IT Management  >   Systems Operations  >   Security  >  

Management of Security Information

RSS Feed   
Management of Security Information Reports
 
Cybersecurity: The Human Challenge
sponsored by Sophos
ANALYST REPORT: If your organization is looking for a direction to turn in regarding cybersecurity, then it may help to see what others have been prioritizing. View this Sophos report to learn perspectives from 5,000 IT managers across 26 countries. It will provide brand new insights into the state of cybersecurity skills and resources across the globe.
Posted: 23 Nov 2020 | Published: 30 Oct 2020

Sophos

Building a Basis of Trust and Transparency
sponsored by Onegini
CASE STUDY: When the Netherlands’ oldest independent wealth manager took steps towards the future, they did so with great consideration for their clients’ best interests. They explored ways to serve their clients with mobile apps, which factored in IAM. View this case study to see how Van Lanschot was able to secure a robust mobile IAM platform.
Posted: 13 Nov 2020 | Published: 13 Nov 2020

Onegini

Reduce API Security Risks with Automated and Continuous API Scanning
sponsored by WhiteHat Security
WEBCAST: Digital businesses have widespread API usage, making it easier for organizations to share data and integrate with customer applications. However, APIs have increasingly become a target for attackers, leading to many serious data breaches in recent past. How do we reduce API security risks? View this webcast to learn why testing may be the key.
Posted: 20 Nov 2020 | Premiered: Jul 15, 2020

WhiteHat Security

How a Top Financial Firm Scaled Their Application Security Program & Accelerated Their Digital Transformation
sponsored by WhiteHat Security
CASE STUDY: A top 10 U.S. bank was faced with the challenges of scaling application security automation, regulatory compliance and triaging false positives from an automated scanner. And after factoring in time and budget constraints, it’s clear that this was a tall mountain to climb. Read this case study to see how they reached the top.
Posted: 19 Nov 2020 | Published: 19 Nov 2020

WhiteHat Security

Covid-19 Lessons Learned—Business Continuity Management
sponsored by ServiceNow
WHITE PAPER: Regardless of whether an organization had a business continuity management (BCM) program in place prior to COVID-19, 2020 has been a learning experience for the shortcomings of most BCM programs. This white paper highlights common oversights and lessons learned regarding BCM in the era of COVID-19 – read on to get started.
Posted: 11 Nov 2020 | Published: 11 Nov 2020

ServiceNow

Securing Azure Environments: Insights from PetSmart, Microsoft & Barracuda
sponsored by Barracuda
VIDEO: Microsoft Azure plays an important role in many organizations’ digital transformation initiatives. As such, it becomes critical to understand the capabilities, limitations and potential benefits of Azure. Watch this webinar to gain insights into Azure from experts at PetSmart, Microsoft and Barracuda.
Posted: 23 Nov 2020 | Premiered: 23 Nov 2020

Barracuda

A Security Engineer’s Nightmare
sponsored by Cribl.io
WHITE PAPER: For security pros, preventing breaches and ensuring data privacy is hectic enough – having an incompetent system on top of these challenges can introduce new levels of stress. Read this white paper to learn how Cribl is helping security engineers log information and incidents so they can focus their efforts on more important tasks.
Posted: 19 Nov 2020 | Published: 19 Nov 2020

Cribl.io

Key Findings from the Verizon 2020 Payment Security Report
sponsored by Verizon
RESOURCE: In this infographic, discover a brief overview of the key features and findings from Verizon’s 2020 Payment Security Report (PSR) – which aims to illuminate the challenges business leaders are facing related to the payment industry, compliance, PCI DSS and more.
Posted: 12 Nov 2020 | Published: 12 Nov 2020

Verizon

7 Habits of Highly Effective SOCs
sponsored by Expel
WHITE PAPER: Because so many organizations are having to alter their security posture, many of them are building security operations centers (SOCs) to increase visibility and perform security analytics for best practice development. So what makes a highly effective SOC? Read this white paper to learn 7 key principles to make your SOC more productive.
Posted: 11 Nov 2020 | Published: 11 Nov 2020

Expel

Access & Protect your Data – Anywhere, Anytime
sponsored by HelpSystems
DATA SHEET: In this brief, learn how Titus and Dataguise can help bring together the most comprehensive approach to data protection to enable you to intelligently detect and secure your most valuable and vulnerable data wherever it resides.
Posted: 24 Nov 2020 | Published: 24 Nov 2020

HelpSystems
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info