Business of Information Technology  >   Business Management  >   Best Practices  >  

Security Best Practices

RSS Feed   
Security Best Practices Reports
1 - 25 of 1515 Matches Previous Page  |  Next Page
Regulation Technology: Enabling More Than Compliance
sponsored by BT
WHITE PAPER: Since the financial crisis, many in the capital markets having turned to technology to help meet their obligations. In this white paper, explore how regulation technology providers can meet changing customer demands and provide technology which not only aid compliance, but also enable technology innovation through the client's broader business.
Posted: 25 Mar 2019 | Published: 25 Mar 2019

BT

Automating Malware Investigation at One of the World's Leading Investment Firms
sponsored by Splunk Services UK Ltd
CASE STUDY: Blackstone's Incident Response team used to investigate each malware alert as if a compromise has already occurred. Considering the volume of alerts and the potential for inconsistency in any manual process, Blackstone knew there had to be a better way. In this case study, learn about the benefits that Blackstone saw since deploying Splunk Phantom.
Posted: 25 Mar 2019 | Published: 25 Mar 2019

Splunk Services UK Ltd

The Essential Guide To Fraud
sponsored by Splunk
WHITE PAPER: Threat actors are constantly discovering new ways to commit fraud to exploit a wide range of online services. Companies and their customers face the risk of losing money, ruining reputations and protecting the integrity of programs. In this white paper, learn how to protect your business against fraudulent activity.
Posted: 25 Mar 2019 | Published: 25 Mar 2019

Splunk

The SIEM Buyer's Guide
sponsored by Splunk Services UK Ltd
WHITE PAPER: Today's most serious threats act across multiple systems and use advanced evasion techniques to avoid detection. Without a SIEM, attacks germinate and grow into catastrophic incidents. In this white paper, learn the basics of a SIEM, 7 essential capabilities of an analytics-driven SIEM and the 9 technical capabilities of a modern SIEM.
Posted: 25 Mar 2019 | Published: 25 Mar 2019

Splunk Services UK Ltd

Identity and Data Management
sponsored by Optiv
RESOURCE: Breaches, compliance and digital transformation are 3 challenges organizations today are faced with. Another issue at the center of today's challenges is compromised identities. In this resource, learn why your organization needs a strategic approach to identity and data management. Also learn how Optiv can help your organization do this.
Posted: 25 Mar 2019 | Published: 25 Mar 2019

Optiv

Security and Compliance Fears Keep Companies from Cloud Migration
sponsored by Ziften
RESOURCE: Migrating parts of your IT operations to the cloud can seem like a huge chore, and a dangerous one at that. There are a lot of security issues to deal with when migrating to the cloud. In this article, learn about how to keep your environment secure before, during and after a cloud migration.
Posted: 25 Mar 2019 | Published: 27 Feb 2019

Ziften

Data Immutability - A Key Issue for Capital Markets' RegTech
sponsored by BT
WHITE PAPER: Staying compliant involves not only accurate reporting, but also secure and immutable storage of data. In this white paper, learn how to demonstrate immutability is in action in your front, middle and back office setups.
Posted: 22 Mar 2019 | Published: 31 Mar 2019

BT

G Suite Security and Trust
sponsored by Dito
EBOOK: In this e-book, learn how the robust security features in the G Suite are designed to protect your business from threats like major spear-phishing attacks. These features include cutting-edge cloud security, encryption, access and authentication and more.
Posted: 22 Mar 2019 | Published: 22 Mar 2019

Dito

Oracle Dyn Cybersecurity Intelligence Report
sponsored by Oracle Dyn
WHITE PAPER: This report aims to help organizations take control of their Internet security with top tips from cybersecurity experts on identifying bots, mitigating damage and creating a culture of security in your organization. Download now to get started.
Posted: 22 Mar 2019 | Published: 21 Mar 2019

Oracle Dyn

Modern Defense in Depth: An Integrated Approach to Better Web Application Security
sponsored by Oracle Dyn
WHITE PAPER: Cyberattacks are still successful. Breaches continue to occur. And each time we ask the same questions: why and how did this happen? Many businesses know the steps they're taking to protect ourselves are clearly inadequate. In this book, learn how an integrated, platform-based approach can help you achieve better web application security.
Posted: 22 Mar 2019 | Published: 21 Mar 2019

Oracle Dyn

Security with AI and Machine Learning
sponsored by Oracle Dyn
WHITE PAPER: Tools that employ AI and machine learning have begun to replace the older rules- and signature-based tools that can no longer combat today's sophisticated attacks. In this e-book, look at the strengths (and limitations) of AI- and ML-based security tools for dealing with today's threat landscape.
Posted: 22 Mar 2019 | Published: 21 Mar 2019

Oracle Dyn

5 Web Application Security Threats You Should Care About
sponsored by Oracle Dyn
WHITE PAPER: Today, threat actors can spread malicious content and execute attacks all over the world, crossing borders—and industries—in a matter of seconds. How can you protect your web applications? In this e-book learn how you can navigate the threat landscape as well as execute an intelligent approach to web application security.
Posted: 22 Mar 2019 | Published: 21 Mar 2019

Oracle Dyn

A Guide to Simplifying Compliance with NIST SP 800-53 and 800-82
sponsored by ForeScout
RESOURCE: NIST Special Publication (SP) 800-53r4 provides a catalog of security controls for federal information systems and organizations and a process for selecting controls to protect operations and organizations. In this resource, explore the provided table which presents NIST SP's security controls applicable to ICS networks.
Posted: 22 Mar 2019 | Published: 22 Mar 2019

ForeScout

Forget Box Ticketing
sponsored by BT
RESOURCE: Making information centrally accessible, securely, immutably, and at speed, has the potential to enable lucrative new services that, probably, no-one has even thought of yet. Download this resource to learn why you should take a data-centric approach in capital markets today.
Posted: 21 Mar 2019 | Published: 21 Mar 2019

BT

Understanding the Mobile Threat Landscape
sponsored by Wandera
WHITE PAPER: 2019 should be another momentous year for mobile security, with cyberattacks growing rapidly in sophistication and distribution. In this report, uncover the key mobile security trends that emerged last year as well as a summary of predictions for the mobile threat landscape for the year ahead.
Posted: 21 Mar 2019 | Published: 21 Mar 2019

Wandera

Meeting Corporate Requirements for Comprehensive Security for Users and Their Devices
sponsored by Lenovo
RESOURCE: Perhaps the single most common point of attack is user devices. With inconsistent security tools and many PCs running insecure software stacks, there are numerous ways these devices are compromised. In this article, learn how combining more secure operating systems and devices that automate key security processes can help protect your organization.
Posted: 21 Mar 2019 | Published: 21 Mar 2019

Lenovo

Making the Move to a Cloud Native WAF
sponsored by Oracle Dyn
WHITE PAPER: While many companies rely on appliance-based WAF solutions, the market requirements for web application security are shifting toward an edge security platform approach that combines a variety of protections suited to distributed cloud environments. Read this e-book and discover 5 reasons to consider a cloud-native web application firewall (WAF).
Posted: 21 Mar 2019 | Published: 21 Mar 2019

Oracle Dyn

Surviving the Bot Matrix
sponsored by Oracle Dyn
WHITE PAPER: Bot technology is becoming increasingly sophisticated and bot traffic right now makes up more than 50% of all Internet traffic – more than human. This e-book will help understand how to survive the bot matrix and take control of bot detection, mitigation and elimination. Download the e-book now, so you can stay above the bot epidemic today.
Posted: 21 Mar 2019 | Published: 21 Mar 2019

Oracle Dyn

How to Align with the NIST Cybersecurity Framework
sponsored by ForeScout
EBOOK: Adopting the NIST framework provides organizations with a structure to outline their current state of cybersecurity and strengthen their overall security. In this e-book, explore how Forescout's SilentDefense can facilitate adoption of the 3-part NIST Cybersecurity Framework.
Posted: 21 Mar 2019 | Published: 21 Mar 2019

ForeScout

No Time to Lose: How to Help Ensure Your ICS Infrastructure Complies with the EU's NIS Directive
sponsored by ForeScout
EBOOK: This e-book explains the NIS Directive and its implications for essential service providers that depend on ICS networks to operate effectively. It also defines how essential service providers should assess solutions designed to support NIS compliance.
Posted: 21 Mar 2019 | Published: 21 Mar 2019

ForeScout

SAS Model Risk Management
sponsored by SAS
WHITE PAPER: The regulatory scrutiny being applied to model risk management is intensifying. As a result, banks need to maintain an inventory of models. In this white paper, learn how SAS Model Risk Management can help reduce the manual effort required to appropriately inventory, manage, document, communicate, monitor changes and audit firm-wide models.
Posted: 20 Mar 2019 | Published: 20 Mar 2019

SAS

The Managed Print Services Market
sponsored by Kyocera Document Solutions UK
RESOURCE: Security is a major concern for financial organizations due to the volume of sensitive personal data flowing in and out on a daily basis. It is essential for financial organizations to evaluate their print security. In this article, learn more about why security matters in the managed print services market, especially in the financial sector.
Posted: 20 Mar 2019 | Published: 06 Jul 2018

Kyocera Document Solutions UK

A Brief Guide to Securing Your Multi-Cloud
sponsored by Splunk Services UK Ltd
WHITE PAPER: As more organizations are shifting infrastructure and services to the cloud, more are adopting a multi-cloud strategy. In this white paper, learn what multi-cloud is, what it isn't, the benefits of embracing it and lastly, how you can secure multi-cloud with the right security strategy.
Posted: 20 Mar 2019 | Published: 20 Mar 2019

Splunk Services UK Ltd

How AppGuard is Different
sponsored by AppGuard
RESOURCE: Download this infographic to see how AppGuard 's real-time prevention can help your organization and how it stacks up against other vendors.
Posted: 19 Mar 2019 | Published: 19 Mar 2019

AppGuard

Case Study Global Airline
sponsored by AppGuard
CASE STUDY: This major global airline needed to enhance their security measures, as a cyberattack could jeopardize passenger lives, harm reputation and revenue. Download this case study to find out how they saw success with AppGuard's endpoint protection tools.
Posted: 19 Mar 2019 | Published: 19 Mar 2019

AppGuard
1 - 25 of 1515 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement