Business of Information Technology  >   Business Management  >   Best Practices  >  

Security Best Practices

RSS Feed   
Security Best Practices Reports
76 - 100 of 1693 Matches Previous Page  |  Next Page
Gartner report: 2019 Market Guide for Security Orchestration, Automation and Response Solutions
sponsored by IBM
ANALYST REPORT: The first market guide from Gartner to cover the SOAR solution market provides analysis and direction on the current state of the SOAR market, as well as recommendations and key findings to help security and risk management leaders evaluate how a SOAR solution can improve their security operations.
Posted: 19 Dec 2019 | Published: 19 Dec 2019

IBM

The Total Economic Impact of IBM Resilient
sponsored by IBM
ANALYST REPORT: Download the white paper on Intelligent Orchestration to learn best practices for building consistent IR processes and leveraging security orchestration and automation for guided response.
Posted: 19 Dec 2019 | Published: 19 Dec 2019

IBM

Six Steps for Building a Robust Incident Response Function
sponsored by IBM
WHITE PAPER: In the white paper "Six Steps for Building a Robust Incident Response Function" IBM Resilient provides a framework for security teams to build a strong incident response program and deliver organization-wide coordination and optimizations to accomplish these goals.
Posted: 19 Dec 2019 | Published: 19 Dec 2019

IBM

The Future of Security Operations
sponsored by IBM
RESOURCE: As technology changes and attack surfaces grow, security teams are forced to think differently. Leverage this resource to learn about the future of security operations and how your team can more effectively operationalize world-class security practices.
Posted: 19 Dec 2019 | Published: 19 Dec 2019

IBM

Innovation in retail: Using cybersecurity as a competitive advantage
sponsored by Capgemini
RESOURCE: While cybersecurity measures enable retail organizations to identify and mitigate potential threats, it’s important to consider that data protection can be considered a competitive advantage. In this blog post, explore the importance of security for retail consumers, how GDPR is shaping the industry, and the role of SOCs in quantifying risks.
Posted: 19 Dec 2019 | Published: 13 May 2019

Capgemini

Application Shielding First Line of Defense for Financial Apps
sponsored by Intertrust
WEBCAST: In this webinar, join Paul Butterworth, the Director of Product Marketing at Intertrust, as he discusses the risks your financial applications face, best practices for protecting applications, IP and keys and explore some real-world examples from financial services.
Posted: 18 Dec 2019 | Premiered: Oct 29, 2019

Intertrust

Cloud can mean better security, not less security
sponsored by Capgemini
RESOURCE: While security concerns are legitimate, businesses cannot afford to let security challenges hold them back from embracing cloud technology. Especially since cloud also offers security advantages. In this article, uncover 3 categories of cloud security concerns and explore the tactics and technologies that can enhance cybersecurity efforts.
Posted: 18 Dec 2019 | Published: 27 Sep 2018

Capgemini

Protecting Healthcare Software
sponsored by Intertrust
WHITE PAPER: For decades medical devices have been standalone instruments that interacted only with the patient or medical provider. In this white paper, learn about the shift to smart technologies and how to safeguard patient data and healthcare applications.
Posted: 17 Dec 2019 | Published: 17 Dec 2019

Intertrust

Key Protection with Intertrust whiteCriterion Secure Key Box
sponsored by Intertrust
WHITE PAPER: Traditional perimeter security strategies are insufficient for protecting the growing number of remote devices being used to conduct business. This white paper overviews cryptographic key security, a threat that is becoming increasingly relevant in today’s digital environment, and highlights the common techniques used by hackers.
Posted: 16 Dec 2019 | Published: 31 Aug 2018

Intertrust

Key Steps in Satisfying Your CCPA and Other Privacy Obligations
sponsored by PerimeterX
WHITE PAPER: In order to avoid the severe financial, legal and reputational penalties that can apply to companies fail to meet regulations, organizations need to ensure that their data protection strategy is fine-tuned for 2020. In this Osterman Research report, uncover key steps your organization needs to take to prepare for the CCPA.
Posted: 13 Dec 2019 | Published: 13 Dec 2019

PerimeterX

Connected Car Security
sponsored by Intertrust
WHITE PAPER: As connected cars grow in popularity due to their convenience, it’s important to note that the increasing number of smart features built into cars opens the network to serious vulnerabilities and threats. This white paper highlights the threats facing connected cars by examining common cyberattack patterns and how to protect against them.
Posted: 13 Dec 2019 | Published: 13 Dec 2019

