IT Management  >   Systems Operations  >   Security  >  

Management of Security

RSS Feed   
Management of Security Reports
 
Getting Started with Zero Trust: Never Trust, Always Verify
sponsored by Okta
WHITE PAPER: As organizations continue to rely on remote workforces and mobile devices, formal perimeters are vanishing, and traditional security measures are no longer reliable. This white paper explores the shifts in the security landscape that led to the creation of zero-trust and how organizations can implement a zero-trust program.
Posted: 06 Dec 2019 | Published: 06 Dec 2019

Okta

Anatomy of Magecart Attacks
sponsored by PerimeterX
WEBCAST: Magecart is an umbrella name for cybercriminal groups practicing digital skimming, that hack their way into your customers credit card details, but what makes these attacks so unique? In this webinar, join industry experts at PerimeterX as they explore the anatomy and impacts of magecart skimming attacks.
Posted: 11 Dec 2019 | Premiered: Dec 11, 2019

PerimeterX

The ROI of Security Awareness Training
sponsored by Mimecast
WHITE PAPER: When it comes to developing a security strategy to protect your organization’s sensitive data, it’s critical to consider both the people within your environment as well as the technology. In this white paper, review the results of in-depth research recently conducted by Osterman Research and discover the need for security awareness programs.
Posted: 11 Dec 2019 | Published: 31 Aug 2019

Mimecast

Adding Advanced Capabilities into Today's SOC
sponsored by Optiv
ANALYST REPORT: View IDC’s Technology Spotlight, sponsored by Optiv Security, to gain a deeper understanding of enterprise SecOps challenges, key SOC market trends, advanced capabilities in a SOC, and more.
Posted: 05 Dec 2019 | Published: 05 Dec 2019

Optiv

Is Noise Pollution Making Your Data Less Secure?
sponsored by F5 Networks
WHITE PAPER: Automated attacks are increasing in frequency and sophistication, with about 77% of web attacks starting from botnets. With the increasing volume of cyberattacks, it’s critical for organizations to ensure accurate logs. Continue to this article to uncover the importance of logging and how F5’s Advanced WAF service can help.
Posted: 04 Dec 2019 | Published: 04 Dec 2019

F5 Networks

Transforming Cybersecurity Strategy for the Age of IoT
sponsored by Forescout
WHITE PAPER: In a recent study, the Forescout Research Team looks to better understand the current risks and threats by looking at the IoT in a smart building. The report outlines 3 strategies an attacker might use and discusses ways to mitigate them. Read on to dive deeper into the key findings.
Posted: 15 Nov 2019 | Published: 15 Nov 2019

Forescout

How to Prevent Data Theft from Departing Employees
sponsored by ActivTrak
RESOURCE: When it comes to cybersecurity, many organizations look to bolster their defenses against external threats, while overlooking some of the internal threats posed by departing employees. In this article, uncover the 5 steps your organization should consider for protection from internal data theft.
Posted: 10 Dec 2019 | Published: 02 Dec 2019

ActivTrak

Rethinking Enterprise Data Defense
sponsored by FireMon
EBOOK: Despite heavy investment of time and resources, the number of cybersecurity breaches and incidents continues to increase each year. In this e-book discover how to rethink your enterprise security strategy and explore proactive defense tactics.
Posted: 27 Nov 2019 | Published: 27 Nov 2019

FireMon

Isolation: Separating Malware from the Network, Not Devices
sponsored by Menlo Security
WHITE PAPER: As data breaches grow increasingly common, the need for network security has become essential. Many organizations are adopting separation tactics to protect their network, but what if there was a better way to protect your endpoints? In this white paper, go in-depth into the benefits and faults of isolation and network separation.
Posted: 26 Nov 2019 | Published: 26 Nov 2019

Menlo Security

Decoding Customer IAM (CIAM) vs. IAM
sponsored by Okta
WHITE PAPER: While most organizations can agree that identity and access management (IAM) is essential to data protection, there is a split between those who adopt broad IAM and customer-focused IAM (CIAM). This white paper provides an overview of IAM and CIAM and highlights the key similarities and differences between them.
Posted: 06 Dec 2019 | Published: 06 Dec 2019

Okta
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement