Business of Information Technology  >   Business Management  >   Best Practices  >  

Security Best Practices

RSS Feed   
Security Best Practices Reports
1 - 25 of 2361 Matches Previous Page  |  Next Page
Text Messages & Social Media in Public Safety
sponsored by Smarsh
WHITE PAPER: The popularity of text messaging and social media has exploded in recent years, including in the workplace. In this white paper, examine how public safety agencies can create policies that allow for compliant use of text messaging and social media, and how to retain those communications for an efficient response to open records requests.
Posted: 18 Dec 2018 | Published: 18 Dec 2018

Smarsh

Live Webinar: Ransomware Preparedness and Recovery
sponsored by New Cloud Networks
WEBCAST: On January 30th, join NewCloud Networks and Veeam for a discussion on Ransomware preparedness, security best practices, and more.
Posted: 18 Dec 2018 | Premiered: Dec 18, 2018

New Cloud Networks

The Public Sector Guide to Text Messaging Policy and Retention
sponsored by Smarsh
WHITE PAPER: Sending text messages between mobile devices is now public business, and by law, the records need to be preserved. This white paper contains steps that will help public sector organizations develop a text message policy and retention strategy to protect against the risk involved with use of this popular, universal form of communication.
Posted: 18 Dec 2018 | Published: 18 Dec 2018

Smarsh

It's Time to Stop Talking About Passwords
sponsored by Ping Identity Corporation
RESOURCE: In this quick guide to password security, learn how you can mitigate the risk of cyberattacks, while also providing a frictionless user experience to your employees with multi-factor authentication (MFA).
Posted: 18 Dec 2018 | Published: 31 Oct 2016

Ping Identity Corporation

3 Recommendations for Cloud Security
sponsored by CloudHealth Technologies
WHITE PAPER: Ensuring the security of your public cloud environment is challenging, but ensuring your security in a rapidly evolving multi-cloud environment can be even more difficult. This white paper outlines three core recommendations for cloud security across AWS, Microsoft Azure, and Google Cloud Platform.
Posted: 18 Dec 2018 | Published: 31 Dec 2018

CloudHealth Technologies

Data Breach: Security Investigation, Detection and Rapid Response
sponsored by Splunk
WHITE PAPER: Discover the specific items to investigate when there is a security incident alert, what your analysts need to determine during a breach to mitigate further damage, the 6 most common steps in determining the impact of the breach, and the most appropriate course of action.
Posted: 17 Dec 2018 | Published: 01 May 2017

Splunk

Splunk Quick Start for SIEM
sponsored by Splunk
DATA SHEET: Simple monitoring of traditional security events is no longer enough. Learn how you can effectively mitigate risk and detect malware easier, today.
Posted: 17 Dec 2018 | Published: 17 Dec 2018

Splunk

The Soar Buyer's Guide: Security Orchestration, Automation, & Response
sponsored by Splunk
WHITE PAPER: This buyer's guide outlines the important criteria you should consider when evaluating security orchestration, automation, and response platforms, including core components, platform attributes and business considerations. Plus, find a checklist you can print out, read over, and mark up as you evaluate platform options.
Posted: 17 Dec 2018 | Published: 17 Dec 2018

Splunk

Take Your Security to the Next Level
sponsored by Splunk
PRODUCT OVERVIEW: Learn how you can augment your security initiatives and practices through automation and adaptive response.
Posted: 17 Dec 2018 | Published: 17 Dec 2018

Splunk

What's Threatening IT Security?
sponsored by Aruba Networks
RESOURCE: What are the causes of gaps in IT security? Is the Internet of Things making it worse? Can AI and automation fix it? Download this resource to see what the Ponemon Institute recently found.
Posted: 17 Dec 2018 | Published: 17 Dec 2018

Aruba Networks

Credential Stuffing Attacks: 2018 Security Report
sponsored by Akamai Technologies
RESEARCH CONTENT: In this quarterly report, discover how credential stuffing and advanced DDoS attacks have affected organizations this year.
Posted: 17 Dec 2018 | Published: 17 Dec 2018

Akamai Technologies

The ROI of Security Orchestration and Automation
sponsored by Rapid7
WHITE PAPER: As the technology we use at work expands, speed has never been more important for security operations teams. Security orchestration and automation is becoming a vital aspect of many organizations' security strategies. In this white paper, learn how many companies are using it to successfully tackle common security processes and investigation types.
Posted: 13 Dec 2018 | Published: 13 Dec 2018

Rapid7

Security Automation Best Practices
sponsored by Rapid7
WHITE PAPER: While processes make it possible to get a job done faster, creating ones that solve practical problems and result in measureable efficiency gains can be a time-consuming task. In this white paper, learn how to make your security team successful with the help of automation.
Posted: 13 Dec 2018 | Published: 13 Dec 2018

Rapid7

Automating Detection and Response: A SANS Review of Swimlane
sponsored by Swimlane
ANALYST REPORT: In this product brief, learn about SOAR (Security Orchestration, Automation and Response) technology that offers integration and interoperability across security teams' tools that provides a centralized user interface for security analysts to alert on and triage tracking and case management.
Posted: 12 Dec 2018 | Published: 12 Dec 2018

Swimlane

2018 Application Security Statistics Report
sponsored by WhiteHat Security
WHITE PAPER: This application security statistics report provides an analysis of the state of application security, brings to the forefront evolutionary trends, and highlights best practices that result in better application security over time. The report also presents challenges and opportunities to secure the applications.
Posted: 07 Dec 2018 | Published: 31 Dec 2018

WhiteHat Security

State of the Channel Ransomware Report: Canadian Edition
sponsored by Datto, Inc.
EBOOK: More than 200 Canadian MSPs share their ransomware hardships and triumphs, with specifics on how ransomware is targeting customers—in particular, SMBs—and recommendations for recovery and business continuity. Read on for a unique look into the state of ransomware.
Posted: 07 Dec 2018 | Published: 31 Dec 2017

Datto, Inc.

Complete Guide to Cloud Security in Health IT
sponsored by Virtustream
EGUIDE: In this e-guide, uncover 4 ways that cloud service providers offer advanced protection. You'll also learn about the benefits and drawbacks of considering a cloud-based EHR system.
Posted: 05 Dec 2018 | Published: 05 Dec 2018

Virtustream

Managing Mobile Risk in Healthcare
sponsored by MobileIron
RESOURCE: It's extremely important in the healthcare industry for organizations to secure their endpoints – mobile devices included. In this resource, learn how you can use a threat defense application to enhance the security and privacy of your endpoints and protect patient data against cyberattacks.
Posted: 05 Dec 2018 | Published: 05 Dec 2018

MobileIron

Social Media Account Takeovers
sponsored by Proofpoint, Inc.
WHITE PAPER: Most organizations lack the protective countermeasure or the expertise to mitigate risk and response to social media account takeovers. In this white paper, learn about how takeovers are possible, the complexity of social media accounts and how to prevent an attack from happening.
Posted: 04 Dec 2018 | Published: 04 Dec 2018

Proofpoint, Inc.

4 Critical Features of a Cyber-Resilient Architecture
sponsored by Dell EMC and Microsoft
RESOURCE: To protect your servers against cyber-attacks throughout their lifecycle, industry analysts recommend implementing four practices into your hardware security strategy. Keep reading to learn all 4.
Posted: 04 Dec 2018 | Published: 04 Dec 2018

Dell EMC and Microsoft

Defending against Encrypted Threats
sponsored by F5 Networks
WHITE PAPER: In a world dominated by SSL/TLS encrypted traffic, find out how to overcome various challenges with inbound and outbound traffic inspection so that you can effectively neutralize malware attacks, intelligently route traffic, and more.
Posted: 03 Dec 2018 | Published: 03 Dec 2018

F5 Networks

Encrypted Traffic: Making What's Vulnerable More Visible
sponsored by F5 Networks
WHITE PAPER: This white paper explores how to update your SSL/TLS strategy for the increasing payload of encrypted attacks. Get tips on how to improve your cryptographic posture so that you can make sure your SSL/TLS strategy is able to decrypt and encrypt traffic while routing it intelligently across security inspection devices.
Posted: 03 Dec 2018 | Published: 03 Dec 2018

F5 Networks

Zero Trust Threat Prevention, Q3 2018
sponsored by Cyxtera
RESEARCH CONTENT: This Forrester Tech Tide report presents an analysis of the maturity and business value of the 25 technology categories that support Zero Trust threat prevention. Read on to find out which one is the best for your organization.
Posted: 03 Dec 2018 | Published: 12 Jul 2018

Cyxtera

Alert Logic Professional: Intrusion Detection and Log Management
sponsored by Alert Logic
RESOURCE: Learn how your business can benefit from intrusion detection and log management, backed by 24/7 monitoring and threat analysis from certified security experts
Posted: 03 Dec 2018 | Published: 03 Dec 2018

Alert Logic

Understanding Today's SOAR Market and Offerings
sponsored by Rapid7
EBOOK: One of the fastest growing security trends right now is the adoption of security orchestration and automation systems to help teams accomplish more, at a faster pace, and with greater accuracy. Download this buyer's guide for an understanding of today's SOAR market and offerings.
Posted: 03 Dec 2018 | Published: 03 Dec 2018

Rapid7
1 - 25 of 2361 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement