IT Management  >   Systems Operations  >   Security  >  

Security Administration

RSS Feed   
Security Administration Reports
 
Getting Started with DevSecOps
sponsored by ZeroNorth
WEBCAST: Collaboration between development and security teams is key to DevSecOps transformation and involves both cultural and technological shifts. In this webcast, Andrei Bezdedeanu, ZeroNorth VP of Engineering, discusses how to get started with DevSecOps and the resulting benefits.
Posted: 09 Sep 2019 | Premiered: Sep 9, 2019

ZeroNorth

Make Sure Your Organization is Mature Enough for SOAR
sponsored by IBM
ANALYST REPORT: A SOAR platform is a valuable tool for organizations who have made appropriate investments in their security operations processes. This recent research from Gartner looks at the necessary preparations that security leaders need to make so that the deployment of a SOAR solution will improve the efficiency of their incident response.
Posted: 25 Sep 2019 | Published: 27 Mar 2019

IBM

Top 10 IT security stories of 2018
sponsored by ComputerWeekly.com
EGUIDE: The discovery of the Meltdown and Spectre microprocessor vulnerabilities, and several similar vulnerabilities in the months that followed, were probably the single most challenging developments for enterprise IT security teams in 2018. Here's a look back over Computer Weekly's top 10 IT Security stories of 2018.
Posted: 10 Oct 2019 | Published: 10 Oct 2019

ComputerWeekly.com

Security Visibility for Cloud Environments: Webinar
sponsored by CloudPassage
WEBCAST: In this webcast, cybersecurity experts Carson Sweet, CloudPassage CEO and founder, and Holger Schulze, Cybersecurity Insiders CEO and founder, will discuss technical factors and operational approaches for successfully achieving continuous, automated risk visibility when adopting public cloud infrastructure.
Posted: 19 Sep 2019 | Premiered: Sep 19, 2019

CloudPassage

Human Factor Report 2019
sponsored by Proofpoint
ANALYST REPORT: Threat actors attack cloud applications, leverage increasingly robust multi-purpose malware and seek out new ways to steal both money and data directly. In this Proofpoint 2019 human factor report, discover key findings, like who within an organization is being attacked, and more.
Posted: 09 Oct 2019 | Published: 12 Mar 2019

Proofpoint

Securing the Web Perimeter
sponsored by Cloudflare
WHITE PAPER: In this white paper, learn how WordPress, VPNs, outdated TLS, and web apps built with modern stacks can increase the risk of security breaches and how to reduce that risk.
Posted: 04 Oct 2019 | Published: 04 Oct 2019

Cloudflare

A DevSecOps Guide
sponsored by Aqua Security
WHITE PAPER: After understanding the value of a DevOps mindset, making the cultural shift and reaping the benefits, many companies are aiming for the next big step: integrating development, operations, and security into one organization. In this white paper, learn how to successfully implement DevSecOps in your organization.
Posted: 27 Sep 2019 | Published: 27 Sep 2019

Aqua Security

Introduction to DevSecOps
sponsored by Contrast Security
WHITE PAPER: Gartner has named DevSecOps one of their fastest-growing areas of interest and predicts that DevSecOps will be embedded into 80% of rapid development teams by 2021. In this white paper, explore 4 core practices to any DevSecOps initiative.
Posted: 18 Oct 2019 | Published: 18 Oct 2019

Contrast Security

Enel Case Study: Securing Global Power Generation Network
sponsored by Nozomi Networks
CASE STUDY: Electric energy operators are working to increase the reliability and cyber resiliency of their systems. This includes Enel, a global power company. In this case study, learn how Enel was able to monitor, troubleshoot, and protect its industrial control network from a central location with the help of Nozomi Networks.
Posted: 27 Sep 2019 | Published: 27 Sep 2019

Nozomi Networks

Tech-Savvy English Public School Streamlines Office 365 Security
sponsored by Barracuda
CASE STUDY: Download this case study to learn how IT Director Tony Whelton was ultimately able to provide the Wellington College’s students and staff with more flexible, secure notebook protection without straining IT budget or resources.
Posted: 09 Oct 2019 | Published: 09 Oct 2019

Barracuda
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement