Business of Information Technology  >   Business Management  >   Best Practices  >  

Security Best Practices

RSS Feed   
Security Best Practices Reports
1 - 25 of 2183 Matches Previous Page  |  Next Page
Angelo State University Simplifies Refresh Cycles With Druva inSync
sponsored by Druva Software
CASE STUDY: Find out this university was able to simplify its refresh process, maintain continuous data protection, and reduce data restore and backup times by 75%.
Posted: 19 Oct 2018 | Published: 19 Oct 2018

Druva Software

You've Got Ransomware. Now What?
sponsored by Druva Software
WHITE PAPER: Find out what to do before and after your company is attacked by checking off the important steps in this checklist.
Posted: 18 Oct 2018 | Published: 18 Oct 2018

Druva Software

Containers at Risk: A Review of 21,000 Cloud Environments
sponsored by Lacework
WHITE PAPER: This report describes the risks and threats that can be created by deploying workload in the public cloud without proper security. Read on to learn about platforms discovered such as Kubernetes, Docker Swarm, Redhat Openshift, and more.
Posted: 18 Oct 2018 | Published: 18 Oct 2018

Lacework

ThreatConnect Current Trends
sponsored by ThreatConnect
RESOURCE: The 2018 Building a Threat Intelligence Program Survey reveals an increased prevention of phishing attacks, ransomware attacks, and business email compromise with organizations using a mature threat intelligence program. Download this resource for more positive results.
Posted: 18 Oct 2018 | Published: 18 Oct 2018

ThreatConnect

The Tao of Intel Driven Security
sponsored by ThreatConnect
WHITE PAPER: Learn how to implement an intelligence-driven defense in your organization by uniting your threat intelligence and orchestration.
Posted: 18 Oct 2018 | Published: 18 Oct 2018

ThreatConnect

2018 Application Security Research Update
sponsored by Micro Focus
RESEARCH CONTENT: Find out the state of application security in 2018 in this insightful research report from the Software Security Research team at Micro Focus Fortify.
Posted: 18 Oct 2018 | Published: 18 Oct 2018

Micro Focus

Measuring ROI in SOAR
sponsored by Swimlane
WHITE PAPER: Learn how your organization can enhance its ROI measuring capabilities, track mean time to resolution (MTTR), maximize staff efficiency and optimize your security tools with this security automation, orchestration and response (SOAR) system.
Posted: 17 Oct 2018 | Published: 17 Oct 2018

Swimlane

Modern Approaches to Security for Practitioners
sponsored by Signal Sciences
VIDEO: Tune into Modern Approaches to Security for Practitioners for a look at how security has changed in the DevOps-era, security predictions for the rest of 2018, and more.
Posted: 17 Oct 2018 | Premiered: 13 Dec 2017

Signal Sciences

Top 10 Cloud Security Challenges
sponsored by Rackspace
WHITE PAPER: Cloud security is at the forefront of business agendas. Evolving security threats, new hacker methodologies, skills shortages and more are top-of-mind issues for CIOs. Download this resource today to discover 10 common concerns felt by CIOs and how you can approach and neutralize each.
Posted: 17 Oct 2018 | Published: 17 Oct 2018

Rackspace

Measuring the ROI of Security Operations Platforms
sponsored by Splunk
EBRIEF: Download this white paper for a framework that estimates your ROI for a Security Operations Platform.
Posted: 17 Oct 2018 | Published: 17 Oct 2018

Splunk

Get Started with Application Security in 3 Easy Steps
sponsored by Micro Focus
RESOURCE: With the growing demand for rapid delivery of new business applications, learn 3 steps that can help improve your organization's overall application security.
Posted: 17 Oct 2018 | Published: 17 Oct 2018

Micro Focus

2018 User Risk Report
sponsored by Wombat Security Technologies
RESEARCH CONTENT: More than 6,000 working adults across the world were surveyed about their personal security habits. To find out what these employees really know about cybersecurity, download this report for some shocking results. Could some of these folks be working at your organization?
Posted: 16 Oct 2018 | Published: 16 Oct 2018

Wombat Security Technologies

Duo: Most Loved Security Company Chooses Most Trusted Web Defense
sponsored by Signal Sciences
CASE STUDY: Learn how Duo used Signal Sciences for immediate application security visibility and blocking, without impacting their user experience.
Posted: 16 Oct 2018 | Published: 16 Oct 2018

Signal Sciences

Detecting Account Takeovers and Defending Your Users
sponsored by Signal Sciences
WHITE PAPER: In this white paper, learn about account takeover (ATO) attacks and how to defend your users against them.
Posted: 16 Oct 2018 | Published: 31 Dec 2017

Signal Sciences

Playbook Fridays: Conducting VMRay Malware Analysis
sponsored by ThreatConnect
RESOURCE: Learn about a playbook that takes malicious file samples and transmits them to an automated malware analysis system, to help security teams become more efficient.
Posted: 16 Oct 2018 | Published: 21 May 2018

ThreatConnect

Building Daily Habits to Stay Ahead of Security Fires
sponsored by ThreatConnect
RESOURCE: Learn how to efficiently track your vulnerabilities and manage security incidents inside your organization.
Posted: 16 Oct 2018 | Published: 14 Jun 2018

ThreatConnect

The DevOps Roadmap for Security
sponsored by Signal Sciences
WHITE PAPER: Download this e-book to learn how to extend the benefits of DevOps to security and how to embrace and implement modern DevSecOps principles, practices, and tooling.
Posted: 15 Oct 2018 | Published: 15 Oct 2018

Signal Sciences

Security Automation Best Practices
sponsored by Rapid7
WHITE PAPER: To help your team be successful with testing, implementing and scaling automation, download this e-book for 4 security automation best practices.
Posted: 15 Oct 2018 | Published: 15 Oct 2018

Rapid7

The ROI of Security Orchestration and Automation
sponsored by Rapid7
WHITE PAPER: Security orchestration and automation can make teams faster and more efficient. But, how do you measure that? Download this white paper to evaluate the return on your investments in security orchestration and automation.
Posted: 15 Oct 2018 | Published: 15 Oct 2018

Rapid7

Application Security Evolved: How to Use Attacker-Centric Security to Fix the WAF
sponsored by ThreatX
WHITE PAPER: Download this white paper for a security team's guide to the current state of web application security.
Posted: 15 Oct 2018 | Published: 15 Oct 2018

ThreatX

How to Use ThreatConnect Playbooks to Manage Security APIs
sponsored by ThreatConnect
RESOURCE: Planning for APIs as a part of your security infrastructure is becoming increasingly important in today's IT environment. Why? Checkout this blog post from ThreatConnect to learn more about the benefits of API and API management.
Posted: 15 Oct 2018 | Published: 18 May 2018

ThreatConnect

Protect your Online Business from Credential Stuffing
sponsored by Akamai Technologies
WHITE PAPER: Explore what credential stuffing is and how it works. Understand this potential threat to your business. Find out how advanced bot management can help you stay ahead of credential stuffing so that you can protect your organization and its critical assets.
Posted: 15 Oct 2018 | Published: 31 Mar 2018

Akamai Technologies

Trends in the Cost of Web Application & Denial of Service Attacks
sponsored by Akamai Technologies
ANALYST REPORT: Based on research from the Ponemon Institute, organizations can face millions of dollars in revenue loss from web application and denial-of-service (DoS) attacks. Read on to learn some of the key findings and trends of these attacks.
Posted: 15 Oct 2018 | Published: 30 Sep 2017

Akamai Technologies

Advanced IoT Cyberattacks: How to Protect your Security Environment
sponsored by Empow Cyber Security
EGUIDE: Advanced attack campaign patterns essentially behave the same across industries. From healthcare to banking to intelligence, attackers want the same thing. In this e-guide, learn about advanced IoT cyberattacks through a healthcare lens and see how you can protect your systems, today.
Posted: 12 Oct 2018 | Published: 11 Oct 2018

Empow Cyber Security

Akamai Cloud Security
sponsored by Akamai Technologies
WHITE PAPER: Learn about Akamai's cloud-based approach to security that leverages 24/7 monitoring to collect and analyze terabytes of attack data, bot requests, and IP addresses to solidify your defenses. Plus, discover 7 keys to reducing your attack surface.
Posted: 12 Oct 2018 | Published: 31 Mar 2018

Akamai Technologies
1 - 25 of 2183 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement