IT Management  >   Systems Operations  >   Security  >  

Information Security

RSS Feed   
ALSO CALLED: Infosecurity
DEFINITION: COBIT (Control Objectives for Information and Related Technology) is an international open standard that defines requirements for the control and security of sensitive data and provides a reference framework. COBIT, which provides a reference framework, was introduced in the 1990s by the IT Governance Institute. Learn more about managing compliance at SearchCompliance.com. COBIT consists of an executive  … 

Information Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Information Security Reports
1 - 25 of 286 Matches Previous Page  |  Next Page
Cybercrime Report Webinar Sept 2019
sponsored by LexisNexis Risk Solutions
WEBCAST: In this webinar, Courtney Austin and Ellie Burns from LexisNexis Risk Solutions explore global insights from the new LexisNexis Risk Solutions Cybercrime Report covering January to June 2019.
Posted: 14 Oct 2019 | Premiered: Oct 14, 2019

LexisNexis Risk Solutions

Threat Intelligence: Far-Fetched Idea or Must-Have Security Tactic? How Every Ciso Can Make It a Priority
sponsored by Mimecast
WHITE PAPER: If threat intelligence isn't part of your cyber resilience strategy in some capacity, you have a massive gap on your hands. And you may be blindsided by a phishing attack, malware incident or worse. In this white paper, learn how CISOs can make threat intelligence a priority in their cyber resilience planning.
Posted: 24 Sep 2019 | Published: 24 Sep 2019

Mimecast

The Titus Times: The CEO & CTO
sponsored by TITUS
RESOURCE: In this e-magazine, learn about the roles of the CEO and the CTO and delve into how their concerns around data protection overlap – as well as where they diverge. Also, learn how to overcome discrepancies to build a strong data protection strategy.
Posted: 11 Sep 2019 | Published: 11 Sep 2019

TITUS

Top Research For CIOs: Security
sponsored by MASERGY
ANALYST REPORT: Security no longer lives exclusively in the IT department. In this Forrest report, CIOs can gain insight into the trends and key issues in the security landscape. Also, explore opportunities for improving how security is managed regardless of whether you own the security function.
Posted: 09 Aug 2019 | Published: 15 Mar 2019

MASERGY

The Vital Role of Security in Digital Transformation
sponsored by TITUS
ANALYST REPORT: A survey conducted by Market Strategies Internal showed that 78% of ITDMs believe that the success of their digital transformation relies heavily on strong IT security and data protection. In this research report, explore 2 different security professional personas and explore how they view digital transformation, security and data protection.
Posted: 01 Aug 2019 | Published: 31 May 2019

TITUS

Patient Privacy Intelligence: The Intersection of Compliance, Legal and Information Security
sponsored by FairWarning
WHITE PAPER: Download this white paper to explore the critical capabilities of a patient privacy intelligence tool required to meet the business and technical demands of modern care providers for regulatory compliance and information security.
Posted: 23 Jul 2019 | Published: 23 Jul 2019

FairWarning

5 Ways CIOs Can Optimize Communication With Other Executives
sponsored by BitSight
WHITE PAPER: Despite the fundamental importance of information technology and security, many organizations continue to treat it as separate from the rest of the organization. In this white paper, explore 5 ways CIOs can optimize communication with other executives to help strengthen an organization's security.
Posted: 23 May 2019 | Published: 23 May 2019

BitSight

The exploitation of flaws in the HTTPS protocol
sponsored by ComputerWeekly.com
RESEARCH CONTENT: For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.
Posted: 16 Apr 2019 | Published: 16 Apr 2019

ComputerWeekly.com

April ezine: SD-WAN more than just networking
sponsored by MicroScope
EZINE: An issue covering SD-WAN, storage innovations and opportunities for channel growth
Posted: 28 Mar 2019 | Published: 28 Mar 2019

MicroScope

Implementing Agile Security Response
sponsored by ServiceNow
WHITE PAPER: Data breaches constantly threaten enterprises today. The biggest challenge that organizations face is coordinating incident response across the organization. Download this resource for access to an essential security operations solution checklist to help your organization better respond to security threats and vulnerabilities.
Posted: 04 Feb 2019 | Published: 30 Sep 2018

ServiceNow

December ezine: Tech for good
sponsored by MicroScope
EZINE: Read about why more CEOs are discussing the positives of technology and why the channel will need to do the same
Posted: 29 Nov 2018 | Published: 29 Nov 2018

MicroScope

September ezine: Thinking digital in the world of storage
sponsored by MicroScope
EZINE: The full report of the recent MicroScope storage roundtable which discusses how cloud and GDPR has changed the industry
Posted: 06 Sep 2018 | Published: 06 Sep 2018

MicroScope

The difficulties of defending against web tracking
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This article in our Royal Holloway information security series introduces you to web tracking, provides an overview of how organisations track users and discusses a few of the difficulties you may face when trying to defend against tracking.
Posted: 22 May 2018 | Published: 22 May 2018

ComputerWeekly.com

An Introduction to 8 Cloud Security Certifications
sponsored by TechTarget
RESOURCE: We need your help! Participate in our Cloud Security survey to give us a better understanding of the cloud security technologies and strategies you are using today. As a thank you for completing the survey, you'll receive a copy of our expert guide, Cloud Security Certifications 101.
Posted: 02 Oct 2017 | Published: 06 Sep 2019

TechTarget

The Top Cyber Security Trends in ANZ in 2017
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, read about Australia's plan for getting technology suppliers and service providers to decrypt encrypted messages, why threat intelligence is more than just ingesting data feeds into a security system and the risks that shadow IT can bring to organisations in Australia and New Zealand.
Posted: 19 Jul 2017 | Published: 19 Jul 2017

ComputerWeekly.com

MicroScope - July 2017: Data and storage are the themes, with GDPR and flash up for debate
sponsored by MicroScope
EZINE: An e-zine looking at the issues around flash storage, EU General Data Protection Regulation (GDPR), hardware as a service, and cloud platforms. Here's all the channel news you need to know.
Posted: 30 Jun 2017 | Published: 30 Jun 2017

MicroScope

Facing up to emerging technology: Risks and benefits
sponsored by SearchCIO
EBOOK: Cutting-edge technologies offer companies competitive advantages but also present security threats. Learn how to mitigate emerging technology risks.
Posted: 22 Mar 2019 | Published: 22 Mar 2019

SearchCIO

Incident response playbook in flux as services, tools arrive
sponsored by SearchSecurity.com
EBOOK: The enterprise incident response "playbook" is getting a rewrite. An IR playbook guides an enterprise security team's work, identifying triggering events and outlining best practices or regulatory requirements. Download this handbook to learn more about the essential playbook revisions that are putting new technologies and services to use.
Posted: 12 Feb 2019 | Published: 12 Feb 2019

SearchSecurity.com

Recent Ransomware Attacks Got you? Don't Cry; Fight Back!
sponsored by SearchSecurity.com
EBOOK: Recent ransomware attacks may make you WannaCry, but there's no time for that. It's time to learn what you can do to minimize the threat and how to deal if the worst happens. Start here to discover how to fight back against hackers, today.
Posted: 24 Aug 2018 | Published: 24 Aug 2018

SearchSecurity.com

Get Smart About Threat Intel Tools and Services
sponsored by SearchSecurity.com
EBOOK: Learn how threat intelligence tools can improve enterprise security and where they should fit into the broader security scheme.
Posted: 25 Jun 2018 | Published: 25 Jun 2018

SearchSecurity.com

ITSM strategy for an agile, secure digital transformation
sponsored by SearchCIO.com
EBOOK: As digital transformation forces companies to rethink IT ops, balancing reliability and speed will be vital to successfully updating their ITSM strategy.
Posted: 22 May 2018 | Published: 22 May 2018

SearchCIO.com

Cyber-Risk Strategies and Models for a Post-Perimeter Age
sponsored by SearchSecurity.com
EBOOK: In our expert handbook, managing editor Brenda Horrigan and Nemertes Research president Johna Till Johnson explain how to implement a zero-trust approach to cybersecurity.
Posted: 20 Apr 2018 | Published: 20 Apr 2018

SearchSecurity.com

Build your Content Security and Document Management Plan
sponsored by Adobe Inc
EGUIDE: In this expert e-guide, we explore how you can create an effective content security and document management strategy. Discover 5 tips for a sound content security policy and learn about the differences between digital signature, e-signature, and digital certificates.
Posted: 27 Feb 2018 | Published: 22 Feb 2018

Adobe Inc

Get Smart About Threat Intel Tools and Services
sponsored by SearchSecurity.com
EBOOK: Learn how threat intelligence tools can improve enterprise security and where they should fit into the broader security scheme.
Posted: 27 Feb 2017 | Published: 20 Feb 2017

SearchSecurity.com

Secure Information Exchange in the Digital Age
sponsored by OpenText
WHITE PAPER: Forrester Senior Analyst Heidi Shey answers five questions regarding secure information exchange (SIE) and discusses how digital transformations are changing the way that IT decision-makers have to approach SIE in the digital age.
Posted: 27 Feb 2017 | Published: 31 Jan 2017

OpenText
1 - 25 of 286 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement