IT Management  >   Systems Operations  >   Security  >  

Information Security

RSS Feed   
ALSO CALLED: Infosecurity
DEFINITION: COBIT (Control Objectives for Information and Related Technology) is an international open standard that defines requirements for the control and security of sensitive data and provides a reference framework. COBIT, which provides a reference framework, was introduced in the 1990s by the IT Governance Institute. Learn more about managing compliance at SearchCompliance.com. COBIT consists of an executive  … 

Information Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Information Security Reports
1 - 25 of 291 Matches Previous Page  |  Next Page
Beyond COVID-19 Webinar
sponsored by Hyperproof
WEBCAST: COVID-19 has both introduced new risks and amplified existing ones. Business continuity, security, crisis management and customer acquisition have all been put to the test, and all the while, the economy has become totally unpredictable. Watch this webinar to learn how to manage new risks and stay compliant throughout COVID-19 and beyond.
Posted: 14 Sep 2020 | Premiered: Sep 14, 2020

Hyperproof

How is the Role and World of the CISO Changing?
sponsored by Kaspersky Lab
RESOURCE: As cybersecurity risks increase, the role of the CISO becomes more dynamic. 70% of current CISOs report that risk management is now a key part of their role. For more CISO trends, take a look at this survey conducted by 451 Research. Use it to understand what the role of today’s CISOs looks like as well as the top 5 skills to succeed in the role.
Posted: 09 Sep 2020 | Published: 09 Sep 2020

Kaspersky Lab

What Every Security Professional Should Know About Third-Party OAuth Apps
sponsored by Proofpoint
WHITE PAPER: For CISOs, permitting third-party apps is a constant struggle, especially given the expansive use of cloud applications. What’s important is that security professionals in authentication are up to speed on what keeps a cloud account safe from OAuth attacks. Take a look at this FAQ/checklist to be informed on the risks of third-party apps.
Posted: 08 Sep 2020 | Published: 03 Sep 2020

Proofpoint

Achieving Audit-Readiness for Security Standards Compliance in Modern IT Environments
sponsored by Xtravirt
WHITE PAPER: Modern IT environments are highly complex and staying compliant with security standards can be time-consuming. Download this white paper and discover how your organization can achieve audit readiness, ensure continuity of service, and earn customer trust. Read Now.
Posted: 02 Sep 2020 | Published: 31 Aug 2020

Xtravirt

Learn How Atlassian’s Security Leadership Team Ensures Governance and Compliance
sponsored by Atlassian
WHITE PAPER: As your enterprise grows, your security, governance, and compliance protocols have to grow with it. If not, you can find yourself caught in legal matters, subject to a significant data breach, or even worse, you can threaten your brand’s integrity and your customers’ trust. Read this e-book for 3 ways to ensure governance and compliance.
Posted: 21 Aug 2020 | Published: 21 Aug 2020

Atlassian

Cybereason MDR Packages
sponsored by Cybereason
DATA SHEET: Detection and response are vital to any organization’s security. With managed detection and response (MDR), you can efficiently prevent data breaches, eliminate false positives, and because it’s managed, you can optimize security operations and reduce total cost of ownership. Dive into this data sheet to learn about MDR from Cybereason.
Posted: 21 Aug 2020 | Published: 21 Aug 2020

Cybereason

Deep-Dive into MLPS 2.0 Compliance with Alibaba Cloud Solution
sponsored by Alibaba Cloud
WEBCAST: As of Dec. 1, 2019, China has introduced a new version of their multi-level protection scheme law known as MLPS 2.0. As such, the Chinese government has updated its pre-existing requirement that individual 'network operators' in China must implement and maintain an MLPS with respect to their networks. Watch this webcast to get more details.
Posted: 17 Aug 2020 | Premiered: Aug 17, 2020

Alibaba Cloud

Simplify Your Security Operations Center
sponsored by Red Hat
EBOOK: 77% of organizations plan to implement automation to speed up security response times. Does yours? Dive into this e-book to learn about the benefits of an automation platform and how you can simplify your security operations center.
Posted: 17 Aug 2020 | Published: 17 Aug 2020

Red Hat

Cybersecurity Law and Latest Security Compliance Trends in China
sponsored by Alibaba Cloud
WEBCAST: The world’s approach to data privacy has evolved quickly over time. Nations have developed their own standards and regulations on the matter. GDPR is the most newsworthy example of cybersecurity law, but countries around the world are looking into their data use laws. View this webcast for a look at compliance trends in China.
Posted: 14 Aug 2020 | Premiered: Aug 14, 2020

Alibaba Cloud

The CISO Speaks: Insights From the Frontlines, Part 2
sponsored by RSA Conference
WEBCAST: Not only is Kuwait’s oil and gas industry critical to its economy—it’s also heavily targeted by global threat actors. In this RSAC Unplugged 2019 Sydney presentation, see how upstream, midstream and downstream companies reached a consensus around common security objectives and a unified governance framework to protect this vital sector.
Posted: 17 Jul 2020 | Premiered: Oct 17, 2019

RSA Conference

Adapting Networks in Critical Times
sponsored by Oracle Communications
RESOURCE: With what is at hand, businesses must be assured then reassured that their networks and information are managed, compliant and most of all secure. This message from Oracle Communications demonstrates their commitment to the business continuity of their customers in a time of uncertainty.
Posted: 10 Jul 2020 | Published: 10 Jul 2020

Oracle Communications

Employ AI for Cybersecurity, Reap Strong Defenses Faster
sponsored by SearchSecurity.com
EBOOK: Adversaries are constantly changing their hacking techniques to bypass the strongest enterprise security systems. Meanwhile, businesses are adopting new and advanced technologies to protect their assets. In this e-guide, explore considerations for implementing the latest applications of AI for cybersecurity in your enterprise.
Posted: 17 Jun 2020 | Published: 17 Jun 2020

SearchSecurity.com

False cents of security: The price of being compromised
sponsored by ComputerWeekly.com
EGUIDE: Trying to guard against everything from frequently phished users to applications with flimsy security, information security professionals are fending off these threats from all angles. Learn more in this infographic about the anatomy of data breach costs and where enterprises are most vulnerable.
Posted: 02 Jun 2020 | Published: 03 Jun 2020

ComputerWeekly.com

Innovation in retail: Using cybersecurity as a competitive advantage
sponsored by Capgemini
RESOURCE: While cybersecurity measures enable retail organizations to identify and mitigate potential threats, it’s important to consider that data protection can be considered a competitive advantage. In this blog post, explore the importance of security for retail consumers, how GDPR is shaping the industry, and the role of SOCs in quantifying risks.
Posted: 19 Dec 2019 | Published: 13 May 2019

Capgemini

Foundation for Digital Transformation
sponsored by Infovista
ANALYST REPORT: In this EIQ report, gain an understanding of the impact of new consumer expectations on applications, digital transformation and networking systems initiatives within retail, manufacturing and banking/finance industries.
Posted: 19 Nov 2019 | Published: 19 Nov 2019

Infovista

Driving IT Hygiene with Tanium
sponsored by Tanium
DATA SHEET: Improving IT Hygiene means creating a process to continuously identify assets, risks, and vulnerabilities across an environment and fixing them with speed at scale. In this solution brief, uncover the fundamental aspects of better IT Hygiene and explore Tanium’s IT Hygiene Platform. Read on to learn more.
Posted: 18 Nov 2019 | Published: 18 Nov 2019

Tanium

The exploitation of flaws in the HTTPS protocol
sponsored by ComputerWeekly.com
RESEARCH CONTENT: For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.
Posted: 16 Apr 2019 | Published: 16 Apr 2019

ComputerWeekly.com

April ezine: SD-WAN more than just networking
sponsored by MicroScope
EZINE: An issue covering SD-WAN, storage innovations and opportunities for channel growth
Posted: 28 Mar 2019 | Published: 28 Mar 2019

MicroScope

December ezine: Tech for good
sponsored by MicroScope
EZINE: Read about why more CEOs are discussing the positives of technology and why the channel will need to do the same
Posted: 29 Nov 2018 | Published: 29 Nov 2018

MicroScope

September ezine: Thinking digital in the world of storage
sponsored by MicroScope
EZINE: The full report of the recent MicroScope storage roundtable which discusses how cloud and GDPR has changed the industry
Posted: 06 Sep 2018 | Published: 06 Sep 2018

MicroScope

Ransomware Backup Protection Requires Comprehensive Approach
sponsored by SearchDataBackup.com
EBOOK: Read on to discover just how ransomware can infiltrate data backups, what organizations can do to best prepare for this new problem and general guidelines for better backup practices.
Posted: 14 Aug 2020 | Published: 14 Aug 2020

SearchDataBackup.com

Ransomware Attacks: How to Get the Upper Hand
sponsored by Cisco Umbrella
EGUIDE: The rock group Radiohead is celebrated for its unconventional approach to recording and releasing music. Lately, the band is also turning heads for how it handled a hacker trying to sell its unreleased work. In this e-guide learn what security experts think of Radiohead’s strategy for dealing with the ransomware threat.
Posted: 26 Nov 2019 | Published: 21 Nov 2019

Cisco Umbrella

Facing up to emerging technology: Risks and benefits
sponsored by SearchCIO
EBOOK: Cutting-edge technologies offer companies competitive advantages but also present security threats. Learn how to mitigate emerging technology risks.
Posted: 22 Mar 2019 | Published: 22 Mar 2019

SearchCIO

Incident response playbook in flux as services, tools arrive
sponsored by SearchSecurity.com
EBOOK: The enterprise incident response "playbook" is getting a rewrite. An IR playbook guides an enterprise security team's work, identifying triggering events and outlining best practices or regulatory requirements. Download this handbook to learn more about the essential playbook revisions that are putting new technologies and services to use.
Posted: 12 Feb 2019 | Published: 12 Feb 2019

SearchSecurity.com

Recent Ransomware Attacks Got you? Don't Cry; Fight Back!
sponsored by SearchSecurity.com
EBOOK: Recent ransomware attacks may make you WannaCry, but there's no time for that. It's time to learn what you can do to minimize the threat and how to deal if the worst happens. Start here to discover how to fight back against hackers, today.
Posted: 24 Aug 2018 | Published: 24 Aug 2018

SearchSecurity.com
1 - 25 of 291 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info