IT Management  >   Systems Operations  >   Security  >  

Information Security

RSS Feed   
ALSO CALLED: Infosecurity
DEFINITION: COBIT (Control Objectives for Information and Related Technology) is an international open standard that defines requirements for the control and security of sensitive data and provides a reference framework. COBIT, which provides a reference framework, was introduced in the 1990s by the IT Governance Institute. Learn more about managing compliance at SearchCompliance.com. COBIT consists of an executive  … 

Information Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Information Security Reports
1 - 25 of 388 Matches Previous Page  |  Next Page
September ezine: Thinking digital in the world of storage
sponsored by MicroScope
EZINE: The full report of the recent MicroScope storage roundtable which discusses how cloud and GDPR has changed the industry
Posted: 06 Sep 2018 | Published: 06 Sep 2018

MicroScope

Recent Ransomware Attacks Got you? Don't Cry; Fight Back!
sponsored by SearchSecurity.com
EBOOK: Recent ransomware attacks may make you WannaCry, but there's no time for that. It's time to learn what you can do to minimize the threat and how to deal if the worst happens. Start here to discover how to fight back against hackers, today.
Posted: 24 Aug 2018 | Published: 24 Aug 2018

SearchSecurity.com

Embracing Cross-Border eCommerce
sponsored by Riskified
RESOURCE: North America is lagging behind in global eCommerce growth due to the fear of fraud. This resource shares best practices for effective fraud management when operating in new territories around the world so that you don't miss the opportunity to expand your business worldwide.
Posted: 09 Aug 2018 | Published: 31 Jan 2018

Riskified

Report: Securing the Enterprise Against Cyberattacks
sponsored by Akamai Technologies
ANALYST REPORT: 71% of IT and security professionals say they struggle to prevent targeted threats from negatively impacting their enterprise. Read this full Ponemon Institute report to discover top obstacles and security practices as identified by IT and IT security professionals.
Posted: 03 Aug 2018 | Published: 30 Jun 2018

Akamai Technologies

Definitive Guide to Data Classification
sponsored by Digital Guardian
RESOURCE: In the case of your growing data, prioritization comes from data classification. In this 8 part guide, you'll learn about what classification is, why it is important and even foundational to data security.
Posted: 17 Jul 2018 | Published: 17 Jul 2018

Digital Guardian

Get Smart About Threat Intel Tools and Services
sponsored by SearchSecurity.com
EBOOK: Learn how threat intelligence tools can improve enterprise security and where they should fit into the broader security scheme.
Posted: 25 Jun 2018 | Published: 25 Jun 2018

SearchSecurity.com

The difficulties of defending against web tracking
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This article in our Royal Holloway information security series introduces you to web tracking, provides an overview of how organisations track users and discusses a few of the difficulties you may face when trying to defend against tracking.
Posted: 22 May 2018 | Published: 22 May 2018

ComputerWeekly.com

LogRhythm '2018 Cybersecurity Perceptions and Practices Benchmark Survey'
sponsored by LogRhythm, Inc.
ANALYST REPORT: Find out why security teams need to be working more intentionally to take time to understand the full scope of an incident and determine how to best neutralize it.
Posted: 27 Apr 2018 | Published: 27 Apr 2018

LogRhythm, Inc.

Securing Business Information with Box
sponsored by Box
WHITE PAPER: Discover how to centralize control over content and collaboration in a way that facilitates productivity without sacrificing security and learn about Box's content management platform.
Posted: 09 Nov 2017 | Published: 09 Nov 2017

Box

Information Lifecycle Management: Harness The Power Of Your Data
sponsored by Cintra
WHITE PAPER: Discover how to create a comprehensive information lifecycle management (ILM) strategy. Find out how to take a 4 tiered approach to categorizing and managing your data and learn about the key pillars of ILM.
Posted: 05 Oct 2017 | Published: 31 Dec 2016

Cintra

The Life-Changing Magic of Information Governance
sponsored by Box
WHITE PAPER: Learn how to create effective information governance with 3 keys to manage even cloud-based content soundly and securely throughout its entire lifecycle.
Posted: 20 Sep 2017 | Published: 20 Sep 2017

Box

The Top Cyber Security Trends in ANZ in 2017
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, read about Australia's plan for getting technology suppliers and service providers to decrypt encrypted messages, why threat intelligence is more than just ingesting data feeds into a security system and the risks that shadow IT can bring to organisations in Australia and New Zealand.
Posted: 19 Jul 2017 | Published: 19 Jul 2017

ComputerWeekly.com

MicroScope - July 2017: Data and storage are the themes, with GDPR and flash up for debate
sponsored by MicroScope
EZINE: An e-zine looking at the issues around flash storage, EU General Data Protection Regulation (GDPR), hardware as a service, and cloud platforms. Here's all the channel news you need to know.
Posted: 30 Jun 2017 | Published: 30 Jun 2017

MicroScope

GDPR: Information Security, Governance and Regulations Working in Unity
sponsored by CA Technologies
ANALYST REPORT: What is data privacy if not data security? Organizations must focus more on data security now that new GDPR regulations are in effect. In this insight report, learn how information governance and IT professionals come together with security software to establish a foundation for GDPR compliance.
Posted: 02 Jul 2018 | Published: 02 Jul 2018

CA Technologies

ITSM strategy for an agile, secure digital transformation
sponsored by SearchCIO.com
EBOOK: As digital transformation forces companies to rethink IT ops, balancing reliability and speed will be vital to successfully updating their ITSM strategy.
Posted: 22 May 2018 | Published: 22 May 2018

SearchCIO.com

Cyber-Risk Strategies and Models for a Post-Perimeter Age
sponsored by SearchSecurity.com
EBOOK: In our expert handbook, managing editor Brenda Horrigan and Nemertes Research president Johna Till Johnson explain how to implement a zero-trust approach to cybersecurity.
Posted: 20 Apr 2018 | Published: 20 Apr 2018

SearchSecurity.com

Shining a Light on File Sharing and Shadow IT
sponsored by Citrix
WHITE PAPER: Learn 5 reasons why a business-grade file sharing platform can help enable employees to collaborate and access information while maintaining sound data security.
Posted: 18 Apr 2018 | Published: 18 Apr 2018

Citrix

Are Security Threats Keeping You Up at Night?
sponsored by Citrix
WHITE PAPER: Discover 5 steps to secure file sharing, designed to help you maintain compliance and data security without restricting access to information.
Posted: 17 Apr 2018 | Published: 17 Apr 2018

Citrix

7 Must-Haves for Secure File Sharing
sponsored by Citrix
WHITE PAPER: This white paper explores how to select an IT-approved secure file-sharing service so that you can enable users to access and share the data they need. Discover 7 non-negotiable considerations for your file-sharing platform.
Posted: 17 Apr 2018 | Published: 17 Apr 2018

Citrix

Build your Content Security and Document Management Plan
sponsored by Adobe Systems, Inc.
EGUIDE: In this expert e-guide, we explore how you can create an effective content security and document management strategy. Discover 5 tips for a sound content security policy and learn about the differences between digital signature, e-signature, and digital certificates.
Posted: 27 Feb 2018 | Published: 22 Feb 2018

Adobe Systems, Inc.

5 Keys to Secure Information Management
sponsored by Hyland
WHITE PAPER: With so much confidential data passing through today's business systems, information management must stand up to a higher degree of scrutiny when it comes to data security. Download the white paper to learn the 5 keys that will help you secure information management and reduce risks to your organization.
Posted: 31 Jan 2018 | Published: 31 Dec 2017

Hyland

New Zealand Transport Agency Customer Success Story
sponsored by OpenText
VIDEO: Watch this brief video case study to find out how the NZ Transport Agency used enterprise content management as a service (ECMaaS) to improve the way they store, share, protect, and manage digital information.
Posted: 13 Oct 2017 | Premiered: 13 Oct 2017

OpenText

Hydro Tasmania Customer Success Story
sponsored by OpenText
VIDEO: Watch this brief video case study to find out how Hydro Tasmania unified scattered information and resolved content inefficiencies in their SAP, ERP, and SharePoint environments.
Posted: 13 Oct 2017 | Premiered: 13 Oct 2017

OpenText

A 5 Minute Guide to Security for Cognitive Search and Knowledge Management
sponsored by Attivio, Inc.
WHITE PAPER: Examine the resurgence of knowledge management, in conjunction with cognitive search and security, as a viable option for coordinating the vast amounts of information buried in big data environments.
Posted: 13 Sep 2017 | Published: 13 Sep 2017

Attivio, Inc.

The Life-Changing Magic of Information Governance
sponsored by Box
EBOOK: Learn how to create effective information governance with 3 keys to manage even cloud-based content soundly and securely throughout its entire lifecycle.
Posted: 15 Aug 2017 | Published: 15 Aug 2017

Box
1 - 25 of 388 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement