018 | Published: 22 May 2018

SearchCIO.com

Cyber-Risk Strategies and Models for a Post-Perimeter Age
sponsored by SearchSecurity.com
EBOOK: In our expert handbook, managing editor Brenda Horrigan and Nemertes Research president Johna Till Johnson explain how to implement a zero-trust approach to cybersecurity.
Posted: 20 Apr 2018 | Published: 20 Apr 2018

SearchSecurity.com

Shining a Light on File Sharing and Shadow IT
sponsored by Citrix
WHITE PAPER: Learn 5 reasons why a business-grade file sharing platform can help enable employees to collaborate and access information while maintaining sound data security.
Posted: 18 Apr 2018 | Published: 18 Apr 2018

Citrix

Are Security Threats Keeping You Up at Night?
sponsored by Citrix
WHITE PAPER: Discover 5 steps to secure file sharing, designed to help you maintain compliance and data security without restricting access to information.
Posted: 17 Apr 2018 | Published: 17 Apr 2018

Citrix

7 Must-Haves for Secure File Sharing
sponsored by Citrix
WHITE PAPER: This white paper explores how to select an IT-approved secure file-sharing service so that you can enable users to access and share the data they need. Discover 7 non-negotiable considerations for your file-sharing platform.
Posted: 17 Apr 2018 | Published: 17 Apr 2018

Citrix

Build your Content Security and Document Management Plan
sponsored by Adobe Inc
EGUIDE: In this expert e-guide, we explore how you can create an effective content security and document management strategy. Discover 5 tips for a sound content security policy and learn about the differences between digital signature, e-signature, and digital certificates.
Posted: 27 Feb 2018 | Published: 22 Feb 2018

Adobe Inc

5 Keys to Secure Information Management
sponsored by Hyland
WHITE PAPER: With so much confidential data passing through today's business systems, information management must stand up to a higher degree of scrutiny when it comes to data security. Download the white paper to learn the 5 keys that will help you secure information management and reduce risks to your organization.
Posted: 31 Jan 2018 | Published: 31 Dec 2017

Hyland

New Zealand Transport Agency Customer Success Story
sponsored by OpenText
VIDEO: Watch this brief video case study to find out how the NZ Transport Agency used enterprise content management as a service (ECMaaS) to improve the way they store, share, protect, and manage digital information.
Posted: 13 Oct 2017 | Premiered: 13 Oct 2017

OpenText

Hydro Tasmania Customer Success Story
sponsored by OpenText
VIDEO: Watch this brief video case study to find out how Hydro Tasmania unified scattered information and resolved content inefficiencies in their SAP, ERP, and SharePoint environments.
Posted: 13 Oct 2017 | Premiered: 13 Oct 2017

OpenText

The Life-Changing Magic of Information Governance
sponsored by Box
WHITE PAPER: Learn how to create effective information governance with 3 keys to manage even cloud-based content soundly and securely throughout its entire lifecycle.
Posted: 20 Sep 2017 | Published: 20 Sep 2017

Box

A 5 Minute Guide to Security for Cognitive Search and Knowledge Management
sponsored by Attivio, Inc.
WHITE PAPER: Examine the resurgence of knowledge management, in conjunction with cognitive search and security, as a viable option for coordinating the vast amounts of information buried in big data environments.
Posted: 13 Sep 2017 | Published: 13 Sep 2017

Attivio, Inc.
1 - 25 of 381 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement