IT Management  >   Systems Operations  >   Security  >  

Management of Security Information

RSS Feed   
Management of Security Information Reports
 
The Enterprise Technology Orchestration Guide To Infosec
sponsored by Oomnitza
WHITE PAPER: The security aspect of IT asset management (ITAM) cannot be understated. Especially today – when resources are spread out and harder to keep an eye on. Technology orchestration gives your enterprise the opportunity to let IT take care of itself, tightening security and simplifying management. View this white paper to learn more.
Posted: 22 Apr 2021 | Published: 22 Apr 2021

Oomnitza

Protecting APIs and Securing Applications So Business Can Thrive
sponsored by Radware
RESEARCH CONTENT: Nearly every organization relies on applications to connect with customers, business partners, suppliers and staff. As a result, the application and API threat landscape has evolved dramatically. Read this research report for a closer look at the state of application and API security, including top threats, best practices and more.
Posted: 26 Jan 2021 | Published: 26 Jan 2021

Radware

Cloud networks: Shifting into hyperdrive
sponsored by Barracuda
RESEARCH CONTENT: As organizations continue to radically transform and modernize their infrastructures, public cloud usage continues to soar. However, the evolution of public cloud isn’t without its own set of operational constraints and security concerns. Read this research report for a deep dive into modern public cloud networks.
Posted: 26 Jan 2021 | Published: 26 Jan 2021

Barracuda

Women Building Careers in Cybersecurity
sponsored by WhiteHat Security
WEBCAST: According to a recent study, women make up nearly half of the adult workforce in the US yet hold only a quarter of technology positions – a number that dwindles as you move up the leadership ladder. Watch this webinar and join a panel of women leaders in the tech industry as they discuss their experiences, challenges and accomplishments.
Posted: 15 Dec 2020 | Premiered: Oct 15, 2020

WhiteHat Security

The Total Economic Impact™ Of ServiceNow Security Operations
sponsored by ServiceNow
ANALYST REPORT: With the growing complexity and volume of cyberattacks, organizations will become more vulnerable to security threats. You need security orchestration tools that can connect security and IT teams for faster and more efficient response to security incidents. Access this Forrester report to get the facts on ServiceNow’s Security Operations.
Posted: 12 Feb 2021 | Published: 30 Oct 2020

ServiceNow

Whitehat Security Webinar
sponsored by WhiteHat Security
WEBCAST: Dynamic Application Security Testing (DAST) enables AppSec teams with the ability to assess and address the actual risk of their applications – providing critical security capabilities to support DevSecOps initiatives. Watch this webinar to learn more about DAST and how it can support your AppSec goals.
Posted: 10 Dec 2020 | Premiered: Dec 10, 2020

WhiteHat Security

The CISO's guide to supply chain security
sponsored by ComputerWeekly.com
EGUIDE: Supply chain attacks have long been a concern in cyber security circles as it can be difficult to enforce security measures for suppliers and partners. In this e-guide, find out why supply chain attacks are intensifying amid the pandemic, how companies are responding to the attacks and what else organisations can do to disrupt the cyber kill chain.
Posted: 04 Jul 2021 | Published: 05 Jul 2021

ComputerWeekly.com

A Computer Weekly buyer's guide to SIEM and SOAR
sponsored by ComputerWeekly.com
EGUIDE: The question of how to use data has big implications on a company's performance. In this 16-page buyer's guide, Computer Weekly looks at how SIEM and SOAR tools assist IT teams, why security tools require strong internal security processes to work effectively and what role they have in a rapidly changing cyber threat landscape.
Posted: 09 Sep 2021 | Published: 09 Sep 2021

ComputerWeekly.com

Ransomware The Rapidly Evolving Trend
sponsored by BitSight
EBOOK: In this BitSight white paper, understand the statistics behind ransomware use and its development from the outbreak of COVID-19 to now. Read to see the ransomware kill chain in action, how it’s knocked security leaders on their heels, and what can be done going forward (and how BitSight’s risk module can help you do it.)
Posted: 20 Oct 2021 | Published: 20 Oct 2021

BitSight

Computer Weekly - 24 August 2021: How datacentre power growth is leaving Dublin in distress
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at the challenges faced by Dublin's datacentre sector, as growth leaves the city's electricity infrastructure creaking. We ask whether recent initiatives to close the UK's digital skills gaps are working. And we examine the latest injustice to hit the Post Office Horizon scandal. Read the issue now.
Posted: 20 Aug 2021 | Published: 24 Aug 2021

ComputerWeekly.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2022, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences