IT Management  >   Systems Operations  >   Security  >  

Management of Security Information

RSS Feed   
Management of Security Information Reports
 
Solving the Cyber Skills Crunch: A New Model for Cybersecurity
sponsored by Cyberfort
WHITE PAPER: Organizations are continuing to struggle to attract cybersecurity staff with the right level of experience and knowledge at the right price. An external cyber partner can help organizations to bypass this ongoing cyber skills shortage. In this white paper, learn how partnering with experienced cybersecurity experts can help your businesses.
Posted: 23 Sep 2019 | Published: 23 Sep 2019

Cyberfort

State of the Web Report 2019
sponsored by Tala Security
ANALYST REPORT: The website is a primary connection point between companies and their customers. Unfortunately, their architecture introduces critical vulnerabilities that enable client-side website attacks. In this research report, discover the risks associated with web and web app security and learn how to better protect your organization against attacks.
Posted: 11 Sep 2019 | Published: 11 Sep 2019

Tala Security

Identity and Access Management: Automated Peace of Mind
sponsored by Imprivata
RESOURCE: Inside, discover how your healthcare organization can benefit from an identity access management (IAM) solution purpose-built for healthcare, and learn how an IAM can help your organization ensure immediate access to vital patient care information, check test results from mobile, meet DEA requirements, and more.
Posted: 26 Sep 2019 | Published: 26 Sep 2019

Imprivata

Computer Weekly – 1 October 2019: The most influential women in UK technology
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we announce our annual list of the 50 most influential women in UK technology. Meet the winner, Debbie Forster, CEO of Tech Talent Charter, and find out who are this year's five rising stars. Also, our latest buyer's guide looks at the latest developments in robotic process automation. Read the issue now.
Posted: 27 Sep 2019 | Published: 01 Oct 2019

ComputerWeekly.com

Privileged Access Management as a Service: What's in it for You?
sponsored by CyberArk Software, Inc
WEBCAST: In this webcast, learn how privileged access management as a service benefits your organization to help you stay secure.
Posted: 08 Oct 2019 | Premiered: Oct 8, 2019

CyberArk Software, Inc

Manufacturing Solution Brief
sponsored by enSilo
PRODUCT OVERVIEW: The manufacturing industry has been heavily targeted by cyberattacks in recent years. Download this solution brief to learn how enSilo delivers a complete endpoint protection platform that is able to uniquely meet the security and operational needs of the manufacturing industry.
Posted: 20 Sep 2019 | Published: 20 Sep 2019


3 Steps to Managing Shadow IT
sponsored by Cisco Umbrella
WHITE PAPER: In today's digital workplace, organizations, departments, and individual users are embracing the cloud and leveraging new apps at rapid speed. This makes it difficult for security leaders to track app use and ensure that proper protections are in place. In this white paper, uncover 3 steps to managing shadow IT.
Posted: 09 Sep 2019 | Published: 09 Sep 2019

Cisco Umbrella

Smart Branch Connectivity and Security Done Simply
sponsored by Verizon
RESOURCE: In this solution brief, discover how Verizon Software Defined Secure Branch can help you digitize your business with a secure, reliable and flexible network.
Posted: 18 Sep 2019 | Published: 18 Sep 2019

Verizon

Top 10 IT security stories of 2018
sponsored by ComputerWeekly.com
EGUIDE: The discovery of the Meltdown and Spectre microprocessor vulnerabilities, and several similar vulnerabilities in the months that followed, were probably the single most challenging developments for enterprise IT security teams in 2018. Here's a look back over Computer Weekly's top 10 IT Security stories of 2018.
Posted: 10 Oct 2019 | Published: 10 Oct 2019

ComputerWeekly.com

Ransomware Made MSPeasy: The MSP’s Guide to Saving the Day
sponsored by Datto, Inc.
EBOOK: Download this e-book for an up-to-date look at the current state of ransomware and today’s ransomware strains, as well as guidance on educating your customers about ransomware and adding security tools to your services portfolio.
Posted: 14 Oct 2019 | Published: 14 Oct 2019

Datto, Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement