IT Management  >   Systems Operations  >   Security  >  

Security Administration

RSS Feed   
Security Administration Reports
 
Altr's Blockchain-Based Tokenization Provides Transformative Reduction of PCI Scope
sponsored by ALTR
PRODUCT OVERVIEW: Merchants and issuers across the payments space are working to reduce the amount of PCI-sensitive data they store and the number of systems that touch that data, but this can be difficult across legacy systems. In this resource, learn how ALTR Protect can easily integrate into existing infrastructure to ensure that any type of data is protected.
Posted: 11 Jun 2019 | Published: 11 Jun 2019

ALTR

How to Protect Against Today's #1 Security Risk: Employees
sponsored by TeleApps
WHITE PAPER: It is important to offer a compelling and engaging employee experience (EX) to attract top employees. However, organizations must remember that just as demand for positive EX is growing – so are security risks. In this white paper, explore the needs of modern workers, the security risks that come with that and how your business can stay protected.
Posted: 20 Jun 2019 | Published: 20 Jun 2019

TeleApps

2019 Cyberthreat Defense Report
sponsored by Gigamon
ANALYST REPORT: In this 2019 Cyberthreat Defense Report, learn about the latest trends for the frequency & impact of cyberattacks, the adequacy of organizational security postures, the greatest barriers to establishing strong defenses, and more.
Posted: 04 Jun 2019 | Published: 04 Jun 2019

Gigamon

Discovering the Unknown Unknowns
sponsored by BT
RESOURCE: Digital transformation and moving to the cloud can be difficult for customers but exciting for hackers. Although major providers seek to maintain security, enterprise requirements are complex. In this article, learn why organizations should continuously review their estate to ensure that changes or policies don't have undesired consequences.
Posted: 07 Jun 2019 | Published: 31 May 2019

BT

A Definitive Guide to Understanding and Meeting the CIS Critical Security Controls
sponsored by Rapid7
WHITE PAPER: The CIS controls supplement almost every other security framework and are a useful base for developing or assessing your security. However, with many methods out there for meeting them, implementing these controls can be a daunting project. This white paper will help you better understand how to approach and implement each of the key controls.
Posted: 25 Jun 2019 | Published: 25 Jun 2019

Rapid7

Selecting the Right SOC Model for Your Organization
sponsored by Gigamon
RESEARCH CONTENT: When selecting the right SOC model for your business, taking into account current risks, threats and business objectives is absolutely critical. Get the Gartner report Selecting the Right SOC Model for Your Organization and decide for yourself which one makes the most sense for your company.
Posted: 11 Jun 2019 | Published: 18 Sep 2018

Gigamon

Cybersecurity Benchmarking & Security Performance Management
sponsored by BitSight
WHITE PAPER: A new, data-driven security performance management approach is required to maintain security, minimize risk, and reduce costs. The key component of this new data-driven approach is the security rating. In this white paper, explore how the approach can be applied to security performance management, benchmarking and reporting.
Posted: 22 May 2019 | Published: 22 May 2019

BitSight

5 Ways CIOs Can Optimize Communication With Other Executives
sponsored by BitSight
WHITE PAPER: Despite the fundamental importance of information technology and security, many organizations continue to treat it as separate from the rest of the organization. In this white paper, explore 5 ways CIOs can optimize communication with other executives to help strengthen an organization's security.
Posted: 23 May 2019 | Published: 23 May 2019

BitSight

Turbocharge ITOps Productivity for Security and Efficiency
sponsored by BMC
WHITE PAPER: It's simply not possible to address the security risks and management challenges posed by today's infrastructures using manual methods. Operations and security teams need automation—and they need it badly. In this white paper, learn how to empower your team with integrated automation.
Posted: 15 May 2019 | Published: 15 May 2019

BMC

How to Survive Advanced Targeted Attacks
sponsored by enSilo
CASE STUDY: Beverage companies' data is constantly on the radar of competitors and threat actors looking to steal or maliciously modify ingredients in data breaches. In this case study, learn how one beverage company was able to discover over 300 potential threats and unauthorized programs running on their endpoint by installing enSilo.
Posted: 21 May 2019 | Published: 21 May 2019

 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement