IT Management  >   Systems Operations  >   Security  >  

Security Audits

RSS Feed   
ALSO CALLED: Network Security Audits, Auditing (Computer Security), IT Security Audits, Computer Audits, Audits, Auditing
DEFINITION: A security audit is a systematic evaluation of the security of acompany's information system by measuring how well it conforms to aset of established criteria. A thorough audit typically assesses the security of the system's physical configuration and environment, software, information handling processes, and user practices. Security audits are often used to determine regulatory compliance, in the  … 

Security Audits definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary
Security Audits Reports
1 - 25 of 119 Matches Previous Page  |  Next Page
Cyber Security: 2021 Worst in Show
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide: Throughout 2021, there has been a strong focus worldwide on how to combat cyber security attacks for most businesses. In this e-guide we take a look at the best of the worst of those attacks to happen throughout January to June this year and how businesses can learn/adapt from these attacks.
Posted: 09 Jun 2021 | Published: 09 Jun 2021

ComputerWeekly.com

Changing the paradigm of security testing
sponsored by Cymulate
VIDEO: According to the SANS institute, half of organizations test their security controls once a year or less. At this cadence, most organizations will be ill-prepared for today’s dynamic cyberthreats. Watch this video to learn about the value of attack and breach simulation, and how to get started at your organization.
Posted: 08 Feb 2021 | Premiered: 08 Feb 2021

Cymulate

SIEM, SOAR or both? Our security experts weigh in
sponsored by ComputerWeekly.com
EGUIDE: In this E-Guide we turn to the Computer Weekly Security Think Tank, a hand-picked panel of cyber security insiders, experts, analysts, and advocates with over a century's worth of collective experience between them, to explore the topic of Security Information and Event Management (SIEM), and Security Orchestration, Automation and Response, (SOAR).
Posted: 21 Dec 2020 | Published: 21 Dec 2020

ComputerWeekly.com

Atakama’s File Encryption Will Prevent Ransomware Exfiltration Threats
sponsored by Atakama
RESOURCE: Ransomware attacks have escalated in recent years to include newer, more devious techniques, like file exfiltration. This article looks at why ransomware is escalating and offers best practices for protecting your organizations from these attacks – read on to get started.
Posted: 09 Dec 2020 | Published: 16 Jun 2020

Atakama

Remediant Framework Mapping and Assessment
sponsored by Remediant
RESOURCE: The NIST Access Controls framework consists of 23 requirements that should be included in an offering – these are often closely related to industry trends and observations. Download this report to discover the results of Remediant’s NIST framework mapping & assessment.
Posted: 13 Aug 2020 | Published: 28 May 2020

Remediant

CW Benelux - August-October 2020: Problems with critical security systems at Schiphol Airport
sponsored by ComputerWeekly.com
EZINE: Schiphol Airport in Amsterdam is one of Europe’s main access points, so you might be surprised to read that IT systems such as those controlling the Dutch borders are rarely tested. In this issue, read about a critical report from the Dutch Court of Audit.
Posted: 05 Aug 2020 | Published: 13 Aug 2020

ComputerWeekly.com

Managing Security Risk and Compliance in a Challenging Landscape
sponsored by Dell Technologies and Intel
RESEARCH CONTENT: How can you keep your business secure that amid the proliferation of devices and data? It starts with a trusted technology partner. Download this research report to learn why a trusted partner is key to a successful security strategy.
Posted: 03 Aug 2020 | Published: 03 Aug 2020

Dell Technologies and Intel

BlackBerry MITRE ATTACK APT29 Evaluation
sponsored by BlackBerry
WHITE PAPER: In conjunction with the framework, MITRE ATT&CK also conducts security evaluations without commentary or bias – the purpose is to provide objective information regarding how vendors fare against certain threat techniques. Download this report for BlackBerry’s analysis and interpretation of MITRE ATT&CK APT29 evaluation data.
Posted: 31 Jul 2020 | Published: 31 Jul 2020

BlackBerry

SailPoint Predictive Identity™: AI-driven Identity for Today’s Modern Enterprise
sponsored by SailPoint Technologies
TECHNICAL ARTICLE: The benefits of a digital transformation can create access complications, which can often lead to potential security risks. In this technology brief, discover how SailPoint harnesses the power of AI and machine learning in their Predictive Identity platform to help organizations ensure security, compliance and access management.
Posted: 29 Jul 2020 | Published: 29 Jul 2020

SailPoint Technologies

Microsoft Data Protection: A Growing Success Story
sponsored by InteliSecure
EGUIDE: In 2017, InteliSecure conducted an evaluation of Microsoft’s data protection capabilities – the results were less than ideal. Since then, Microsoft has made great improvements to the built-in data protection capabilities native to their licensing bundles. Download this e-guide for a closer look at Microsoft’s data protection advances.
Posted: 16 Jul 2020 | Published: 16 Jul 2020

InteliSecure

Protect Your Network: Best Practices, Incidents & Other Security Considerations
sponsored by Zones, Inc.
EGUIDE: Machine learning and automation have advanced security response methods. However, hackers are equally adept at bypassing even the most sophisticated security measures. So, how can organizations address these challenges? Download this e-guide to discover network security best practices, incidents and other security considerations.
Posted: 10 Jul 2020 | Published: 07 Jul 2020

Zones, Inc.

MSPs: The 5 essentials from your endpoint security partner
sponsored by Malwarebytes
EBOOK: When it comes to managing cybersecurity, safeguarding client endpoints is a critical piece of the MSP service offering—as well as a complicated one. Read this e-book to view 5 essentials that MSPs need from their endpoint security providers and for tips and solutions to ensure your MSP is successful in this area.
Posted: 06 Jul 2020 | Published: 06 Jul 2020

Malwarebytes

Discovery-In-Depth: The Path to Data Intelligence
sponsored by BigID
WHITE PAPER: Data discovery is the foundational element of an effective data management strategy – and discovery enables data intelligence, insight and analysis. Download this white paper and discover how to leverage multiple modes of data discovery in order to successfully find & identify sensitive data.
Posted: 02 Jul 2020 | Published: 02 Jul 2020

BigID

A Holistic Approach to Securing Kubernetes That Integrates Culture and Technology
sponsored by DivvyCloud
WHITE PAPER: Today’s ever-evolving cloud and container environments paves the way for both innovation and security headaches. In this white paper, discover how integrating a holistic approach for meeting regulatory requirements with Kubernetes can help provide a competitive advantage.
Posted: 09 Apr 2020 | Published: 09 Apr 2020

DivvyCloud

Infographic: 5 ways to achieve a risk-based security strategy
sponsored by ComputerWeekly.com
EGUIDE: In this infographic, learn five steps to implement a risk-based security strategy that naturally delivers compliance as a consequence of an improved security posture.
Posted: 12 Mar 2020 | Published: 12 Mar 2020

ComputerWeekly.com

Auditing Your Company’s Use of Open Source
sponsored by Fossa
WHITE PAPER: As more and more companies continue to include open source as part of their software program, it’s critical to establish a strategy to manage consumption and ensure efficient use of resources. Download this guide for the key aspects of an open source strategy designed to keep you on track with your operational and compliance objectives.
Posted: 04 Feb 2020 | Published: 04 Feb 2020

Fossa

Multi-pronged approach to cyber security professional development
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, we look at why organisations lack basic prevention, detection and response capabilities. Also, while mastering security basics should always be a top priority, the challenges in securing critical infrastructure and the internet of things provide ample opportunity for further professional development.
Posted: 16 Dec 2019 | Published: 16 Dec 2019

ComputerWeekly.com

The Business Guide to Ransomware
sponsored by Datto, Inc.
EBOOK: Download this e-book for several tactics to protect, avoid, and recover both you and your customers from ransomware attacks, as well as an examination of how today’s ransomware operates and 10 common strains to watch out for.
Posted: 15 Oct 2019 | Published: 15 Oct 2019

Datto, Inc.

Ransomware Made MSPeasy
sponsored by Datto, Inc.
EBOOK: Download this e-book for an up-to-date look at the current state of ransomware and today’s ransomware strains, as well as guidance on educating your customers about ransomware and adding security tools to your services portfolio.
Posted: 14 Oct 2019 | Published: 14 Oct 2019

Datto, Inc.

Tech-Savvy English Public School Streamlines Office 365 Security
sponsored by Barracuda
CASE STUDY: Download this case study to learn how IT Director Tony Whelton was ultimately able to provide the Wellington College’s students and staff with more flexible, secure notebook protection without straining IT budget or resources.
Posted: 09 Oct 2019 | Published: 09 Oct 2019

Barracuda

CASE STUDY: Tricentis slams the door on C-level email attacks using Barracuda Sentinel
sponsored by Barracuda
VIDEO: Tune into this video to discover how Tricentis managed to thwart spear phishing and fraud attacks against senior staff by adding AI-powered Barracuda Sentinel to their security arsenal.
Posted: 08 Oct 2019 | Premiered: 31 May 2019

Barracuda

Infographic: 5 ways to achieve a risk-based security strategy
sponsored by ComputerWeekly.com
EGUIDE: In this infographic, learn five steps to implement a risk-based security strategy that naturally delivers compliance as a consequence of an improved security posture.
Posted: 16 Aug 2019 | Published: 16 Aug 2019

ComputerWeekly.com

Spear Phishing: Top Threats and Trends Vol. 1
sponsored by Barracuda
RESOURCE: This report takes an in-depth look at the three most prevalent types of spear phishing attacks—brand impersonation, business email compromise, and blackmail—and examines 8 defense strategies for preventing these attacks. Read on to learn how to put these strategies to work to protect your company.
Posted: 28 May 2019 | Published: 31 Mar 2019

Barracuda

Create an Effective Email Phishing Test in 7 Steps
sponsored by Cisco Umbrella
EGUIDE: In this expert guide, find out how you can create an effective email phishing test in 7 steps to see how vulnerable your organization really is.
Posted: 03 Sep 2019 | Published: 03 Sep 2019

Cisco Umbrella

Cybersecurity: The Latest Battleground for MSPs
sponsored by SkOUT
EGUIDE: Our experts share their knowledge of the managed security services market in the following guide, so read on to learn how your organization can capitalize on the opportunities therein.
Posted: 03 Jul 2019 | Published: 01 Jul 2019

SkOUT
1 - 25 of 119 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences