Business of Information Technology  >   Business Management  >   Best Practices  >  

Security Best Practices

RSS Feed   
Security Best Practices Reports
1 - 25 of 1623 Matches Previous Page  |  Next Page
CEO Disconnect Is Weakening Cybersecurity
sponsored by Centrify Corporation
RESEARCH CONTENT: As business models have become increasingly digital, high-profile, reputation-damaging security breaches are grabbing more news media headlines. This resource offers insights into senior-level thinking on the issue of cybersecurity, including current security priorities and the perceived degree of alignment between threats and solutions.
Posted: 18 Apr 2018 | Published: 18 Apr 2018

Centrify Corporation

10 Tips for Selecting a Managed Security Service Provider (MSSP)
sponsored by AlienVault
WHITE PAPER: Many businesses are turning to managed security service providers (MSSPs) to keep up with the constant barrage of cyber threats. Explore this resource to uncover 10 tips for selecting an MSSP.
Posted: 17 Apr 2018 | Published: 17 Apr 2018

AlienVault

Detect Ransomware Before it's Too Late with AlienVault USM Anywhere
sponsored by AlienVault
WEBCAST: Ransomware alone is the fastest growing security threat. Take a look at this webcast to uncover how to detect ransomware before it's too late with a unified security management (USM) strategy.
Posted: 17 Apr 2018 | Premiered: Apr 17, 2018

AlienVault

Forrester Study: The Total Economic Impactâ„¢ of AlienVault USM
sponsored by AlienVault
WHITE PAPER: Based on a 2017 study conducted by the Ponemon Institute, the probability that an organization will experience a breach greater than 1,000 records is 14%. Take a look at this Forester report to gain insight into the impact of unified security management.
Posted: 16 Apr 2018 | Published: 16 Apr 2018

AlienVault

Security Event Monitoring Report
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Organizations are facing increasing pressure to implement security event monitoring to improve threat detection capabilities and address regulatory compliance requirements. Inside this Gartner report uncover key challenges and recommendations for improving SIEM strategies.
Posted: 16 Apr 2018 | Published: 16 Apr 2018

Arctic Wolf Networks, Inc.

Technical Considerations for Mobility in the Enterprise
sponsored by Data#3
WHITE PAPER: Download this guide to help move your mobility discussion beyond just users and devices to take you through all the levels you need to consider for a more technical mobility strategy focused on workspace services and delivery.
Posted: 04 Apr 2018 | Published: 04 Apr 2018

Data#3

Information Security: Companies Aren't the Only Ones Migrating to Cloud
sponsored by SearchSecurity.com
EZINE: Hackers are embracing all advantages of the cloud, launching lucrative attacks like malicious cryptomining, DDoS, and ransomware. In this issue of Information Security magazine, editor Kathleen Richards looks at cloud security in 2018 and reveals strategies to protect sensitive data from new internal and external threats.
Posted: 03 Apr 2018 | Published: 03 Apr 2018

SearchSecurity.com

Ransomware: Everything you Need to Know
sponsored by Cisco & Dimension Data
WHITE PAPER: According to Cisco, a typical ransom can be anywhere from $200 to $10,000, but some institutions have paid a far higher price. Access this resource to uncover everything you need to know about ransomware and protecting your enterprise.
Posted: 03 Apr 2018 | Published: 03 Apr 2018

Cisco & Dimension Data

Eliminating Cybersecurity Obscurity Through Continuous Security Validation (Webcast)
sponsored by NSS Labs
WEBCAST: How is your organization defending against security risks? Explore this webcast to learn about how organizations can obtain real time metrics about the effects of risk and security controls to their systems.
Posted: 30 Mar 2018 | Premiered: Mar 27, 2018

NSS Labs

Eliminating Cybersecurity Obscurity Through Continuous Security Validation
sponsored by NSS Labs
PODCAST: How is your organization defending against security risks? Explore this podcast to learn about how organizations can obtain real time metrics about the effects of risk and security controls to their systems.
Posted: 30 Mar 2018 | Premiered: Mar 27, 2018

NSS Labs

Guide to Rethinking Your IT Security
sponsored by VMware
WHITE PAPER: As technology is transforming and becoming more complex, malicious attacks are as well. Take a look at this resource to uncover how to respond to the security challenges of the changing IT landscape.
Posted: 29 Mar 2018 | Published: 29 Mar 2018

VMware

Demystifying the myths of public cloud computing
sponsored by ComputerWeekly.com
RESEARCH CONTENT: In this article in our Royal Holloway security series, Chris Hodson asks whether public cloud is less secure than private datacentres, and assesses service models, deployment, threats and good practice.
Posted: 27 Mar 2018 | Published: 27 Mar 2018

ComputerWeekly.com

Get Started With Open Source Security
sponsored by Flexera Software
RESOURCE: According to Gartner, more than 95% of IT organizations leverage open-source software assets. Utilize this resource to learn how to get started with open source security.
Posted: 23 Mar 2018 | Published: 12 Mar 2018

Flexera Software

The Power of SIEM and Incident Response for Improved Cybersecurity
sponsored by IBM Resilient
RESOURCE: Given the growing complexities of the nature of cyberattacks, security teams need a way to respond to alerts in an orchestrated and prescriptive way. Access this resource to uncover how the power of SIEM and incident response combined can improve cybersecurity.
Posted: 22 Mar 2018 | Published: 22 Mar 2018

IBM Resilient

The Future of Security Operations
sponsored by IBM Resilient
RESOURCE: As technology changes and attack surfaces grow, security teams are forced to think differently. Leverage this resource to learn about the future of security operations and how your team can more effectively operationalize world-class security practices.
Posted: 22 Mar 2018 | Published: 22 Mar 2018

IBM Resilient

Top Global Research Laboratory Resolves Security Incidents Faster
sponsored by IBM Resilient
CASE STUDY: To manage today's threats, organizations need a proven and robust incident response (IR) function. Explore this case study to gain insight into how a top global research laboratory overcame the issue of an inadequate IR ticketing system; it lacked flexibility, control, and security analytics.
Posted: 21 Mar 2018 | Published: 21 Mar 2018

IBM Resilient

Assessing Cybersecurity Success
sponsored by ConvergeOne
WHITE PAPER: How does your organization measure success of cybersecurity? This resource offers a simple and clear way to review and assess your current information security program.
Posted: 20 Mar 2018 | Published: 20 Mar 2018

ConvergeOne

Incident Response Platform vs. Ticketing System: Why Security Teams Need Purpose Built Technology
sponsored by IBM Resilient
RESEARCH CONTENT: Cybersecurity incident response is imperative in this decade of constant attacks. This Gartner research report explores the differences between incident response platforms vs. ticketing systems and explains the risks and limitations of using a ticketing system for purposes beyond what it was built to do.
Posted: 20 Mar 2018 | Published: 20 Mar 2018

IBM Resilient

Security Predictions for 2018
sponsored by TrendMicro
WHITE PAPER: Ransomware and digital extortion are predicted to be cybercriminals go-to methods of attack in 2018. This resource offers security predictions for 2018 and what your organization should look out for to remain protected.
Posted: 20 Mar 2018 | Published: 20 Mar 2018

TrendMicro

Incident Response Platform
sponsored by IBM Resilient
WHITE PAPER: How does your organization plan to respond to complex cyber threats? Learn how an incident response platform can significantly drive down the mean time to find, respond to, and remediate incidents.
Posted: 20 Mar 2018 | Published: 20 Mar 2018

IBM Resilient

GDPR: What it Means and How to Get Compliant
sponsored by SAS
RESOURCE: GDPR will require an ongoing, organization-wide focus to ensure you protect your customers' personal data. Any organization that does not comply could be fined up to $22 million, or 4% of their global annual revenue (whichever is greater). Access this 5-step checklist to learn how to stay GDPR-compliant.
Posted: 19 Mar 2018 | Published: 31 Dec 2017

SAS

Threat Territory
sponsored by RSA Conference
RESOURCE: This resource offers insight into the ever-growing internet of threats through expert tips and startling facts to get you up to speed with the damaging threats you need to look out for and system vulnerabilities you could be missing.
Posted: 16 Mar 2018 | Published: 16 Mar 2018

RSA Conference

GDPR Looms with Organizations Still Unprepared
sponsored by Data443
EGUIDE: GDPR regulations are looming, and not every company is prepared. In this expert e-guide, explore how data management software suppliers are trying to help companies get on track and avoid stiff GDPR penalties.
Posted: 12 Mar 2018 | Published: 31 Dec 2017

Data443

2018 Cybersecurity Report
sponsored by Cisco Systems, Inc.
RESOURCE: Defenders should prepare to face new, self-propagating, network-based threats in 2018. Explore this 68-page cybersecurity report to uncover what to expect in 2018 and how to augment your current security approach to protect against the modern day threats.
Posted: 15 Mar 2018 | Published: 15 Mar 2018

Cisco Systems, Inc.

Empower and Protect Your Organization With an End-to-End Approach to IoT Security
sponsored by VMware Pulse
WHITE PAPER: McKinsey predicts the annual economic impact of the IoT could exceed $11 trillion by 2025. This white paper reveals an end-to-end approach to protecting your organization within the age of IoT.
Posted: 15 Mar 2018 | Published: 15 Mar 2018

VMware Pulse
1 - 25 of 1623 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement