IT Management  >   Systems Operations  >   Security  >  

Network Security Audits

RSS Feed   
Network Security Audits Reports
 
Security Big Data: Preparing for a Big Data Collection Implementation
sponsored by SearchSecurity.com
EBOOK: This expert e-guide from SearchSecurity.com offers realistic advice to help your enterprise information security team understand what technology and processes must be in place in order to properly and securely take advantage of big data.
Posted: 13 Jun 2013 | Published: 13 Jun 2013

SearchSecurity.com

Get the Message: Why Secure Texting in Healthcare Matters
sponsored by SearchHealthIT.com
EBOOK: Texting is convenient -- but HIPAA regulations require organizations to consider the security of PHI. Get tips for instituting secure texting in healthcare.
Posted: 02 Feb 2016 | Published: 29 Jan 2016

SearchHealthIT.com

Resolve Web Security Issues with Industry Experts' Advice
sponsored by Veracode, Inc.
EGUIDE: Learn how to bridge the communication divide between app developers and security pros, as well as foster secure coding practices in your enterprise to mitigate the vulnerabilities in your web applications.
Posted: 22 May 2017 | Published: 18 May 2017

Veracode, Inc.

E-Guide-- Risk-Based Audit Methodology: How to Achieve Enterprise Security
sponsored by IBM
EGUIDE: Read this e-guide to learn about a simple risk-based audit methodology for organizations to develop an internal IT audit program, or those looking for new ways to assess security risks.
Posted: 03 Nov 2010 | Published: 25 Oct 2010

IBM

Security Rating Scores for Third-Party Vendors Catching On
sponsored by BitSight
EGUIDE: In this e-guide discover why implementing security rating scores for third-party vendors is catching on, and if their impact is showing to be an overall positive one for the industry.
Posted: 23 Feb 2017 | Published: 15 Feb 2017

BitSight

Keep Cloud Compliant
sponsored by SearchCompliance.com
EBOOK: Access this expert handbook for key information on how to ensure the move to cloud still meets today's compliance and security guidelines.
Posted: 23 Sep 2013 | Published: 23 Sep 2013

SearchCompliance.com

Database Security Audit and Protect Critical Databases
sponsored by Imperva
WHITE PAPER: Databases store extraordinarily valuable and confidential data. An increasing number of compliance regulations compel organizations to audit access to this sensitive data and protect it from attack and abuse.
Posted: 04 Feb 2011 | Published: 04 Feb 2011

Imperva

E-Guide: Monitoring Strategies for Insider Threat Detection
sponsored by IBM
EGUIDE: In this e-guide, you will learn about practical strategies for implementing insider threat detection tools. Also covered in this e-guide are the three common types of insider crimes and how each one requires its own set of insider threat detection tactics. Read on to learn more about monitoring strategies for insider threat detection.
Posted: 22 Mar 2011 | Published: 22 Mar 2011

IBM

Building an Application Security Program: Why Education is Key
sponsored by tCell
EGUIDE: Gain insight into what an application security program might look like as it develops and what experts have to say about what it could mean for the future of application development.
Posted: 28 Mar 2017 | Published: 28 Mar 2017

tCell

CORE IMPACT Pro V10
sponsored by Core Security Technologies
PRODUCT DEMO: Please join Core Security for a live demonstration of CORE IMPACT Pro, the most comprehensive product for performing security assurance testing on an organization’s network systems, endpoint systems, end users and web applications.
Posted: 30 Dec 2009 | Premiered: 30 Dec 2009

Core Security Technologies
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement