IT Management  >   Systems Operations  >   Security  >  

Managing IT Security

RSS Feed   
Managing IT Security Reports
 
SLED - 3 Easy Ways to Secure Your K-12 School District
sponsored by Cisco Umbrella
RESOURCE: Deployed in 3 simple steps, Cisco Umbrella secures your entire school district in minutes. Easily protect students and staff against phishing attacks, filter content, and gain visibility into all activity, on or off-campus. Download this infographic to learn more.
Posted: 14 Feb 2020 | Published: 14 Feb 2020

Cisco Umbrella

Cryptomining - How Cryptocurrency is Changing Cyber Security
sponsored by Cisco Umbrella
WEBCAST: The introduction of cryptocurrencies has changed the cyber threat landscape. New varieties of ransomware in the form of cryptojacking, mining, and exchange phishing are plaguing today’s businesses. In this episode of ‘A Cybersecurity Technical Mini Series’, learn how you can stay protected.
Posted: 13 Feb 2020 | Premiered: Dec 16, 2019

Cisco Umbrella

Taking A “Prevent and Protect” Approach to Insider Data Breaches
sponsored by Egress Software Technologies Inc
VIDEO: As cyberattacks become occur more frequently than ever, organizations need to ensure their security efforts are focused on protecting from both external & internal threats. In this video, join the CPO of Egress in an overview of how an email security strategy can enhance regulatory compliance, reduce costs & increase profitability.
Posted: 03 Feb 2020 | Premiered: 23 Oct 2019

Egress Software Technologies Inc

CW Nordics February-April 2020: Swedes lose faith in social media as data security fears increase
sponsored by ComputerWeekly.com
EZINE: Swedish citizens are becoming more concerned about the activities of social media companies and are reducing their online interaction with them as a result.
Posted: 14 Feb 2020 | Published: 27 Feb 2020

ComputerWeekly.com

CIS Critical Security Controls Evaluation Guide
sponsored by Absolute Software Corporation
WHITE PAPER: The Center for Internet Security (CIS) Critical Security Controls have become a trusted resource for organizations looking to identify threats and enhance security. This evaluation guide measures the Absolute Platform against the CIS Top 20 Critical Security Controls to illustrate its capabilities.
Posted: 14 Feb 2020 | Published: 02 Nov 2018

Absolute Software Corporation

Australian Insurance provider establishes comprehensive risk management program
sponsored by ServiceNow
CASE STUDY: In this case study, follow the journey of MLC Life Insurance, a leading Australian insurance provider, as they partner with ServiceNow to develop & implement a comprehensive digital strategy that enables them to enhance customer experience while establishing governance, risk & compliance controls.
Posted: 05 Feb 2020 | Published: 30 Nov 2018

ServiceNow

Protecting Your Organization with Strong Security Controls
sponsored by OneNeck IT
WHITE PAPER: The Center for Internet Security (CIS) developed a standardized approach and set of best practices for businesses to use to identify their specific security requirements and develop a security strategy. This approach is known as the CIS Controls approach. Download this white paper to unlock the industry expertise outlined in the CIS Controls.
Posted: 12 Feb 2020 | Published: 12 Feb 2020

OneNeck IT

Roper Pump Enhances Security Posture with Arctic Wolf’s SOC-as-a-Service
sponsored by Arctic Wolf Networks, Inc.
CASE STUDY: The Roper Pump team had multiple reasons to ramp up their security program: they own a vast amount of intellectual property, allowing them to be first to market and stay ahead of their competition. In this case study, follow Roger Pump’s journey towards network visibility & data protection.
Posted: 31 Jan 2020 | Published: 31 Jan 2020

Arctic Wolf Networks, Inc.

SIEM Buyer’s Guide
sponsored by DomainTools
WHITE PAPER: SIEM programs have become a critical part of the way organizations are able to monitor their network and mitigate potential risks. Is your organization interested in SIEM? Download this buyer’s guide and take a closer look at what defines SIEM, who uses it and an evaluation checklist for selecting the right solution.
Posted: 03 Feb 2020 | Published: 03 Feb 2020

DomainTools

Detecting Malicious Domains Using Artificial Intelligence and Machine Learning
sponsored by DomainTools
WHITE PAPER: As cybercriminals deploy more sophisticated attack methods to avoid detection, organizations need to ensure their security tactics can evolve at the pace of these threats. Download this white paper to take a closer look at how machine learning & AI can bolster your security by detecting malicious activity across various domains.
Posted: 03 Feb 2020 | Published: 03 Feb 2020

DomainTools
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info