IT Management  >   Systems Design and Development  >   Architectures  >  

Security Architectures

RSS Feed   
ALSO CALLED: Security Architecture
DEFINITION: That portion of computer architecture dealing with the security of the computer or network system.
Security Architectures Reports
1 - 25 of 637 Matches Previous Page  |  Next Page
The Definitive Email Security Strategy Guide: A People-Centric Approach
sponsored by Proofpoint
WHITE PAPER: With 94% of external cyber threats start with email, organizations need to ensure that their email security strategy can keep pace with this growing threat landscape. This white paper explores a new, people-centric approach to email security and provides you with a comprehensive guide for implementing this approach (including a checklist).
Posted: 05 Jun 2020 | Published: 05 Jun 2020

Proofpoint

Capsule8 for PCI Compliance
sponsored by Capsule8
PRODUCT OVERVIEW: As e-commerce becomes essential to the revenue stream of digital businesses, ensuring the PCI DSS compliance and securing cardholder data becomes increasingly critical. Download this solution brief and explore Capsule8’s Protect platform, designed to ensure security while easing PCI DSS compliance workload.
Posted: 05 Jun 2020 | Published: 05 Jun 2020


5 Best Practices for AWS Security Monitoring
sponsored by Sumo Logic AWS
WHITE PAPER: Cloud infrastructures and capabilities enable organizations to enhance their operations with improved scalability, agility and cost savings. However, security unfortunately remains a key pain point for cloud users. In this white paper discover a set of best practices designed to help protect sensitive data in AWS environments.
Posted: 05 Jun 2020 | Published: 05 Jun 2020

Sumo Logic AWS

The State of Mobile Phishing
sponsored by Lookout Inc.
WHITE PAPER: Each year, the mobile phishing becomes increasingly dangerous, causing disruptions across organizations of any size and in every industry. The following mobile phishing report examines the current state of these threats and explores their potential impacts as well as how to protect your organization against them. Read on to get started.
Posted: 05 Jun 2020 | Published: 13 May 2020

Lookout Inc.

Top 10 Considerations for GRC Software Tools
sponsored by Ostendio
RESOURCE: The GRC tool selection process is often flooded with an overwhelming amount of choices, made more difficult by confusing terminology and varied opinions. This article helps to break the problem down by providing a brief overview on why and how companies are using GRC as well as 10 questions to consider during the evaluating process.
Posted: 05 Jun 2020 | Published: 28 Jan 2020

Ostendio

Solution Brief: Best Practices for Secure Mobile Access
sponsored by SonicWall
PRODUCT OVERVIEW: As organizations shift towards digital workspaces, ensuring the protection of mobile devices becomes increasingly critical. The following solution brief provides a comprehensive set of best practices and practical steps to ensure your organization protects its mobile devices against modern threats.
Posted: 04 Jun 2020 | Published: 04 Jun 2020

SonicWall

How Can A Risk Management Platform Support Your Business During A Crisis?
sponsored by Ostendio
RESOURCE: While organizations may be anxious to return to work, it’s critical to keep in mind the lessons learnt about maintaining security and productivity during a crisis. Developing a solid crisis management plan can help with responding to future incidents. Read this article to uncover 6 key steps to help you get started.
Posted: 04 Jun 2020 | Published: 29 Apr 2020

Ostendio

DevSecOps vs. SecDevOps
sponsored by Acunetix
RESOURCE: Traditionally, DevOps processes don’t include security, which is why DevSecOps has risen in popularity recently. However, incorrect application security approaches lead some organizations to embrace SecDevOps instead. So, what are the differences between these two approaches?
Posted: 04 Jun 2020 | Published: 24 Sep 2019

Acunetix

Where Cybersecurity Frameworks Meet Web Security
sponsored by Acunetix
RESEARCH CONTENT: Contrary to popular belief, cybersecurity frameworks have proven success across organizations of any size. Cybersecurity frameworks provide organizations with controls, safeguards, activities, technology and planning necessary to respond to a variety of incidents. Read this article to explore popular cybersecurity frameworks.
Posted: 04 Jun 2020 | Published: 03 Sep 2019

Acunetix

Is Zoom just the tip of the iceberg?
sponsored by Ostendio
RESOURCE: The recent data privacy issues at Zoom, in addition to the Zenefits scandal in 2016, are indicative of a dangerous security trend, pushing those to question why Silicon Valley is failing to ensure that well-funded venture companies grow responsibly. The following article, written by the President and CEO of Ostendio, dives deeper into this issue.
Posted: 04 Jun 2020 | Published: 10 Apr 2020

Ostendio

How to Choose a SOC 2 Auditor: 6 Questions to Ask
sponsored by Ostendio
RESOURCE: For organizations looking to conduct a SOC 2 audit, choosing the right external audit firm can be a daunting, yet crucial, process. To make sure you choose the right partner, this article highlights 6 questions to consider during the selection process. Read on to find out what they are.
Posted: 04 Jun 2020 | Published: 27 Sep 2019

Ostendio

What is Security's Role in Digital Transformation?
sponsored by Rackspace
RESOURCE: When digital transformations first gained popularity, Gartner noticed a general lack of prioritization around security, predicting major service failures by 2020. Luckily, today, some 79% of global executives rank cyberattacks as one of their tip priorities. Read this article to learn more about the role of security in digital transformation.
Posted: 04 Jun 2020 | Published: 25 Feb 2020

Rackspace

AWS Security Review by Rackspace and Alert Logic
sponsored by Rackspace
RESOURCE: This infographic provides an overview of Rackspace and Alert Logic’s free cybersecurity review. The goal of the review is to establish a clear understanding of the vulnerabilities within your AWS environment and compare those with industry benchmarks. Read on to learn more about the benefits of participating and find answers to FAQs.
Posted: 04 Jun 2020 | Published: 04 Jun 2020

Rackspace

2020 SonicWall Cyber Threat Report
sponsored by SonicWall
WHITE PAPER: Each year is a constant struggle between cybercriminals attempting to conduct successful attacks and organizations defending their users and data. 2019 was a good year for organizations as malware attacks dropped by 6%. Read on to uncover key statistics and insights about last year’s cyberattack trends.
Posted: 04 Jun 2020 | Published: 04 Jun 2020

SonicWall

Web Application Vulnerability Report 2020
sponsored by Acunetix
WHITE PAPER: The threats that target web applications, websites and network perimeters change constantly. In order to provide relevant insights regarding these changes, Acunetix conducts an annual study to better understand these vulnerabilities. Download the full report to unlock the findings from 2020.
Posted: 04 Jun 2020 | Published: 04 Jun 2020

Acunetix

What Is DevSecOps and How Should It Work?
sponsored by Acunetix
RESOURCE: Poised to be the successor to DevOps, DevSecOps is a relatively new concept that aims to join the previously separate functions of DevOps and SecOps into a unified environment that provides conditions for secure application development. Read this article to learn more about DevSecOps, its history and how you can get started.
Posted: 03 Jun 2020 | Published: 20 Aug 2019

Acunetix

Modernize Your Approach to Compliance and Security
sponsored by Rackspace
RESOURCE: IT security and compliance are critical aspects for protecting today’s business environments. However, the global shortage of security professionals can make acquiring in-house cybersecurity expertise difficult. The following article provides expert guidance for overcoming today’s security and compliance challenges.
Posted: 03 Jun 2020 | Published: 03 Jun 2020

Rackspace

Phishing. The biggest threat to SMBs
sponsored by Crosskey Cyber Security
RESOURCE: Phishing emails are the most common threat to small and medium businesses, and their growing efficacy leads to increasingly costly disruptions. In the following article, you’ll find an overview of the signs of a phishing attack, specific examples of what these attacks look like and advice for how employees can protect themselves.
Posted: 03 Jun 2020 | Published: 03 Jun 2020

Crosskey Cyber Security

Successfully Scaling Cybersecurity for Remote Work: Keep the Cloud Your Safe Place
sponsored by Forcepoint
RESOURCE: As organizations work to enable and secure remote workers, it’s critical to keep in mind that having people work remotely can mean an increase in security threats. So, how can IT and security teams protect users and data without hurting productivity or morale? Read this article to find out.
Posted: 03 Jun 2020 | Published: 03 Jun 2020

Forcepoint

Successfully Scaling Cybersecurity for Remote Work: Protect Your People
sponsored by Forcepoint
RESOURCE: One of the key directives for today’s IT and security teams is to safeguard the users and data within their distributed environment and implement cyber defenses that can protect those users—regardless of their location or device. Read on to learn how to keep your remote workers secure against today’s internal and external threats.
Posted: 03 Jun 2020 | Published: 03 Jun 2020

Forcepoint

Executive Guide to the 2020 Global Threat Intelligence Report
sponsored by NTT
WHITE PAPER: COVID-19 has been a major disruption to nearly every aspect of life, and work environments are no exception. Organizations have had to adjust to a dramatic shift towards remote work and address the cyberattacks that ensue. To learn more about these cyberattacks, download this 2020 Global Threat Intelligence Report.
Posted: 02 Jun 2020 | Published: 02 Jun 2020

NTT

7 Cybersecurity KPIs That Security Analysts Should Focus On
sponsored by Acunetix
RESOURCE: Key performance indicators (KPIs) play a critical role in demonstrating the efficacy of cybersecurity methods and tools, justifying their costs to business leaders. However, there is an overabundance of KPIs, some of which isn’t worthwhile to consider. Read on to uncover 7 cybersecurity KPIs that security pros should focus on.
Posted: 02 Jun 2020 | Published: 06 Aug 2019

Acunetix

Current Cybersecurity Market Strong: What’s Driving It?
sponsored by Acunetix
RESOURCE: Each year, cybercriminals develop more elaborate ways to conduct attacks. And each year, organizations turn towards cybersecurity methods and tools to protect their sensitive data against cyberattacks. But when is enough security enough? Where is the cybersecurity market expected to go? Read this article to find out.
Posted: 02 Jun 2020 | Published: 24 Jun 2019

Acunetix

Trading Point Secures Returns with Rackspace
sponsored by Rackspace
CASE STUDY: In this case study, follow Trading Point, an internationally regulated financial institution, as they partner with Rackspace to address security and scalability concerns related to their internal system and transform their infrastructure.
Posted: 02 Jun 2020 | Published: 02 Jun 2020

Rackspace

Executive Brief: The Dark Side of Encryption
sponsored by SonicWall
WHITE PAPER: Encryption plays a key role in providing security for digital interactions. However, these encryption protocols can also serve as a lucrative vector for cybercriminals, allowing them to gain easy access to networks. This white paper explores how (and why) organizations should decrypt traffic in order to identity and mitigate potential threats.
Posted: 01 Jun 2020 | Published: 01 Jun 2020

SonicWall
1 - 25 of 637 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info