IT Management  >   Systems Operations  >   Security  >  

Management of Security

RSS Feed   
Management of Security Reports
Are You Protected Against Burst Attacks?
sponsored by Radware
RESOURCE: In this resource, get a step-by-step breakdown of burst attack detection and prevention, then learn why a system that combines on-premise and in-the-cloud protection is the best way to defend against burst attacks.
Posted: 06 Mar 2018 | Published: 15 Feb 2018


Next-generation Vulnerability Management
sponsored by Skybox Security
WHITE PAPER: 49% of security professionals say their network is at least somewhat vulnerable to security threats and eliminating vulnerabilities is a continuous battle. This white paper explores the processes of the vulnerability management lifecycle, reviews current areas of deficiency and introduces next-generation vulnerability management.
Posted: 07 Feb 2018 | Published: 07 Feb 2018

Skybox Security

The McGill University Health Centre (MUHC) Strengthening Its Security Posture With In-Depth Global Intelligence
sponsored by IBM
CASE STUDY: Find out how the McGill University Health Center (MUHC) responds to potential threats, and protects electronic patient information and network operations.
Posted: 02 Mar 2018 | Published: 31 Jul 2015


The General Data Protection Regulation: Key Themes and Challenges
sponsored by Forcepoint
WHITE PAPER: Read this white paper to explore 3 major misconceptions about the GDPR, and uncover 5 key steps to help your organization perform a basic assessment of its data protection capabilities. Then, discover an approach that can help you get in line with the GDPR in 3 core areas.
Posted: 25 Jan 2018 | Published: 25 Jan 2018


Create Trusted IoT, Become the King of Sweden?
sponsored by Radware
RESOURCE: Click inside to learn about the opportunities providers have to secure vulnerabilities in IoT devices that may have been overlooked by manufacturers.
Posted: 08 Mar 2018 | Published: 25 Jan 2018


Cyber Security Framework Checklist
sponsored by Lynx Technology Partners
RESOURCE: This resource will walk you through creating your own IT risk program that follows the key elements of the NIST Cyber Security Framework. As an added bonus, uncover 3 reminders for establishing security best practices.
Posted: 07 Feb 2018 | Published: 07 Feb 2018

Lynx Technology Partners

The Second Annual Study on the Cyber Resilient Organization
sponsored by IBM Resilient
RESEARCH CONTENT: In this Ponemon Institute report, take a look at organizations that believe they have achieved a very high level of cyber resilience and compare them to organizations that believe they have achieved only an average level of cyber resilience.
Posted: 09 Mar 2018 | Published: 31 Jan 2017

IBM Resilient

Mobile security moving to a unified approach
sponsored by
EGUIDE: This e-guide offers expert insights into how the current trends in mobile security strategy are showing a move from mobile device management, to enterprise mobile management and unified endpoint management, which indicates a move towards a unified approach to mobile security.
Posted: 28 Feb 2018 | Published: 28 Feb 2018

2018 Security Predictions
sponsored by Forcepoint
WHITE PAPER: This report predicts that the intersection of people, critical data, and IP will drive major security shifts coming in 2018. Read on to learn the 8 predictions.
Posted: 30 Jan 2018 | Published: 29 Dec 2017


Deception Matters: Slowing Down the Adversary
sponsored by Illusive Networks
WHITE PAPER: Access this SANS review to learn about the key benefits of deception technology and how to successfully deploy it in your network security strategy.
Posted: 12 Feb 2018 | Published: 31 May 2017

Illusive Networks

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement