IT Management  >   Systems Operations  >   Security  >  

Information Security

RSS Feed   
ALSO CALLED: Infosecurity
DEFINITION: COBIT (Control Objectives for Information and Related Technology) is an international open standard that defines requirements for the control and security of sensitive data and provides a reference framework. COBIT, which provides a reference framework, was introduced in the 1990s by the IT Governance Institute. Learn more about managing compliance at SearchCompliance.com. COBIT consists of an executive  … 

Information Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Information Security Reports
1 - 25 of 281 Matches Previous Page  |  Next Page
Top Challenges in a Software Audit Guide
sponsored by ClearEdge
WHITE PAPER: It's bound to happen and it's probably coming sooner than you think: The dreaded software audit. Licensing compliance audits are standard practice for software publishers, and it's wise to take steps to prepare. This whitepaper teaches you how to get ready and respond.
Posted: 14 Sep 2021 | Published: 14 Sep 2021

ClearEdge

Building in Infrastructure Trust
sponsored by HPE and Intel®
DATA SHEET: Explore 451 Research’s latest Voice of the Enterprise (VotE) study on Information Security to learn what respondents cited as top priorities when it comes to threat management and discover why its never been more important to build stronger operational skills and more effective processes to manage threats.
Posted: 30 Jul 2021 | Published: 30 Jul 2021

HPE and Intel®

SolarWinds and the Supply Chain, the Threat We've Ignored for Too Long
sponsored by Interos
WEBCAST: The SolarWinds attacks caught the entire country off its guard. What can security teams learn from them? Access this webcast to hear from Robert Brese, a VP and Executive Partner at Gartner, as he joins cybersecurity leaders to discuss fundamental changes that must be implemented to address the SolarWinds nation-state supply chain attacks.
Posted: 23 Feb 2021 | Premiered: Dec 22, 2020

Interos

Essential Operational Resilience
sponsored by ServiceNow
WHITE PAPER: Operational resilience is defined as ‘the ability of an organization to continue to serve its customers, deliver products and services, and protect its workforce in the face of adverse operational events by anticipating, preventing, recovering from and adapting to such events.’ View this white paper to learn 4 steps to operational resilience.
Posted: 28 Jan 2021 | Published: 28 Jan 2021

ServiceNow

THE TRUE COST OF A DDoS ATTACK
sponsored by Radware
WHITE PAPER: Many executives make the mistake of viewing cybersecurity strictly as a cost center. Organizations must reevaluate how the balance investment vs. risk equation and alter how and when they implement cybersecurity. In this Radware guide, learn the true cost of a DDoS attack, and see why it makes sense to invest now, not pay later.
Posted: 26 Jan 2021 | Published: 26 Jan 2021

Radware

Magic Quadrant For IT Risk Management
sponsored by MetricStream
ANALYST REPORT: By 2025, 50% of businesses will depend on risk management solutions. As such, security and risk management leaders are hunting for such solutions based on cybersecurity initiatives, board risk oversight and digital compliance obligations. Use this Gartner Magic Quadrant to evaluate the strengths and cautions of various players in the space.
Posted: 21 Jan 2021 | Published: 11 Aug 2020

MetricStream

Identity and Access Management: Good for Cybersecurity, Not So Much for Information Security
sponsored by Atakama
RESOURCE: The objectives and applications of cybersecurity and information security are inherently different. While there is significant overlap, tools like identity and access management (IAM) tend to favor cybersecurity while putting information security at greater risk. Read this article to learn more about IAM and the cybersecurity-infosec disparity.
Posted: 11 Dec 2020 | Published: 11 May 2020

Atakama

Data Discovery And Classification: The Foundation Of Effective Information Governance
sponsored by HelpSystems
WHITE PAPER: With the right technology tools, a data discovery and classification exercise will enable an enterprise to find its sensitive data, label it with the appropriate sensitivity and ensure that you can demonstrate regulatory compliance. View this white paper to learn why organizations should take a joint approach to tackling big data.
Posted: 24 Nov 2020 | Published: 30 Oct 2020

HelpSystems

Attacking And Defending A Distributed Workforce
sponsored by ServiceNow
WHITE PAPER: The shift to a distributed, remote workforce has exposed businesses to new attack vectors, including confidentiality threats, remote business process threats and availability threats, all of which alter company risk profiles. What does this mean for network professionals and risk management? Read this white paper to get the answer.
Posted: 11 Nov 2020 | Published: 11 Nov 2020

ServiceNow

CYBEREASON MDR PACKAGES
sponsored by Cybereason
DATA SHEET: Detection and response are vital to any organization’s security. With managed detection and response (MDR), you can efficiently prevent data breaches, eliminate false positives, and because it’s managed, you can optimize security operations and reduce total cost of ownership. Dive into this data sheet to learn about MDR from Cybereason.
Posted: 21 Aug 2020 | Published: 21 Aug 2020

Cybereason

False cents of security: The price of being compromised
sponsored by ComputerWeekly.com
EGUIDE: Trying to guard against everything from frequently phished users to applications with flimsy security, information security professionals are fending off these threats from all angles. Learn more in this infographic about the anatomy of data breach costs and where enterprises are most vulnerable.
Posted: 02 Jun 2020 | Published: 03 Jun 2020

ComputerWeekly.com

The exploitation of flaws in the HTTPS protocol
sponsored by ComputerWeekly.com
RESEARCH CONTENT: For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.
Posted: 16 Apr 2019 | Published: 16 Apr 2019

ComputerWeekly.com

April ezine: SD-WAN more than just networking
sponsored by MicroScope
EZINE: An issue covering SD-WAN, storage innovations and opportunities for channel growth
Posted: 28 Mar 2019 | Published: 28 Mar 2019

MicroScope

Implementing agile security response
sponsored by ServiceNow
WHITE PAPER: Data breaches constantly threaten enterprises today. The biggest challenge that organizations face is coordinating incident response across the organization. Download this resource for access to an essential security operations solution checklist to help your organization better respond to security threats and vulnerabilities.
Posted: 04 Feb 2019 | Published: 30 Sep 2018

ServiceNow

December ezine: Tech for good
sponsored by MicroScope
EZINE: Read about why more CEOs are discussing the positives of technology and why the channel will need to do the same
Posted: 29 Nov 2018 | Published: 29 Nov 2018

MicroScope

September ezine: Thinking digital in the world of storage
sponsored by MicroScope
EZINE: The full report of the recent MicroScope storage roundtable which discusses how cloud and GDPR has changed the industry
Posted: 06 Sep 2018 | Published: 06 Sep 2018

MicroScope

Threat detection and response demands proactive stance
sponsored by SearchSecurity.com
EBOOK: Cyberthreat volume, velocity and vectors are surging, taxing already stressed security teams. The time for a new cybersecurity approach is here. Threat detection and response tools are evolving just in time, as are the techniques to combat security alert fatigue.
Posted: 09 Apr 2021 | Published: 09 Apr 2021

SearchSecurity.com

Getting the most from cyberthreat intelligence services
sponsored by SearchSecurity.com
EZINE: A deluge of data is making it tough to put cyberthreat intelligence to work. This issue of 'Information Security' magazine focuses on what data makes a difference. This issue also includes a feature on top CISO concerns for 2020, plus an interview with Cisco's CISO Steve Martino.
Posted: 23 Feb 2021 | Published: 23 Feb 2021

SearchSecurity.com

Ransomware Backup Protection Requires Comprehensive Approach
sponsored by SearchDataBackup.com
EBOOK: Read on to discover just how ransomware can infiltrate data backups, what organizations can do to best prepare for this new problem and general guidelines for better backup practices.
Posted: 14 Aug 2020 | Published: 14 Aug 2020

SearchDataBackup.com

Employ AI for Cybersecurity, Reap Strong Defenses Faster
sponsored by SearchSecurity.com
EBOOK: Adversaries are constantly changing their hacking techniques to bypass the strongest enterprise security systems. Meanwhile, businesses are adopting new and advanced technologies to protect their assets. In this e-guide, explore considerations for implementing the latest applications of AI for cybersecurity in your enterprise.
Posted: 17 Jun 2020 | Published: 17 Jun 2020

SearchSecurity.com

Ransomware Attacks: How to Get the Upper Hand
sponsored by Cisco Umbrella
EGUIDE: The rock group Radiohead is celebrated for its unconventional approach to recording and releasing music. Lately, the band is also turning heads for how it handled a hacker trying to sell its unreleased work. In this e-guide learn what security experts think of Radiohead’s strategy for dealing with the ransomware threat.
Posted: 26 Nov 2019 | Published: 21 Nov 2019

Cisco Umbrella

Facing up to emerging technology: Risks and benefits
sponsored by SearchCIO
EBOOK: Cutting-edge technologies offer companies competitive advantages but also present security threats. Learn how to mitigate emerging technology risks.
Posted: 22 Mar 2019 | Published: 22 Mar 2019

SearchCIO

Incident response playbook in flux as services, tools arrive
sponsored by SearchSecurity.com
EBOOK: The enterprise incident response "playbook" is getting a rewrite. An IR playbook guides an enterprise security team's work, identifying triggering events and outlining best practices or regulatory requirements. Download this handbook to learn more about the essential playbook revisions that are putting new technologies and services to use.
Posted: 12 Feb 2019 | Published: 12 Feb 2019

SearchSecurity.com

Recent Ransomware Attacks Got you? Don't Cry; Fight Back!
sponsored by SearchSecurity.com
EBOOK: Recent ransomware attacks may make you WannaCry, but there's no time for that. It's time to learn what you can do to minimize the threat and how to deal if the worst happens. Start here to discover how to fight back against hackers, today.
Posted: 24 Aug 2018 | Published: 24 Aug 2018

SearchSecurity.com

Get Smart About Threat Intel Tools and Services
sponsored by SearchSecurity.com
EBOOK: Learn how threat intelligence tools can improve enterprise security and where they should fit into the broader security scheme.
Posted: 25 Jun 2018 | Published: 25 Jun 2018

SearchSecurity.com
1 - 25 of 281 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences