IT Management  >   Systems Operations  >   Security  >  

Management of Security

RSS Feed   
Management of Security Reports
 
Laying the Foundation for GDPR Compliance
sponsored by SentryOne LLC
WHITE PAPER: The GDPR is in effect but, many businesses are still struggling with how to properly implement protections across systems and processes. This white paper discusses the 4 key rights that European citizens have under GDPR, and what businesses need to do to ensure they are GDPR compliant.
Posted: 12 Mar 2019 | Published: 12 Mar 2019

SentryOne LLC

Security Investigation, Detection & Rapid Response with Splunk Enterprise
sponsored by Splunk Services UK Ltd
WHITE PAPER: Investigation and rapid response is critical for day-to-day alert handling. The faster a threat and its impact can be detected and investigated, the faster an organization can take action. In this white paper, learn about how the Splunk platform enables organizations to understand their potential security threats and take the necessary actions.
Posted: 20 Feb 2019 | Published: 20 Feb 2019

Splunk Services UK Ltd

Crowdstrike Falcon Complete:How To Achieve Instant Cybersecurity Maturity For Organizations Of All Sizes
sponsored by CrowdStrike
WHITE PAPER: The shortage of cybersecurity resources and expertise can lead organizations to struggle with implementing the security technology they acquire. In this white paper, learn how CrowdStrike Falcon Complete can solve these challenges by combining Falcon endpoint protection platform with a dedicated team of security professionals.
Posted: 06 Mar 2019 | Published: 06 Mar 2019

CrowdStrike

Fraud Prevention
sponsored by Riskified
WHITE PAPER: For online retailers, CNP fraud is a serious problem that will only get larger as the eCommerce market continues to grow. Despite this harsh reality, senior management isn't giving this issue the attention that it deserves. In this white paper, learn about the value of fraud management operations.
Posted: 14 Mar 2019 | Published: 14 Mar 2019

Riskified

Secure Print Services Are Key to Digital Transformation
sponsored by HP
RESOURCE: Today's digital technologies mean every device connected to the network is potentially an endpoint security risk—including printers and print infrastructure. In this article, learn how to protect your print environment from threats.
Posted: 14 Mar 2019 | Published: 14 Mar 2019

HP

Revitalizing Privacy and Trust in a Data-Driven World
sponsored by Micro Focus & PwC
RESEARCH CONTENT: Many organizations worldwide are not doing all they can to protect privacy. Privacy risk management needs reinvigoration and stronger integration with cybersecurity.This report draws on key findings from the 2018 Global State of Information Security Survey to offer 9 tips on revitalizing privacy and trust in a data-driven world.
Posted: 11 Mar 2019 | Published: 11 Mar 2019

Micro Focus & PwC

Hacker-Powered Pen Tests and the Power of More
sponsored by HackerOne
WHITE PAPER: Like traditional penetration testing, a hacker-powered pen test like the HackerOne Challenge program runs for a fixed time period. But it also brings to bear the skills of up to thousands of hackers who probe your web applications for vulnerabilities. In this white paper, learn about the advantages of HackerOne Challenge.
Posted: 06 Mar 2019 | Published: 06 Mar 2019

HackerOne

2019 Report: State of the Phish
sponsored by Proofpoint
RESEARCH CONTENT: Proofpoint complied and analyzed data from tens of millions of simulated phishing emails sent to end users. They also ran surveys with end-users and infosec professionals. Download the report to discover key findings form their research and recommendations to better protect your organizations from phishing attacks.
Posted: 21 Feb 2019 | Published: 21 Feb 2019

Proofpoint

Best Practices for Endpoint Detection and Response
sponsored by Trend Micro, Inc.
RESOURCE: A key factor to consider with enterprise security efforts is the array of different endpoints connected to and communicating through the network. With the rise of BYOD and enterprise mobility, endpoint protection and associated data security has become much more complex. In this resource, learn about endpoint detection and response.
Posted: 25 Feb 2019 | Published: 24 Oct 2018

Trend Micro, Inc.

NIST Cybersecurity Framework
sponsored by One Identity
WHITE PAPER: This white paper provides an overview of the NIST Cybersecurity framework, an internationally widespread collection of best practices on how organizations should develop and upgrade their IT security infrastructure.
Posted: 18 Mar 2019 | Published: 18 Mar 2019

One Identity
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement