Business of Information Technology  >   Business Management  >   Best Practices  >  

Security Best Practices

RSS Feed   
Security Best Practices Reports
76 - 100 of 1636 Matches Previous Page  |  Next Page
Secure Coding Practices: Avoid OS Command Injection Attacks
sponsored by WhiteHat Security
VIDEO: Watch this webcast to learn what an OS Command Injection does, where you can find it, and what damage it can do. Then, explore some best practices for avoiding, or mitigating the damage of these attacks.
Posted: 19 Jan 2018 | Premiered: 16 Jan 2018

WhiteHat Security

A Strategic Approach to Web Application Security
sponsored by WhiteHat Security
WHITE PAPER: App vulnerabilities originate with the source code, and you'll want to secure more of your source code in both development and production. But it's easier said than done for security pros to review source code continuously. Uncover a new static application security testing subscription service to address this problem.
Posted: 18 Jan 2018 | Published: 31 Dec 2017

WhiteHat Security

Getting the Board on Board with Application Security
sponsored by WhiteHat Security
WHITE PAPER: CISOs need to make sure their business considers AppSec from the highest levels. Review these 4 recommendations to improve your business' AppSec and get the support you need.
Posted: 18 Jan 2018 | Published: 31 Dec 2017

WhiteHat Security

Innovation Insight for Security Orchestration, Automation and Response
sponsored by ServiceNow
RESEARCH CONTENT: This Gartner report analyzes security orchestration, automation, and response (SOAR) tools and explores how they can help you improve security operations efficiency, quality and efficacy for your organization.
Posted: 18 Jan 2018 | Published: 30 Nov 2017

ServiceNow

Four CISO Tribes and Where to Find Them
sponsored by Synopsys
WHITE PAPER: In this research content, gathered based on interviews with 25 CISOs, discover 4 distinct approaches to the role of CISO. Learn what makes each one distinct, how you can use this information to push your own career forward, and more.
Posted: 18 Jan 2018 | Published: 29 Dec 2017

Synopsys

How to Buy a Mobile Security Solution
sponsored by Lookout
EBOOK: Mobile devices are becoming a staple of the modern workforce, and they are gateways for attackers to access your company's data. You need mobile security tools. In this e-book chapter, you'll learn what to do before you reach out to vendors, how to test vendors, and how to get your employees to use the solution you choose.
Posted: 15 Jan 2018 | Published: 15 Jan 2018

Lookout

Finding GDPR noncompliance in a mobile first world
sponsored by Lookout
WHITE PAPER: With the proliferation of mobile devices in the workplace, whether company or employee owned, there is a greater risk of data loss or leakage. Whether they know it or not, your employees are putting your company's data--and GDPR compliance--at risk. This white paper is your guide to laying out the mobile portion of your GDPR strategy.
Posted: 15 Jan 2018 | Published: 26 Oct 2017

Lookout

Cloud: A security risk and opportunity
sponsored by ComputerWeekly.com
EGUIDE: With businesses around the world adopting cloud-based services at an ever-increasing pace, security is now more important than ever. We look at why European cloud adopters are dissatisfied with their cloud providers' security and how providers are focusing on security in the design phase of products and introducing new security mechanisms.
Posted: 15 Jan 2018 | Published: 15 Jan 2018

ComputerWeekly.com

The Building Security in Maturity Model Examined
sponsored by Synopsys
RESEARCH CONTENT: In this white paper, you'll find the Building Security in Maturity Model (BSIMM) which compiles the information given by 109 security professionals. Read on to learn the important roles found in a successful security initiative, as well as how you contemporaries are managing their compliance policies, testing protocols, analytics, and more.
Posted: 12 Jan 2018 | Published: 12 Jan 2018

Synopsys

The Developer's Guide to Software Integrity
sponsored by Synopsys
WHITE PAPER: Explore the importance of DevSecOps in building high-quality apps and learn which tools are best suited to helping developers identify and resolve the bugs that can lead to crashes or act as points of entry for attackers.
Posted: 11 Jan 2018 | Published: 31 Dec 2017

Synopsys

DevOps GDPR Compliance: The Condensed Edition
sponsored by Sysdig
DATA SHEET: This article focuses on GDPR from the DevOps perspective, covering the key points, including an overview of regulations, the key terminology you'll see, and what's most important to your team.
Posted: 10 Jan 2018 | Published: 10 Jan 2018

Sysdig

Security Comparison: MDR, MSSP, and SIEM
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Gain valuable insights into the pros and cons of MDR, MSSP and SIEM to help build your cybersecurity protection protocols against today's threats – and tomorrow's.
Posted: 08 Jan 2018 | Published: 08 Jan 2018

Arctic Wolf Networks, Inc.

Insider's Guide to Incident Response
sponsored by AlienVault
EBOOK: 68% of respondents to a recent SAN survey cited a skills shortage as being an impediment to effective incident response.This 48-page e-book provides insight into effective incident response strategies, why they are necessary, and step-by-step improvements you can take to advance your posture.
Posted: 08 Jan 2018 | Published: 08 Jan 2018

AlienVault

SIEM For Beginners: Everything to Know about Log Management
sponsored by AlienVault
WHITE PAPER: The more valid information depicting your network, systems, and behavior the SIEM has the more effective it will be in helping improve your security operations.This resource provides insight into the basics of log management and how improving your SIEM can boost your security posture.
Posted: 04 Jan 2018 | Published: 04 Jan 2018

AlienVault

Magic Quadrant for Security Information and Event Management
sponsored by LogRhythm, Inc.
RESOURCE: Security and risk management leaders are implementing and expanding SIEM to improve early targeted attack detection and response. This Gartner report reveals strengths and cautions of different vendor's security information and event management products as well as a market overview.
Posted: 11 Dec 2017 | Published: 04 Dec 2017

LogRhythm, Inc.

The Tug of War Between UBA and SIEM
sponsored by SearchSecurity.com
EZINE: In this issue of Information Security magazine, we look at SIEM, UBA tools and considerations for effectively implementing user behavior analytics. Additionally, our experts dive into Q&A with John Germain, CISO at Duck Creek Technologies and security research expert, Blaine Burnham.
Posted: 01 Dec 2017 | Published: 01 Dec 2017

SearchSecurity.com

Top 3 Challenges Your Team Faces when Building in the Cloud
sponsored by TrendMicro
WHITE PAPER: In the pages ahead, delve into the 3 major challenges that security teams face when moving into the cloud so that you know how to avoid or overcome them on your path to cloud adoption.
Posted: 30 Nov 2017 | Published: 30 Nov 2017

TrendMicro

The "Patient Zero" Problem and the Need for Modern Endpoint Protection
sponsored by Palo Alto Networks
RESEARCH CONTENT: The digital era requires the need for a modernized approach to endpoint protection. In this IDC research paper, learn how to address and overcome the latest network security challenges. Then, discover IDC's 5 fundamental rules for modern endpoint security.
Posted: 30 Nov 2017 | Published: 30 Jun 2017

Palo Alto Networks

What your Network Security Solution Should Include
sponsored by Aruba Networks
RESOURCE: Learn what's needed to build a highly secure network that provides the control, visibility and reliability needed to deliver a secure computing experience from the edge, to the core, to the cloud.
Posted: 28 Nov 2017 | Published: 28 Nov 2017

Aruba Networks

Buyers Guide: Network Security Management
sponsored by Palo Alto Networks
WHITE PAPER: When it comes to network security, organizations often repeat processes. In this buyers guide, access 10 features your network security management should include and the benefits of network security management. As an added bonus, quiz yourself to determine if it's time to move to network security management.
Posted: 28 Nov 2017 | Published: 28 Nov 2017

Palo Alto Networks

Botnet attacks are evolving; your defenses must too
sponsored by SearchSecurity.com
EBOOK: Botnet attacks will expand and evolve. The best way to fight back is to stop searching for the perfect botnet-protection tool and layer defenses instead.
Posted: 15 Jan 2018 | Published: 15 Jan 2018

SearchSecurity.com

The 5-Minute Companion for the Cyber-Conscious Employee
sponsored by Arctic Wolf Networks, Inc.
EBOOK: Recent studies have pointed fingers at employees, often referring to them as the "weakest link" in cybersecurity. However, more often than not employees haven't received the proper training. Access your 5-minute guide to cyber-consciousness.
Posted: 08 Jan 2018 | Published: 08 Jan 2018

Arctic Wolf Networks, Inc.

How to update, automate your IR processes
sponsored by Booz Allen Hamilton
EGUIDE: In the era of nonstop security threats, creating a cyber threat intelligence team and leveraging incident response (IR) tools can help with detection and automation of processes. Explore the tools and considerations for updating your IR processes.
Posted: 04 Jan 2018 | Published: 04 Jan 2018

Booz Allen Hamilton

Security Analysis Principles and Techniques for IT Pros
sponsored by SearchSecurity.com
EBOOK: As a result of the recent developments affecting security analytics, uncover these tips for ensuring you get the most out of your security analytics tool.
Posted: 01 Dec 2017 | Published: 01 Dec 2017

SearchSecurity.com

Exploring Two New Ways of Getting Insight into the Cybersecurity Landscape
sponsored by Juniper Networks, Inc.
EGUIDE: This e-guide sheds some light on 2 technologies changing the insight we have on our IT security infrastructures. First, explore how to evaluate the machine learning offerings in the cybersecurity market. Then find out what boons shared cloud security assessments can have on your organization.
Posted: 01 Dec 2017 | Published: 28 Nov 2017

Juniper Networks, Inc.
76 - 100 of 1636 Matches Previous Page    2 3 4 5 6 7    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement