IT Management  >   Systems Operations  >   Security  >  

Security Audits

RSS Feed   
ALSO CALLED: Network Security Audits, Auditing (Computer Security), IT Security Audits, Computer Audits, Audits, Auditing
DEFINITION: A security audit is a systematic evaluation of the security of acompany's information system by measuring how well it conforms to aset of established criteria. A thorough audit typically assesses the security of the system's physical configuration and environment, software, information handling processes, and user practices. Security audits are often used to determine regulatory compliance, in the  … 

Security Audits definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary
Security Audits Reports
1 - 25 of 153 Matches Previous Page  |  Next Page
MSPs: The 5 Essentials from Your Endpoint Security Partner
sponsored by Malwarebytes
EBOOK: When it comes to managing cybersecurity, safeguarding client endpoints is a critical piece of the MSP service offering—as well as a complicated one. Read this e-book to view 5 essentials that MSPs need from their endpoint security providers and for tips and solutions to ensure your MSP is successful in this area.
Posted: 06 Jul 2020 | Published: 06 Jul 2020

Malwarebytes

Privacy Essentials for Security Professionals
sponsored by BigID
DATA SHEET: Today’s security professionals face growing pressure – both internally (cybersecurity initiatives) and externally (CCPA, GDPR & other data privacy regulations). This data sheet outlines key consideration areas to help organizations meet compliance requirements and ensure data protection across their environment.
Posted: 02 Jul 2020 | Published: 02 Jul 2020

BigID

Discovery-In-Depth: The Path to Data Intelligence
sponsored by BigID
WHITE PAPER: Data discover is the foundational element of an effective data management strategy – and discovery enables data intelligence, insight and analysis. Download this white paper and discover how to leverage multiple modes of data discovery in order to successfully find & identify sensitive data.
Posted: 02 Jul 2020 | Published: 02 Jul 2020

BigID

Birst Security and Reliability
sponsored by Infor
WHITE PAPER: The following white paper provides an in-depth look at the key security capabilities of Birst, an Infor company. Download this white paper to learn how Birst ensure the protection and privacy of their customers data and discover how they maintain high data security standards.
Posted: 01 Jul 2020 | Published: 01 Jul 2020


Enhancing Security Automation
sponsored by TITUS
DATA SHEET: Download the following solution overview to discover how Titus’s security automation tools are equipping enterprises with the confidence to make accurate and effective data security decisions, bring context to cloud security policies, and more.
Posted: 26 Jun 2020 | Published: 26 Jun 2020

TITUS

Data Security: Best Practices for Remote Workers
sponsored by TITUS
WEBCAST: How do you tackle the issues associated with securing remote workers (such as easily compromised home Wi-Fi networks)? Tune into this webcast to hear experts walk you through best practices for securing your remote workforce and endpoints in today’s distributed enterprises.
Posted: 26 Jun 2020 | Premiered: Jun 26, 2020

TITUS

MITRE ATT&CK Evaluations — APT29
sponsored by Trend Micro
WHITE PAPER: In addition to their framework enabling organizations to learn about common cyberattacks, MITRE ATT&CK also offers an evaluation service in which they assess an organization’s security posture against simulated versions of known attacks. Download this white paper for an in-depth look at Trend Micro’s evaluation results.
Posted: 22 Jun 2020 | Published: 21 Apr 2020

Trend Micro

How the Cognito platform enables organizations to detect intrusions
sponsored by Vectra AI
WHITE PAPER: Security analytics and SIEM are modern approaches to security designed to help organizations better understand their environments and the threats they face. This EMA Top 3 report highlights a variety of use cases designed to inform decision makers in their project planning and decision-making process.
Posted: 17 Jun 2020 | Published: 31 Mar 2019

Vectra AI

How to Choose a SOC 2 Auditor: 6 Questions to Ask
sponsored by Ostendio
RESOURCE: For organizations looking to conduct a SOC 2 audit, choosing the right external audit firm can be a daunting, yet crucial, process. To make sure you choose the right partner, this article highlights 6 questions to consider during the selection process. Read on to find out what they are.
Posted: 04 Jun 2020 | Published: 27 Sep 2019

Ostendio

Executive Brief: The Dark Side of Encryption
sponsored by SonicWall
WHITE PAPER: Encryption plays a key role in providing security for digital interactions. However, these encryption protocols can also serve as a lucrative vector for cybercriminals, allowing them to gain easy access to networks. This white paper explores how (and why) organizations should decrypt traffic in order to identity and mitigate potential threats.
Posted: 01 Jun 2020 | Published: 01 Jun 2020

SonicWall

Cyber Hygiene: If Tools Could Talk
sponsored by Merlin International
WHITE PAPER: The complexity of today’s IT infrastructures coupled with security tool fragmentation and misconfiguration makes cyber hygiene challenging for companies of all sizes. Download this white paper to learn more about how your organization can improve its cyber hygiene by conducting a self-evaluation of your current posture.
Posted: 29 May 2020 | Published: 15 May 2020

Merlin International

Making Sense of MITRE ATT&CK Evaluations to Address Your Cybersecurity Needs
sponsored by Dell SecureWorks
WEBCAST: The MITRE ATT&CK framework provides globally accessible information regarding adversary tactics and techniques based on observations. To further help end-users, MITRE uses the ATT&CK framework to evaluate various offerings and vendors. Watch this webinar to learn more about the evaluations and how to use them to address your security needs.
Posted: 28 May 2020 | Premiered: May 28, 2020

Dell SecureWorks

Top 10 Security Events to Monitor in Azure Ad and Microsoft 365
sponsored by Quest
WHITE PAPER: Although cloud environments enable organizations to be more efficient, it often comes at the cost of additional vulnerabilities. In this e-book, take a closer look a 10 security events that administrators track closely to keep their cloud environments secure.
Posted: 28 May 2020 | Published: 28 May 2020

Quest

COVID-19: Keeping Your Vulnerability Management Program on Track
sponsored by Vulcan
RESOURCE: As organizations shift towards remote working models to promote social distancing, vulnerability management programs are likely experiencing disruption. While there are significant challenges with remote work, the current situation doesn’t come without benefits for vulnerability management programs. Read this blog post to find out what they are.
Posted: 28 May 2020 | Published: 26 Mar 2020

Vulcan

Essential Elements of a Penetration Test
sponsored by Synack
WHITE PAPER: A recent study from the White House indicated that cyberattacks cost the economy between $57 and $109 billion. In order to avoid the financial, legal and reputational damage of an attack, organizations are looking to penetration tests. In this white paper, discover why penetration tests are so critical and the emergence of crowdsource testing.
Posted: 27 May 2020 | Published: 27 May 2020

Synack

Hack the Pentagon Case Study
sponsored by Synack
CASE STUDY: The goal of the Department of Defense’s recent “Hack the Pentagon” program was to mimic realistic cyber threats and assess their critical systems responded to attack from nation states. Read on to unlock the results of this case study and discover why crowdsourced security testing is the new standard for the government.
Posted: 26 May 2020 | Published: 31 Oct 2018

Synack

The Synack Value
sponsored by Synack
DATA SHEET: As business environments become more complex, traditional penetration testing becomes unable to protect against today’s threats. To address this issue, Synack developed a ‘smart’ penetration testing platform, which combines crowdsourced human talent with AI. Download this data sheet to learn more and see how it compares to traditional pen testing.
Posted: 22 May 2020 | Published: 22 May 2020

Synack

The Problem with CVSS Scores & What It Means for Vulnerability Management
sponsored by Vulcan
RESOURCE: While CVSS scores are a helpful way to demonstrate and share information about the severity of a vulnerability, it’s not viable as a standalone prioritization tool. In this article, observe an overview of the shortcomings of CVSS scoring as a risk management tool and best practices for using it appropriately.
Posted: 21 May 2020 | Published: 02 May 2019

Vulcan

Rain Financial Case Study
sponsored by Synack
CASE STUDY: In this case study, follow Rain Financial, a digital currency exchange partner in the Middle East, as they embark on a journey to identify, remediate and proactively protect against vulnerabilities that threaten the security of their customers’ data.
Posted: 21 May 2020 | Published: 21 May 2020

Synack

Crowdsourced Security Testing Overview
sponsored by Synack
PRODUCT OVERVIEW: Crowdsourced penetration testing has shown to provide organizations with in-depth, actionable insights. However, scaling that crowd requires machine intelligence. In this solution brief, take a closer look at Synack’s Crowdsourced Security Testing, designed to combine artificial and human intelligence into one penetration testing platform.
Posted: 12 May 2020 | Published: 12 May 2020

Synack

Advantages of Using A Hosted Payment Page
sponsored by SFG
WHITE PAPER: For organizations interested in selling their products or services online, establishing payment processing and ensuring PCI compliance can be an enormous barrier to entry. To ease the workload, organizations are turning to hosted payment pages. This whitepaper explores how hosted pages work and highlights their key benefits.
Posted: 24 Apr 2020 | Published: 24 Apr 2020

SFG

A Holistic Approach to Securing Kubernetes That Integrates Culture and Technology
sponsored by DivvyCloud
WHITE PAPER: Today’s ever-evolving cloud and container environments paves the way for both innovation and security headaches. In this white paper, discover how integrating a holistic approach for meeting regulatory requirements with Kubernetes can help provide a competitive advantage.
Posted: 09 Apr 2020 | Published: 09 Apr 2020

DivvyCloud

End-to-End Security Solutions for Mid-Market Businesses
sponsored by Dell Technologies and Intel
WEBCAST: Tune into this webinar to learn directly from industry experts, analysts and product champions on how to transform your business with Dell Technologies’ portfolio of security products and solutions.
Posted: 09 Apr 2020 | Premiered: Apr 9, 2020

Dell Technologies and Intel

GDPR Compliance support that works for your business
sponsored by TITUS
PRODUCT OVERVIEW: GDPR is forcing organizations to rethink their workflows and achieve broader visibility into personal data collection. In this solution brief, take a closer look at Titus’ offering that is powered by machine learning to help identify what data you have, how sensitive it is, and how it should be handled by your security stack.
Posted: 06 Apr 2020 | Published: 06 Apr 2020

TITUS

Infographic: 5 ways to achieve a risk-based security strategy
sponsored by ComputerWeekly.com
EGUIDE: In this infographic, learn five steps to implement a risk-based security strategy that naturally delivers compliance as a consequence of an improved security posture.
Posted: 12 Mar 2020 | Published: 12 Mar 2020

ComputerWeekly.com
1 - 25 of 153 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info