Business of Information Technology  >   Business Management  >   Best Practices  >  

Security Best Practices

RSS Feed   
Security Best Practices Reports
101 - 125 of 1645 Matches Previous Page  |  Next Page
Security Analytics
sponsored by
EGUIDE: This e-guide focuses on how businesses are turning to emerging technologies to improve their capability to detect and respond to previously-unknow cyber-attacks, and security analytics is among the most popular choices.
Posted: 09 Oct 2017 | Published: 09 Oct 2017

Protecting Data After the Digital Disruption
sponsored by Proofpoint, Inc.
WEBCAST: Data is no longer stored in one location and companies are running into challenges related to securing sensitive data. Watch this webcast to uncover key challenges driving DLP as well as stages of DLP maturity, considerations for your DLP strategy, and more.
Posted: 04 Oct 2017 | Premiered: Oct 4, 2017

Proofpoint, Inc.

Comprehensive Mobile-Cloud Enterprise Security
sponsored by MobileIron
WHITE PAPER: Organizations need a comprehensive, unified platform designed from the ground up to secure mobile apps, devices, and cloud services. Download this white paper to discover a mobile-cloud security platform that can prevent data loss, enhance the UX, and simplify compliance reporting.
Posted: 02 Oct 2017 | Published: 02 Oct 2017


Your Business Apps are Under Attack: Are you really Protected?
sponsored by Alert Logic
VIDEO: Only 24% of organizations have mature application security in place, according to the 2017 Cybersecurity Trends Report. Take a look at this webcast to reveal statistics regarding app security and what you can do to protect yourself from cyberattacks.
Posted: 22 Sep 2017 | Premiered: 21 Sep 2017

Alert Logic

Mid-Year Cybersecurity Report 2017
sponsored by Cisco Systems, Inc.
RESEARCH CONTENT: Security teams are faced with protecting their companies' key assets from a constantly evolving threat landscape – making it imperative to stay on the pulse of cybersecurity. Explore this report to learn about current attacker behaviors, trends in vulnerability management, evolutions in malware, and beyond.
Posted: 20 Sep 2017 | Published: 31 Jul 2017

Cisco Systems, Inc.

Data Breaches: Protect Your Organization with an Incident Response Program
sponsored by Cisco Systems, Inc.
WHITE PAPER: When a data breach occurs, your organization could be open to hackers and cybercriminals for up to 200 days. Thankfully, building a rapid incident response program isn't difficult, once you know how. This white paper outlines the critical process and major roles that can make that a reality.
Posted: 20 Sep 2017 | Published: 31 Dec 2015

Cisco Systems, Inc.

A 5 Minute Guide to Security for Cognitive Search and Knowledge Management
sponsored by Attivio, Inc.
WHITE PAPER: Examine the resurgence of knowledge management, in conjunction with cognitive search and security, as a viable option for coordinating the vast amounts of information buried in big data environments.
Posted: 13 Sep 2017 | Published: 13 Sep 2017

Attivio, Inc.

Safety Meshing: Hybrid trust models in social networks for end-to-end encryption
sponsored by
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security Thesis series looks at an alternative approach to end-to-end encryption.
Posted: 13 Sep 2017 | Published: 13 Sep 2017

Insuring the uninsurable: Is cyber insurance worth its salt?
sponsored by
RESEARCH CONTENT: This article in our Royal Holloway Information Security Thesis series discusses the risks and benefits of cyber insurance and outlines steps businesses can take to make better informed risk mitigation decisions.
Posted: 12 Sep 2017 | Published: 12 Sep 2017

9 Considerations for Securing Web Apps in the Cloud
sponsored by Alert Logic
WHITE PAPER: Organizations need to re-think their IT security strategies to meet the growing demand for web applications. In this white paper, learn the 9 key considerations for securing web apps in the cloud to prevent data breaches and application-layer attacks.
Posted: 11 Sep 2017 | Published: 11 Sep 2017

Alert Logic

Budgets and Outlook: Top Vendor Providers for Cloud Information Security
sponsored by Alert Logic
RESEARCH CONTENT: This 451 Research report focuses on enterprise information security providers and top considerations among 500 leading organizations.
Posted: 11 Sep 2017 | Published: 11 Sep 2017

Alert Logic

New Security Challenges Redefine Risk and Vulnerability
sponsored by Fortinet, Inc.
WHITE PAPER: Learn the latest areas of security in which IT pros should be honing their focus to keep pace with the ever-evolving threat landscape. For example, training the 70% of uncertified IT pros to protect IoT devices.
Posted: 07 Sep 2017 | Published: 07 Sep 2017

Fortinet, Inc.

5 strategies for modernizing security policy
sponsored by Fortinet, Inc.
WHITE PAPER: A lack of proactive security policies, evolving compliance needs, and expanding corporate infrastructure have all made traditional security policies ineffective. Inside, discover 5 strategies for upgrading your existing policies to remediate these threats, and help make your decision makers confident in your cybersecurity again.
Posted: 07 Sep 2017 | Published: 11 Sep 2017

Fortinet, Inc.

How to Use Endpoint Analytics to Mitigate Ransomware Damage
sponsored by Splunk
WEBCAST: Watch this tutorial on how you can prevent and mitigate the effects of advanced malware like ransomware. See how endpoint analytics can detect anomalies hidden in command scripts, and stop ransomware attacks at their source.
Posted: 07 Sep 2017 | Premiered: Sep 14, 2017


The Essential Checklist: A Practical Guide to Efficient Security Response
sponsored by ServiceNow
WHITE PAPER: Find out how to detect and resolve data breaches faster by using a security operations checklist to identify which areas of your strategy could benefit most from updated methodologies like security automation.
Posted: 01 Sep 2017 | Published: 01 Sep 2017


The Smart, Secure Cloud for India: Learn How Google Cloud Infrastructure Keeps Your Data Secure
sponsored by Google Cloud
WHITE PAPER: Google Cloud's Mumbai cloud region provides faster data transfers and reduced latency to the India region. Download the whitepaper for a look under the hood of Google's infrastructure security, and explicit detail on the process we go through to build and maintain GCP regions. Download the report and find out more now.
Posted: 25 Sep 2017 | Published: 25 Sep 2017

Google Cloud

Expert Perspectives on Data Protection and GDPR Compliance
sponsored by CyberArk Software, Inc
EGUIDE: A report from World Economic Forum and McKinsey & Company estimates that cyberattacks could cost the global economy $3 trillion by 2020. Read this e-guide to reveal experts' perspectives on data protection, cybersecurity, and compliance.
Posted: 22 Sep 2017 | Published: 20 Sep 2017

CyberArk Software, Inc

4 Steps That Help You Protect Your Business
sponsored by Ricoh - HarveyDavid
WHITE PAPER: As the security threats to your IT environments grow, it's increasingly important to have a holistic defense strategy in place. Discover the 4 stages to digital workplace security, and how you can make them a reality.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

Ricoh - HarveyDavid

Managing Access to Keep Privileged Users' Credentials Secure
sponsored by
EBOOK: Fighting creep through privileged user management is an essential but too often overlooked security practice. Inside this handbook, experts Michael Cobb and Joseph Granneman explain why the fight against privilege creep should be at the top of your security team's to-do list.
Posted: 20 Sep 2017 | Published: 20 Sep 2017

Why Security in DevOps is Essential to Software Development
sponsored by
EBOOK: What is the point of releasing new software that's loaded up with security vulnerabilities? Security is now an essential ingredient in software development. Inside this handbook, experts take a closer look at how IT professionals can fit security into their development process and how they will benefit from doing so.
Posted: 19 Sep 2017 | Published: 19 Sep 2017

GDPR Breach Notification Rule Could Complicate Compliance
sponsored by Lepide Software
EGUIDE: Find out what GDPR compliance will entail, and what you can do to avoid the massive fine for failure to comply. Then, explore how the regulation's "breach notification rule" will prompt not just European companies, but those based in the US as well, to more promptly report a data breach.
Posted: 15 Sep 2017 | Published: 12 Sep 2017

Lepide Software

Five Risk Points To Avoid In Enterprise Security
sponsored by Microsoft
RESOURCE: In this white paper, guide yourself through the 5 step course to detect and prevent advance cyberattacks.
Posted: 15 Sep 2017 | Published: 15 Sep 2017


Microsoft Windows Defender Advanced Threat Protection Examined
sponsored by Microsoft
RESEARCH CONTENT: In this Forrester Research Report, learn how, by switching to the Windows Defender Advanced Threat Protection software, 4 businesses in the energy, automotive, food and beverage, and IT industries were able to improve productivity, reduce risk, and more.
Posted: 15 Sep 2017 | Published: 31 Jul 2017


Understanding your Full Public Key Infrastructure (PKI) Potential
sponsored by DigiCert
EGUIDE: This expert e-guide explores how to utilize KPI to its full-potential across all networks without impacting security.
Posted: 06 Sep 2017 | Published: 31 Aug 2017


IT Security Trends to Know
sponsored by Cisco Umbrella
EGUIDE: The 2017 TechTarget IT Priorities Survey reports a number of key IT security trends about where enterprises and infosec professionals place their time and resources. In this expert e-guide, get the results from this survey and see how 971 IT pros plan to focus their cybersecurity efforts.
Posted: 06 Sep 2017 | Published: 29 Aug 2017

Cisco Umbrella
101 - 125 of 1645 Matches Previous Page    3 4 5 6 7 8    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement