Business of Information Technology  >   Business Management  >   Best Practices  >  

Security Best Practices

RSS Feed   
Security Best Practices Reports
51 - 75 of 1952 Matches Previous Page  |  Next Page
Top CASB Use Cases
sponsored by BitGlass
RESOURCE: CASBs have quickly risen to prominence and become go-to solutions for securing cloud and mobile. However, because these platforms offer a wide range of capabilities, it can be challenging to identify which use cases are most relevant to an organization’s needs. IT leaders must consider all common CASB use cases to evaluate competing solutions.
Posted: 22 Nov 2019 | Published: 22 Nov 2019

BitGlass

Configuration Management: Addressing GRC Challenges
sponsored by ServiceNow
EGUIDE: Configuration management enables security teams to configure, update and patch systems more efficiently. In this e-guide, dive deeper into configuration management to learn some the key features, benefits, and how it can improve governance, risk management and compliance (GRC).
Posted: 21 Nov 2019 | Published: 15 Nov 2019

ServiceNow

Mobile Phishing: Myths and Facts Facing Every Modern Enterprise Today
sponsored by Lookout
WHITE PAPER: Traditional phishing protection methods don’t apply to mobile devices, and cyberattackers are taking exposing this vulnerability. In fact, the rate at which people are falling for phishing attacks on mobile has increased 85% annually since 2011. In this white paper, dissect the myths and facts around mobile phishing.
Posted: 21 Nov 2019 | Published: 21 Nov 2019

Lookout

The Top Automated Bot Threats and How to Stop Them
sponsored by Radware
WHITE PAPER: Global bot traffic is escalating and intensifying, and malicious bots can now mimic human behavior to scrape data, take over accounts and commit payment fraud. Staying ahead of these threats is important and thus requires security capabilities to detect and stop them. Learn more now.
Posted: 21 Nov 2019 | Published: 21 Nov 2019

Radware

Defining a Shared Responsibility Model for Amazon Web Services (AWS)
sponsored by Alert Logic
WHITE PAPER: In this e-book, discover a 5-step plan for using the AWS Shared Security Responsibility Model (SSRM) as a foundation for building a "cloud-first" cybersecurity defense plan.
Posted: 21 Nov 2019 | Published: 21 Nov 2019

Alert Logic

Sharpening the Edge: 5G Networks, Edge Computing, IoT and Their Implications on Cybersecurity for Service Providers
sponsored by Radware
WHITE PAPER: In this white paper, learn how to leverage automation and a new generation of software- and service-defined architectures to improve the digital experience for consumers and businesses alike, all the while providing a secure experience.
Posted: 21 Nov 2019 | Published: 21 Nov 2019

Radware

Why is Third-party Risk Management Essential to Cybersecurity?
sponsored by ServiceNow
EGUIDE: With organizations increasing their reliance on third-party service providers, developing a security strategy that extends beyond their immediate network perimeter is essential to a strong defense. In this e-guide, learn the basics of third-party risk management and what organizations can do meet these challenges.
Posted: 21 Nov 2019 | Published: 15 Nov 2019

ServiceNow

Ionic Machina Cloud Copy Tool
sponsored by Ionic Security
RESOURCE: Download this article for a demo of Ionic Machina and how it can secure data across different cloud providers.
Posted: 20 Nov 2019 | Published: 20 Nov 2019

Ionic Security

Namogoo Helps Top E-Retailer Stop Massive Credit Card Leak to Third Party Services
sponsored by Namogoo
CASE STUDY: A major US retail site had a severe incident where customer credit card numbers were leaked to website URLs on sensitive pages along the customer journey. In this case study, learn how Namogoo was able to help this e-retailer address the breach at hand as well as help them mitigate the risk of similar incidents happening in the future.
Posted: 20 Nov 2019 | Published: 20 Nov 2019

Namogoo

Tanium for Mergers & Acquisitions
sponsored by Tanium
PRODUCT OVERVIEW: The mergers and acquisitions outlook continues to show strong growth. However, acquiring companies face a long list of risks that must be assessed and carefully accounted for during due diligence. In this brief, learn how Tanium can help organizations accelerate the due diligence process and reduce risk.
Posted: 20 Nov 2019 | Published: 20 Nov 2019

Tanium

Risk Management: 3 Security Changes to Consider for Cloud Adoption
sponsored by ServiceNow
EGUIDE: According to Nemertes Research, this is the year most workloads will be in the cloud versus in on-premises data centers. While the benefits of cloud services can’t be overlooked, these changes also present a security risk. In this e-guide, uncover the 3 changes IT professionals should consider in order to manage third-party risk.
Posted: 20 Nov 2019 | Published: 15 Nov 2019

ServiceNow

Tanium: Unified Cloud Visibility & Control
sponsored by Tanium
PRODUCT OVERVIEW: In this brief, find 7 best practices shared by organizations that have been successful in securely migrating to the cloud. Also, learn how Tanium can help you accelerate cloud migration strategies with low risk.
Posted: 20 Nov 2019 | Published: 20 Nov 2019

Tanium

The New Era of Personal Data Privacy Policy
sponsored by ServiceNow
EGUIDE: GDPR and CCPA are changing the way organizations can use customer data by giving the power back to the individual. In this e-guide, Dimitri Sirota, CEO and co-founder of BigID, addresses some of the key issues that organizations are facing in the era of data access rights. Read on to key into the insights of an industry expert.
Posted: 20 Nov 2019 | Published: 15 Nov 2019

