IT Management  >   Systems Operations  >   Security  >  

Management of Security Information

RSS Feed   
Management of Security Information Reports
 
Enhancing Orchestration Using Threat Intelligence
sponsored by ThreatQuotient
VIDEO: Managing modern risk requires dedicated threat intelligence platforms that equip organizations with the information and guidance needed to identity and thwart potential cyberattacks. Watch this webinar to learn about how threat intelligence can (and should) be used to enhance security orchestration initiatives.
Posted: 21 Sep 2020 | Premiered: 21 Sep 2020

ThreatQuotient

Measuring the ROI of Security Orchestration and Response Platforms
sponsored by Splunk
WHITE PAPER: Security orchestration and response (SOAR) platforms have become the force multiplier needed to unlock the full power of an organization’s security investment by helping security teams focus on innovation rather than mundane tasks. Read this white paper to measure the ROI of SOAR.
Posted: 31 Aug 2020 | Published: 31 Aug 2020

Splunk

Why Privileged Access Management Needs to Be Part of Your Virtualization Strategy
sponsored by Tehama
RESOURCE: As organizations rely more on remote capabilities for ensuring productivity during the new normal, cybercriminals have shifted their tactics to focus on this lucrative new vector. This article highlights emerging cyberthreat tactics and overviews the benefits of incorporating privileged access management (PAM) into virtualization strategies.
Posted: 21 Sep 2020 | Published: 17 Sep 2020

Tehama

Secure Your Network and Stop Cybercriminals from Capitalizing on a Crisis
sponsored by Comcast Business
DATA SHEET: Threat actors have long been taking advantage of increased network vulnerabilities up to this point, but in order to fight the good fight, you must be up to speed on security architectures and technologies that are disrupting both hackers and the security industry. View this data sheet to learn to securely navigate the pandemic.
Posted: 04 Sep 2020 | Published: 04 Sep 2020

Comcast Business

5 Steps to Determine Residual Risk During the Assessment Process
sponsored by Coalfire
RESOURCE: Governance, risk and compliance-related residual risks are risk factors left over after an organization applies security controls to ensure compliance with laws and regulations. Data management gaps create this risk, but spotting it isn’t impossible. Open this article for 5 steps to identifying and offsetting residual risk during an assessment.
Posted: 03 Sep 2020 | Published: 28 May 2020

Coalfire

Measuring and Improving Cyber Defense Using the MITRE ATT&CK Framework
sponsored by ThreatQuotient
WHITE PAPER: For the past 5 years, the MITRE ATT&CK project has grown into a cybersecurity staple – organizations and their security teams are adopting ATT&CK frameworks with blinding speed (and for good reason). Read this SANS paper to learn more about MITRE ATT&CK and discover why its popularity has skyrocketed.
Posted: 18 Sep 2020 | Published: 31 Jul 2020

ThreatQuotient

Thales Data Protection Portfolio
sponsored by Thales
PRODUCT OVERVIEW: In this solution brief, discover an overview of Thales’ data protection portfolio – a collection of capabilities and offerings designed to enable improved security, compliance and operational efficiency while reducing costs. Read on to learn more about the features and benefits of the portfolio.
Posted: 11 Sep 2020 | Published: 29 Feb 2020

Thales

Ask These Critical Questions and Consider These Risks When Selecting an MDR Provider
sponsored by GoSecure
RESOURCE: According to Gartner, 25% of organizations will be using managed detection and response (MDR) services by 2024. So when considering key requirements and managing risks associated with outsourcing threat detection and response, it’s critical that you ask the right questions. View this Gartner article to learn these questions and more.
Posted: 23 Sep 2020 | Published: 31 Oct 2019

GoSecure

Why Seconds Matter
sponsored by Palo Alto Networks
WHITE PAPER: Todays' hackers are enjoying threats such as polymorphic malware that can avoid detection by constantly changing its identifiable features. How do security teams get around malleable threats? With inline machine learning, organizations may be able to stop threats while keeping business going. To learn more, read this comprehensive white paper.
Posted: 08 Sep 2020 | Published: 08 Sep 2020

Palo Alto Networks

Global Data at Risk: State of the Web Report
sponsored by Tala Security
WHITE PAPER: 2020 has indisputably been defined as a year of unique events with significant, long-lasting implications. The following report explores the state of the web in order to provide you with emerging trends, threat vectors, hacker behavioral patterns and more – read on to unlock the Global Data at Risk: 2020 State of the Web Report.
Posted: 01 Sep 2020 | Published: 01 Sep 2020

Tala Security
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info