Business of Information Technology  >   Business Management  >   Best Practices  >  

Security Best Practices

RSS Feed   
Security Best Practices Reports
51 - 75 of 2263 Matches Previous Page  |  Next Page
Endpoint Security: Protecting Your Business Wherever It Goes
sponsored by Dell SecureWorks
WHITE PAPER: The spread of COVID-19 forcing organizations to quickly shift towards working from home introduced a litany of new endpoint security risks while also amplifying existing ones. Read this white paper for a closer look at these challenges and best practices for addressing them.
Posted: 19 Oct 2020 | Published: 19 Oct 2020

Dell SecureWorks

How Much is Too Much Cybersecurity Noise?
sponsored by Dell SecureWorks
WHITE PAPER: For security professionals, cybersecurity alert volume has gotten to the point where it’s almost too noisy to sift through – creating significant security challenges. So, what can security teams do to make sense of the noise? Read this white paper to find out.
Posted: 19 Oct 2020 | Published: 19 Oct 2020

Dell SecureWorks

Managed Detection & Response (MDR): Selective Outsourcing for Understaffed SOCs
sponsored by Dell SecureWorks
WHITE PAPER: Even though the managed detection and response (MDR) market is in its infancy, interest and adoption has spiked dramatically – with most organizations (79%) either currently evaluating or considering adopting an MDR tool. Read this research report for a deep dive into the MDR market, common approaches and guidance for selecting an MDR provider.
Posted: 19 Oct 2020 | Published: 31 May 2020

Dell SecureWorks

New Account Fraud: Uncovering the Tools And Tactics Of A New Breed Of Scams
sponsored by Buguroo
WHITE PAPER: To enhance customer experience, banks are closing branches in favor of digital services to meet the growing demand of tech-savvy users. A big risk of this change is new account fraud, which is a cyber scam where bad actors use stolen or synthetic identities to open accounts and borrow money. Read this white paper to get a closer look.
Posted: 16 Oct 2020 | Published: 16 Oct 2020

Buguroo

Unmasking BEC and EAC
sponsored by Proofpoint
EBOOK: Tap into The Complete Guide to Stopping Business Email Compromise, Email Account Compromise and Today’s Biggest Impostor Threats for concrete steps on how to keep your users safe.
Posted: 16 Oct 2020 | Published: 16 Oct 2020

Proofpoint

Assuring the Promise of a Secure 5G Future: 5 Steps to Taming the Complexity and Exploiting 5G Opportunities
sponsored by Spirent
WHITE PAPER: 5G will radically improve mobile broadband services, enable connectivity to billions of global devices and create an IoT boom. So what’s holding up 5G deployment in real-world use cases? The answer is security – particularly in that 5G networks need to be tested and validated. Read this white paper to learn 5 steps to 5G security.
Posted: 16 Oct 2020 | Published: 31 Jul 2019

Spirent

Analyzing the Economic Benefits of Proofpoint Insider Threat Management
sponsored by Proofpoint
ANALYST REPORT: With cybersecurity talent in short supply, organizations have turned to technology to manage threats. SecOps and risk reduction have both been high on the list of priorities for security professionals, and now they may be able to take these functions a step further. Open this ESG report to learn about Insider Threat Management from Proofpoint.
Posted: 16 Oct 2020 | Published: 16 Oct 2020

Proofpoint

Responding to Public Sector Cybersecurity Threats: Views of Public Sector Professionals and Where-to From Here
sponsored by BlackBerry
WHITE PAPER: If you’re working in the public sector in Australia, look at this in-depth report about the state of cybersecurity on the continent, presented by Blackberry. It details key findings, presents critical themes for a rock-solid cybersecurity strategy and outlines the ‘Essential Eight’ Maturity Model for security technology.
Posted: 16 Oct 2020 | Published: 16 Oct 2020

BlackBerry

Driving Real Behaviour Change
sponsored by Proofpoint
EBOOK: There are key factors that determine the success or failure of any security awareness program: timing, engagement, and knowledge of the role of data all contribute to a metrics-based plan for security awareness in an organization. But how do you get started? Dive into this detailed e-book to learn how to begin to drive changes in behavior.
Posted: 16 Oct 2020 | Published: 30 Jun 2020

Proofpoint

A Security Architecture for the Cloud-Centric, Digital Enterprise
sponsored by McAfee
WEBCAST: View this webinar with experts Daryush Ashjari and Tim Stead, to find out where your responsibility lies, what cloud-native threats look like, and what it takes to build a cloud-centric security architecture.
Posted: 16 Oct 2020 | Premiered: Oct 15, 2020

McAfee

Cloud Threat Investigation 101: Hunting with MITRE ATT&CK
sponsored by McAfee
DATA SHEET: Learn how to get started with cloud threat investigation using MITRE ATT&CK.
Posted: 15 Oct 2020 | Published: 15 Oct 2020

McAfee

Aruba 360 Secure Fabric
sponsored by TechData
DATA SHEET: Today, a number of technology disruptions – mobile, BYOD, virtualization, cloud, big data, and IoT – have rendered a perimeter-based security approach insufficient. Modern threat defense requires constant assessment of device risk with analytics-ready secure infrastructure. View this data sheet to learn about Aruba 360 Secure Fabric.
Posted: 15 Oct 2020 | Published: 15 Oct 2020

TechData

AI and Automation Address Cybersecurity Concerns
sponsored by TechData
CASE STUDY: As a school district sought to enable greater BYOD capabilities, expand remote learning, and better handle online lessons, they realized that they needed improved security capabilities. Examine this case study to see how Pearland was able to boost the security and speed of their services with the help of automation and more.
Posted: 15 Oct 2020 | Published: 17 Jan 2020

TechData

Market Guide for Zero Trust Network Access
sponsored by Palo Alto Networks
RESOURCE: ZTNA augments traditional VPN technologies for application access and removes the excessive trust once required to allow employees and partners to connect and collaborate. Piloting ZTNA projects as a part of a SASE strategy or to expand remote access may be a wise move. Read the full Gartner article to learn the specifics of their findings.
Posted: 15 Oct 2020 | Published: 08 Jun 2020

Palo Alto Networks

3 Common Kubernetes Security Mistakes and How to Avoid Them
sponsored by VMware
WHITE PAPER: Tap into this white paper to find 3 common mistakes teams make when configuring Kubernetes workloads and how to correct them.
Posted: 15 Oct 2020 | Published: 15 Oct 2020

VMware

The Rise of APT as a Service
sponsored by Bitdefender
VIDEO: Access the Bitdefender investigation to learn the intricate details revealed into an APT attack, which targeted a company that deals with high-profile billion-dollar contracts in the real-estate industry.
Posted: 15 Oct 2020 | Premiered: 15 Oct 2020

Bitdefender

The 5 Phases of Incident Response
sponsored by BlackBerry
WHITE PAPER: According to an IBM study, the “vast majority” of organizations today are unprepared to respond effectively to a serious security incident. Most often, this is due to chronic resource issues and inadequate planning. Get in the know – read this white paper to learn the 5 phases of incident response and how to implement them.
Posted: 14 Oct 2020 | Published: 14 Oct 2020

BlackBerry

Decade of the Rats
sponsored by BlackBerry
ANALYST REPORT: The world is concerned with cyber espionage in the perpetual firestorm of information gathering, and the prime target? Linux servers. Learn why in this report and learn also the different types of remote access trojans (RATs) and what they look like.
Posted: 14 Oct 2020 | Published: 14 Oct 2020

BlackBerry

HPE Security Analysis and Roadmap Service
sponsored by TechData
DATA SHEET: In this data sheet, take a closer look at the features, benefits and limitations of HPE’s Security Analysis and Roadmap Service, including the offering’s intended use, customer responsibilities, and more – download now to get started.
Posted: 14 Oct 2020 | Published: 14 Oct 2020

TechData

Behavioral Solution for Online Fraud Prevention
sponsored by Buguroo
WHITE PAPER: Buguroo was recently announced as winners of the 2020 Frost & Sullivan Best Practices Award for their innovative behavioral biometrics solution – which looks to help organizations in the banking and financial services industry detect and prevent fraud. Read this report to learn more about Buguroo’s award-winning offering.
Posted: 14 Oct 2020 | Published: 14 Oct 2020

Buguroo

Innovate with Intention: Intelligence to Guide Innovation and Manage Risk.
sponsored by Spirent
WHITE PAPER: The “innovation gap” is often the term given to the difference between an organization’s desire to innovate and their material innovation progress. This executive brief attempts to explain the reasoning for the gap by addressing common misconceptions and highlighting how security can be used to accelerate innovation.
Posted: 14 Oct 2020 | Published: 14 Oct 2020

Spirent

See and Defend Cloud Workloads with CrowdStrike and AWS
sponsored by AWS & CrowdStrike
VIDEO: Cloud security is growing more difficult as it becomes more popular, and security teams face the growing risk of addressing these challenges alongside compliance requirements. Watch this webinar to learn how CrowdStrike and AWS are helping to provide complete security for the cloud.
Posted: 14 Oct 2020 | Premiered: 14 Oct 2020

AWS & CrowdStrike

Security in SD-WAN: Centralized Management Means Better Control
sponsored by Palo Alto Networks
ANALYST REPORT: In this 451 Research report, learn how by choosing a converged SD-WAN and security platform, the enterprise can avoid adding one more facet of complexity to its already complex networking profile.
Posted: 14 Oct 2020 | Published: 14 Oct 2020

Palo Alto Networks

Tips for Preparing an RFP for SOC-as-a-Service & Evaluation Criteria
sponsored by Cysiv
WHITE PAPER: SOCs are a critical aspect to effectively identifying and addressing potential threats – however the evaluation process and subsequent RFP drafting process can be overwhelming with the amount of available options. The following white paper provides evaluation best practices and tips to guide RFP drafting to help you get started.
Posted: 14 Oct 2020 | Published: 14 Oct 2020

Cysiv

Secure VDI with NSX
sponsored by VMware International Unlimited Company
WEBCAST: What if you could build in a zero-trust architecture at the most granular level of the data center? And what if you could maintain that level of consistent security across dynamically created desktops? In this video, learn how you can microsegment your VDI environments with VMware NSX platform.
Posted: 14 Oct 2020 | Premiered: Jul 31, 2020

VMware International Unlimited Company
51 - 75 of 2263 Matches Previous Page    1 2 3 4 5 6    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info