ServiceNow

4 Ways to Improve Customer Experience with a Modern Identity Service
sponsored by Okta
WHITE PAPER: In order to unify the customer experience and drive engagement, there needs to be an identity layer serving as the connective tissue between apps, devices, channels, and experiences. In this white paper, learn how Okta’s modern identity services can help organizations improve their customer experience.
Posted: 20 Nov 2019 | Published: 20 Nov 2019

Okta

Cloudflare for e-Learning Platforms
sponsored by Cloudflare
PRODUCT OVERVIEW: Students are increasingly turning to online universities as part of their educational experience. In this brief, learn how Cloudflare provides a scalable, easy-to-use, unified product stack to deliver security, performance, and reliability for your online courses.
Posted: 20 Nov 2019 | Published: 20 Nov 2019

Cloudflare

Tanium for IT Operations Management
sponsored by Tanium
DATA SHEET: According to Forrester, 74% of organizations state that the number of endpoint tools they have limits their effectiveness. Patchwork point services are disparate and incomplete in their visibility. In this solution brief, dive deeper into the pains of legacy point services and explore Tanium’s Operations Suite. Read on to learn more.
Posted: 20 Nov 2019 | Published: 20 Nov 2019

Tanium

FedRAMP ATO on AWS in Half the Time with Automation – A Customer Story
sponsored by AWS - Coalfire
WEBCAST: Hear how automation methodology, pioneered by Coalfire and AWS, enabled Innovest Systems to be FedRAMP assessment ready in less than six months, allowing the company to quickly unlock new government revenue streams. Continue reading to uncover the key takeaways.
Posted: 19 Nov 2019 | Premiered: Nov 19, 2019

AWS - Coalfire

Video Course: Expedite Your Path to FedRAMP Compliance on AWS
sponsored by AWS - Coalfire
WEBCAST: This 10-minute online course details the significant benefits of SAO techniques and the role of third-party assessment organizations (3PAOs) in building and documenting FedRAMP-compliant environments. Continue on for three self-paced lessons.
Posted: 19 Nov 2019 | Premiered: Nov 19, 2019

AWS - Coalfire

Accelerating the Journey to Passwordless Authentication
sponsored by IBM
WHITE PAPER: A recent study conducted by EMA found that while over 90% of organizations experienced a password policy violation over the past year, a vast majority continued to rely on traditional passwords. Read on to understand some of the vulnerabilities of traditional passwords and uncover sustainable, secure alternatives.
Posted: 19 Nov 2019 | Published: 31 Jul 2019

IBM

Preparing for CCPA Compliance
sponsored by Namogoo
EBOOK: Given the financial and reputational damage of failing to comply with data privacy laws, preparation for the CCPA should be the top priority at any company, regardless of where they are based. In this e-book, explore the components of CCPA, how it compares to GDPR, and 7 steps to CCPA compliance. Read on to prepare your business for 2020.
Posted: 19 Nov 2019 | Published: 19 Nov 2019

Namogoo

Getting Started with Zero Trust Never trust, Always Verify
sponsored by Okta
WHITE PAPER: There is no silver bullet when it comes to achieving a zero-trust security architecture, but identity and access management is the core technology that organizations can start with on their Zero Trust journeys. Read on to learn the benefits of Zero Trust and what a framework looks like today.
Posted: 19 Nov 2019 | Published: 19 Nov 2019

Okta

Online Privacy in a World of Third-Party Services
sponsored by Namogoo
EBOOK: As companies continue to rely on third-party services to enhance the experience of their websites, they risk increasing the vulnerability of customer data. In this e-book, discover the benefits of third-party software, how it works, and why it’s critical to take appropriate security measures when considering a vendor. Read on to learn more.
Posted: 19 Nov 2019 | Published: 19 Nov 2019

Namogoo

Behavioral Biometrics: The Intelligent Safeguard Against Online Fraud
sponsored by Buguroo
WHITE PAPER: Behavioral biometrics can help users identify people by the unique way they interact with different devices, including computers (keyboard and mouse use), tablets or smartphones. Read on to learn how you can utilize behavioral biometrics techniques and AI deep learning algorithms to detect and predict cybercriminal activities at your organization.
Posted: 19 Nov 2019 | Published: 19 Nov 2019

Buguroo

Driving IT Hygiene with Tanium
sponsored by Tanium
DATA SHEET: Improving IT Hygiene means creating a process to continuously identify assets, risks, and vulnerabilities across an environment and fixing them with speed at scale. In this solution brief, uncover the fundamental aspects of better IT Hygiene and explore Tanium’s IT Hygiene Platform. Read on to learn more.
Posted: 18 Nov 2019 | Published: 18 Nov 2019

Tanium

Q3, 2019 Cyber Threats and Trends Report
sponsored by Neustar
WHITE PAPER: Comparing Q3, 2019 to Q3, 2018, the volume of cyberattacks has increased by 241%, with the average attack size decreasing by 28%. As the cyberattacks constantly change, it’s critical for businesses to stay informed. In this report, uncover cybersecurity threats and trends of Q3, 2019 and unlock insights to better prepare yourself for Q4.
Posted: 18 Nov 2019 | Published: 13 Nov 2019

Neustar
51 - 75 of 1952 Matches Previous Page    1 2 3 4 5 6    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement