Business of Information Technology  >   Business Management  >   Best Practices  >  

Security Best Practices

RSS Feed   
Security Best Practices Reports
51 - 75 of 1658 Matches Previous Page  |  Next Page
The Building Security in Maturity Model Examined
sponsored by Synopsys
RESEARCH CONTENT: In this white paper, you'll find the Building Security in Maturity Model (BSIMM) which compiles the information given by 109 security professionals. Read on to learn the important roles found in a successful security initiative, as well as how you contemporaries are managing their compliance policies, testing protocols, analytics, and more.
Posted: 12 Jan 2018 | Published: 12 Jan 2018

Synopsys

State of Software Security
sponsored by Veracode, Inc.
WHITE PAPER: According to this report the top 10 list of most common vulnerability categories in 2017 is strikingly similar to 2016. Information leakage was again the most prevalent, present in 66% of apps on initial scan. Inside this report, State of Software Security, uncover trends over time, benchmark performance, and identify best practices.
Posted: 12 Jan 2018 | Published: 28 Dec 2017

Veracode, Inc.

The State of Software Security: Developer Guide
sponsored by Veracode, Inc.
WHITE PAPER: This State of Software Security report examines the increased burden on developers to ensure sound app security testing, particularly in DevOps and Agile environments. Discover best practices to improve app security testing and remediation, and learn about the tenets of DevSecOps.
Posted: 12 Jan 2018 | Published: 31 Dec 2017

Veracode, Inc.

Best Practices: Strategies For Making The Crucial Shift To DevSecOps
sponsored by Veracode, Inc.
RESEARCH CONTENT: This Forrester Research report examines the importance of incorporating security into DevOps methodologies. Discover 3 steps for shifting from DevOps to DevSecOps and find out how to deliver high-quality apps faster.
Posted: 11 Jan 2018 | Published: 01 May 2017

Veracode, Inc.

The Developer's Guide to Software Integrity
sponsored by Synopsys
WHITE PAPER: Explore the importance of DevSecOps in building high-quality apps and learn which tools are best suited to helping developers identify and resolve the bugs that can lead to crashes or act as points of entry for attackers.
Posted: 11 Jan 2018 | Published: 31 Dec 2017

Synopsys

The Developers Guide to the DevSecOps Galaxy
sponsored by Veracode, Inc.
WHITE PAPER: Learn about the top app security challenges for DevOps methodologies and find out how to bolster app development with best practices for DevSecOps.
Posted: 10 Jan 2018 | Published: 10 Jan 2018

Veracode, Inc.

How to Build a Soc with Limited Resources
sponsored by LogRhythm, Inc.
WHITE PAPER: Having a security operations center (SOC) has become an absolute necessity for implementing threat lifecycle management to minimize damage caused by successful attacks. This white paper offers a guide to building an SOC with limited resources and provides the basics of the cyberattack lifecycle through the threat lifecycle management framework.
Posted: 09 Jan 2018 | Published: 09 Jan 2018

LogRhythm, Inc.

Security Comparison: MDR, MSSP, and SIEM
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Gain valuable insights into the pros and cons of MDR, MSSP and SIEM to help build your cybersecurity protection protocols against today's threats – and tomorrow's.
Posted: 08 Jan 2018 | Published: 08 Jan 2018

Arctic Wolf Networks, Inc.

The 5-Minute Companion for the Cyber-Conscious Employee
sponsored by Arctic Wolf Networks, Inc.
EBOOK: Recent studies have pointed fingers at employees, often referring to them as the "weakest link" in cybersecurity. However, more often than not employees haven't received the proper training. Access your 5-minute guide to cyber-consciousness.
Posted: 08 Jan 2018 | Published: 08 Jan 2018

Arctic Wolf Networks, Inc.

5 Ways to Boost Your Security Team's Impact
sponsored by RSA
WHITE PAPER: 93% of security operations center (SOC) managers are unable to triage all potential threats. Explore this resource to uncover 5 tools to boost your security team's impact.
Posted: 03 Jan 2018 | Published: 03 Jan 2018

RSA

How Does Mobile Device Management Differ from Traditional Security?
sponsored by Seqrite
WHITE PAPER: In this white paper explore the need for an mobile device management (MDM) system, as well as several best practices for selecting and deploying a comprehensive MDM solution to your enterprise in a way that will be beneficial to security, and intuitive for employees.
Posted: 28 Dec 2017 | Published: 28 Dec 2017

Seqrite

Unified Threat Management: A Modern Solution to a Modern Problem
sponsored by Seqrite
WHITE PAPER: Read this white paper to learn why traditional methods of network protection are no longer sufficient to keep your data safe from today's advanced threats. Then, discover unified threat protection which uses a single appliance to perform many security functions.
Posted: 27 Dec 2017 | Published: 27 Dec 2017

Seqrite

Data Loss Prevention: Best Practices
sponsored by Seqrite
WHITE PAPER: In order to minimize the damage data loss does to your organization, you need a strong data loss protection solution. This white paper details the 3 types of data you need to be securing, as well as some best practices to keep in mind.
Posted: 27 Dec 2017 | Published: 27 Dec 2017

Seqrite

Threats Posed by Portable Storage Devices
sponsored by Seqrite
WHITE PAPER: In this white paper, find out if security policies alone are the best solution to mitigate the risks posed by portable storage devices, as well as explore some of the threats that these devices pose if they go uncontrolled.
Posted: 22 Dec 2017 | Published: 22 Dec 2017

Seqrite

A Data Privacy & Security Year in Review: Top 10 Trends and Predictions
sponsored by Delphix
WEBCAST: Learn about the top 10 data security trends that developed throughout 2017. Plus, uncover 5 predictions about the future of data privacy and learn about a platform that integrates data masking and delivery to simplify security.
Posted: 15 Dec 2017 | Premiered: Dec 6, 2017

Delphix

Data Defense Doesn't Win Championships
sponsored by Delphix
RESOURCE: Learn about the DataOps approach and how it could help businesses continuously deliver secure access to data throughout its lifecycle.
Posted: 13 Dec 2017 | Published: 13 Dec 2017

Delphix

Data Management Platforms for GDPR: Buyer's Checklist
sponsored by Delphix
RESOURCE: Get ready for the coming changes to compliance and data privacy being ushered in by GDPR, and use this handy checklist to help ensure your data management tools and techniques will be ready for the new regulations.
Posted: 12 Dec 2017 | Published: 31 Oct 2017

Delphix

Magic Quadrant for Security Information and Event Management
sponsored by LogRhythm, Inc.
RESOURCE: Security and risk management leaders are implementing and expanding SIEM to improve early targeted attack detection and response. This Gartner report reveals strengths and cautions of different vendor's security information and event management products as well as a market overview.
Posted: 11 Dec 2017 | Published: 04 Dec 2017

LogRhythm, Inc.

DataOps for Data Privacy and Security
sponsored by Delphix
WHITE PAPER: Learn about a secure data management platform that facilitates collaboration between DBAs, information security pros, analysts, IT operations, and more. Plus, find out how you can drive digital transformation with a comprehensive DataOps approach.
Posted: 11 Dec 2017 | Published: 30 Nov 2017

Delphix

The Tug of War Between UBA and SIEM
sponsored by SearchSecurity.com
EZINE: In this issue of Information Security magazine, we look at SIEM, UBA tools and considerations for effectively implementing user behavior analytics. Additionally, our experts dive into Q&A with John Germain, CISO at Duck Creek Technologies and security research expert, Blaine Burnham.
Posted: 01 Dec 2017 | Published: 01 Dec 2017

SearchSecurity.com

Insider's Guide to Incident Response
sponsored by AlienVault
EBOOK: 68% of respondents to a recent SAN survey cited a skills shortage as being an impediment to effective incident response.This 48-page e-book provides insight into effective incident response strategies, why they are necessary, and step-by-step improvements you can take to advance your posture.
Posted: 08 Jan 2018 | Published: 08 Jan 2018

AlienVault

How to update, automate your IR processes
sponsored by Booz Allen Hamilton
EGUIDE: In the era of nonstop security threats, creating a cyber threat intelligence team and leveraging incident response (IR) tools can help with detection and automation of processes. Explore the tools and considerations for updating your IR processes.
Posted: 04 Jan 2018 | Published: 04 Jan 2018

Booz Allen Hamilton

SIEM For Beginners: Everything to Know about Log Management
sponsored by AlienVault
WHITE PAPER: The more valid information depicting your network, systems, and behavior the SIEM has the more effective it will be in helping improve your security operations.This resource provides insight into the basics of log management and how improving your SIEM can boost your security posture.
Posted: 04 Jan 2018 | Published: 04 Jan 2018

AlienVault

Security Analysis Principles and Techniques for IT Pros
sponsored by SearchSecurity.com
EBOOK: As a result of the recent developments affecting security analytics, uncover these tips for ensuring you get the most out of your security analytics tool.
Posted: 01 Dec 2017 | Published: 01 Dec 2017

SearchSecurity.com

Exploring Two New Ways of Getting Insight into the Cybersecurity Landscape
sponsored by Juniper Networks, Inc.
EGUIDE: This e-guide sheds some light on 2 technologies changing the insight we have on our IT security infrastructures. First, explore how to evaluate the machine learning offerings in the cybersecurity market. Then find out what boons shared cloud security assessments can have on your organization.
Posted: 01 Dec 2017 | Published: 28 Nov 2017

Juniper Networks, Inc.
51 - 75 of 1658 Matches Previous Page    1 2 3 4 5 6    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement