IT Management  >   Systems Operations  >   Security  >  

Information Security

RSS Feed   
ALSO CALLED: Infosecurity
DEFINITION: COBIT (Control Objectives for Information and Related Technology) is an international open standard that defines requirements for the control and security of sensitive data and provides a reference framework. COBIT, which provides a reference framework, was introduced in the 1990s by the IT Governance Institute. Learn more about managing compliance at SearchCompliance.com. COBIT consists of an executive  … 

Information Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Information Security Reports
1 - 25 of 299 Matches Previous Page  |  Next Page
How to Level Up Your Vendor Management
sponsored by Aptible
WHITE PAPER: Every company needs vendors, yet vendors increase your vulnerability to security threats. Many of the largest data breaches in the past decade or so have happened because of vulnerabilities from 3rd party vendors. Therefore, you must establish robust processes on both sides of vendor management. View this guide to learn more.
Posted: 17 Nov 2020 | Published: 17 Nov 2020

Aptible

Automate Data Security
sponsored by Red Hat
WHITE PAPER: Financial services firms must comply with a range of increasingly strict security and privacy standards. However, using joint solutions can take a DevSecComplianceOps approach to automate application building, testing, and deployment. View this white paper to learn more.
Posted: 11 Nov 2020 | Published: 11 Nov 2020

Red Hat

Webinar 7 - Is EDR sustainable? Is SIEM still significant? Introducing the Cybersecurity X-Factor
sponsored by McAfee
WEBCAST: You've heard the hype. You've probably even heard a vendor pitch or two. But what does Extended Detection & Response (XDR) really mean to the average enterprise? In this webinar, learn the facts and fiction of today's XDR landscape. Understand why some vendors will be able to deliver on the promise of XDR while others won’t.
Posted: 11 Nov 2020 | Premiered: Nov 11, 2020

McAfee

Identity Cloud for Regulated Industries
sponsored by Onegini
WHITE PAPER: As companies in regulated industries move their businesses online, they must secure all digital identity as well as identify and authenticate users. Read this brochure to learn how Onegini Identity Cloud can help to simplify the registration, identification, authentication and lifecycle management of your customers, agents and brokers.
Posted: 11 Nov 2020 | Published: 11 Nov 2020

Onegini

Attacking and Defending a Distributed Workforce
sponsored by ServiceNow
WHITE PAPER: The shift to a distributed, remote workforce has exposed businesses to new attack vectors, including confidentiality threats, remote business process threats and availability threats, all of which alter company risk profiles. What does this mean for network professionals and risk management? Read this white paper to get the answer.
Posted: 11 Nov 2020 | Published: 11 Nov 2020

ServiceNow

Secure: Now 2020 - Are Your Cyber Defenses Fully-Geared for the Digital Era?
sponsored by Lumen
WEBCAST: Bad actors and threats are evolving faster than organizations can react, and although security & risk management (SRM) leaders know they need to continually evolve upgrade their cyber defenses, businesses still fall victim to cybercrimes. Watch this webinar by Lumen subject matter experts to learn why you may need to do more for cybersecurity.
Posted: 28 Oct 2020 | Premiered: Sep 10, 2020

Lumen

Risk Management Best Practices for Privileged Access Management (PAM)
sponsored by Quest
WHITE PAPER: Applying risk management best practices to privileged access management (PAM) can provide a solid framework for threat awareness, and it can help organizations organically meet the rising number of compliance requirements. Read this white paper to learn 8 best practices for applying risk management to PAM.
Posted: 28 Oct 2020 | Published: 28 Oct 2020

Quest

Hitachi ID Bravura Discover
sponsored by Hitachi ID
DATA SHEET: In the age of ransomware attack, your organization needs to proactively control identity and privileged access security, and it needs risk insight while maintaining scalability. View this Hitatchi ID Bravura Discover data sheet to learn about an approach to IAM and PAM that strives to identify hidden risks and scale with growing threats.
Posted: 27 Oct 2020 | Published: 27 Oct 2020

Hitachi ID

Singapore Nonprofit PPIS Secures Centers with Help from BlackBerry and Partner ACE Pacific Group
sponsored by BlackBerry
CASE STUDY: With the world having changed the way it does business, security professionals have had to place a lot of emphasis on endpoint security and, more specifically, threat detection and response. Want to learn more? View this impressive case study to learn how a nonprofit in Singapore was able to prepare for the unexpected.
Posted: 14 Oct 2020 | Published: 14 Oct 2020

BlackBerry

Build Resilience for Your Business in the New/Next Normal into 2021 and Beyond
sponsored by ServiceNow
VIDEO: In this new normal, most companies don't have a complete picture of what's happening in various parts of their business. To stay ahead of risks and plan for recovery means having visibility and control, and the right software can help you achieve both. Watch this video to learn about Business Continuity Management from ServiceNow.
Posted: 08 Oct 2020 | Premiered: 08 Oct 2020

ServiceNow

Risk Management as Revenue Driver: An Adaptive Approach
sponsored by LogicGate
RESOURCE: Recently, PwC interviewed 1,535 executives in risk functions from 76 countries and across 30 different industries. They used this information to serve as models in their successful approaches to risk. These “Adapters,” as they’re called, were effective in tackling innovation-related risks. Read this article to see why they stood out.
Posted: 07 Oct 2020 | Published: 19 Mar 2019

LogicGate

What is Operational Resilience?
sponsored by LogicGate
RESOURCE: According to Gartner, operational resilience is a set of techniques that allows people, processes and information systems to adapt to changing patterns. How do businesses not just prepare but succeed when faced with the unexpected? Read this quick article to get an understanding of how organizations comprehend their respective risk.
Posted: 02 Oct 2020 | Published: 17 Sep 2020

LogicGate

The Top 5 InfoSec Professional Challenges
sponsored by LogicGate
RESOURCE: What keeps you up at night? If you’re anything like most risk and information security professionals, the list is long. Juggling security concerns, reporting on risk data, and managing the latest regulatory requirements all add up. To stay in the know, read the top 5 challenges infosec professionals face, and the common thread linking them all.
Posted: 02 Oct 2020 | Published: 24 Sep 2020

LogicGate

The Risk Cloud
sponsored by LogicGate
WHITE PAPER: Approaches to risk management are shifting from reactive to proactive. Integrating risk management programs is a key to growth in today’s digital landscape. Many of the challenges involving risk, including lack of visibility and poor UX, can be solved through a more agile approach. Read this white paper to learn about the Risk Cloud and agile GRC.
Posted: 01 Oct 2020 | Published: 01 Oct 2020

LogicGate

How is the Role and World of the CISO Changing?
sponsored by Kaspersky Lab
RESOURCE: As cybersecurity risks increase, the role of the CISO becomes more dynamic. 70% of current CISOs report that risk management is now a key part of their role. For more CISO trends, take a look at this survey conducted by 451 Research. Use it to understand what the role of today’s CISOs looks like as well as the top 5 skills to succeed in the role.
Posted: 09 Sep 2020 | Published: 09 Sep 2020

Kaspersky Lab

Cybereason MDR Packages
sponsored by Cybereason
DATA SHEET: Detection and response are vital to any organization’s security. With managed detection and response (MDR), you can efficiently prevent data breaches, eliminate false positives, and because it’s managed, you can optimize security operations and reduce total cost of ownership. Dive into this data sheet to learn about MDR from Cybereason.
Posted: 21 Aug 2020 | Published: 21 Aug 2020

Cybereason

Simplify Your Security Operations Center
sponsored by Red Hat
EBOOK: 77% of organizations plan to implement automation to speed up security response times. Does yours? Dive into this e-book to learn about the benefits of an automation platform and how you can simplify your security operations center.
Posted: 17 Aug 2020 | Published: 17 Aug 2020

Red Hat

The CISO Speaks: Insights From the Frontlines, Part 2
sponsored by RSA Conference
WEBCAST: Not only is Kuwait’s oil and gas industry critical to its economy—it’s also heavily targeted by global threat actors. In this RSAC Unplugged 2019 Sydney presentation, see how upstream, midstream and downstream companies reached a consensus around common security objectives and a unified governance framework to protect this vital sector.
Posted: 17 Jul 2020 | Premiered: Oct 17, 2019

RSA Conference

Adapting Networks in Critical Times
sponsored by Oracle Communications
RESOURCE: With what is at hand, businesses must be assured then reassured that their networks and information are managed, compliant and most of all secure. This message from Oracle Communications demonstrates their commitment to the business continuity of their customers in a time of uncertainty.
Posted: 10 Jul 2020 | Published: 10 Jul 2020

Oracle Communications

False cents of security: The price of being compromised
sponsored by ComputerWeekly.com
EGUIDE: Trying to guard against everything from frequently phished users to applications with flimsy security, information security professionals are fending off these threats from all angles. Learn more in this infographic about the anatomy of data breach costs and where enterprises are most vulnerable.
Posted: 02 Jun 2020 | Published: 03 Jun 2020

ComputerWeekly.com

Foundation for Digital Transformation
sponsored by Infovista
ANALYST REPORT: In this EIQ report, gain an understanding of the impact of new consumer expectations on applications, digital transformation and networking systems initiatives within retail, manufacturing and banking/finance industries.
Posted: 19 Nov 2019 | Published: 19 Nov 2019

Infovista

Driving IT Hygiene with Tanium
sponsored by Tanium
DATA SHEET: Improving IT Hygiene means creating a process to continuously identify assets, risks, and vulnerabilities across an environment and fixing them with speed at scale. In this solution brief, uncover the fundamental aspects of better IT Hygiene and explore Tanium’s IT Hygiene Platform. Read on to learn more.
Posted: 18 Nov 2019 | Published: 18 Nov 2019

Tanium

Ransomware Backup Protection Requires Comprehensive Approach
sponsored by SearchDataBackup.com
EBOOK: Read on to discover just how ransomware can infiltrate data backups, what organizations can do to best prepare for this new problem and general guidelines for better backup practices.
Posted: 14 Aug 2020 | Published: 14 Aug 2020

SearchDataBackup.com

Employ AI for Cybersecurity, Reap Strong Defenses Faster
sponsored by SearchSecurity.com
EBOOK: Adversaries are constantly changing their hacking techniques to bypass the strongest enterprise security systems. Meanwhile, businesses are adopting new and advanced technologies to protect their assets. In this e-guide, explore considerations for implementing the latest applications of AI for cybersecurity in your enterprise.
Posted: 17 Jun 2020 | Published: 17 Jun 2020

SearchSecurity.com

Ransomware Attacks: How to Get the Upper Hand
sponsored by Cisco Umbrella
EGUIDE: The rock group Radiohead is celebrated for its unconventional approach to recording and releasing music. Lately, the band is also turning heads for how it handled a hacker trying to sell its unreleased work. In this e-guide learn what security experts think of Radiohead’s strategy for dealing with the ransomware threat.
Posted: 26 Nov 2019 | Published: 21 Nov 2019

Cisco Umbrella
1 - 25 of 299 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info