Intertrust

Taking Steps to Protect Financial Mobile Applications
sponsored by Intertrust
WHITE PAPER: Although the popularity of mobile applications has greatly simplified the use of day-to-day financial operations for the end user, it has created additional workload for ensuring their security. In this white paper, take an in-depth look into the world of financial mobile applications and learn practical ways to ensure protection.
Posted: 13 Dec 2019 | Published: 13 Dec 2019

Intertrust

3 Ways to Reduce PCI DSSv3.2 Audit Scope
sponsored by Comforte AG
RESOURCE: Discover a quick reference guide summarizing PCI requirements and common technologies deployed to meet the requirements
Posted: 13 Dec 2019 | Published: 13 Dec 2019

Comforte AG

Reverse Engineering Still a Serious Problem in 2019
sponsored by Intertrust
WEBCAST: While mobile applications and interconnected devices offer unmatched convenience, they also expose organizations and consumers to cybersecurity risks. This webinar breaks down common mobile application security threats and highlights real-life reverse engineering examples.
Posted: 12 Dec 2019 | Premiered: Nov 8, 2019

Intertrust

Top 5 Threats to E-commerce Businesses
sponsored by PerimeterX
WEBCAST: This video highlights the top 5 threats to e-commerce businesses companies need to be vigilant before this, and any, holiday season. Tune in to learn about these 5 attack trends.
Posted: 12 Dec 2019 | Premiered: Dec 12, 2019

PerimeterX

Threat Intelligence Report November 2019
sponsored by Mimecast
WHITE PAPER: Mimecast threat researchers developed key insights about the types of attacks that proliferate each quarter, as well as new attacks cropping up. In this quarter’s report, learn about the modified forms of malware being used in impersonation attacks, the channels they go through, and the proactive security measures your organization can take.
Posted: 12 Dec 2019 | Published: 30 Nov 2019

Mimecast

The Importance of Cybersecurity for Executives
sponsored by A-Lign
WHITE PAPER: As security threats become increasingly frequent, complex and disruptive, it’s critical for all leaders – not just the CIO, CTI and CISO – of an organization to play a role in ensuring security. In this white paper, explore the importance of cybersecurity for executives by looking at the common types of attacks and how to prevent them.
Posted: 12 Dec 2019 | Published: 12 Dec 2019

A-Lign

The Cybersecurity Guide: Defending from Threats and Preventing Hacks
sponsored by A-Lign
WHITE PAPER: Organizations in every industry and at every size are vulnerable to data breaches or breach incidents. This cybersecurity guide exposes the threats that your organization could be vulnerable to and outlines threat prevention tactics in order to fortify your organization.
Posted: 12 Dec 2019 | Published: 12 Dec 2019

A-Lign

Best Practices Award: Email Security Global
sponsored by Mimecast
WHITE PAPER: The trend towards cloud migration for email security adds new levels of complexity for organizations, and the increase in email-based threats means the need for secure email is critical to the protection of sensitive data. Read this research report to explore the top industry challenges and best practices as they relate to email security.
Posted: 12 Dec 2019 | Published: 12 Dec 2019

Mimecast

Five Major Bot Threats to E-commerce and How to Stop Them
sponsored by PerimeterX
WHITE PAPER: It’s always important that online retail companies are prepared for any cybersecurity threats to keep both customer and company data secure. Luckily, this white paper highlights 5 major types of attacks companies need to be vigilant of, as well as defensive capabilities for addressing these threats. Read on to make sure your organization is ready.
Posted: 11 Dec 2019 | Published: 11 Dec 2019

PerimeterX

Preparing for a Data Breach: Not If, But When
sponsored by A-Lign
WHITE PAPER: When it comes to preparing for data breaches, companies should think in terms of “when” instead of “if” to ensure cybersecurity preparedness. In this white paper, Petar Besalev, Senior VP of Cybersecurity and Privacy Services at A-Lign, provides an overview of strategies and best-practices to help you prepare for a data breach.
Posted: 11 Dec 2019 | Published: 11 Dec 2019

A-Lign

Decluttering Your Security Environment
sponsored by Mimecast
WHITE PAPER: While it’s natural to think that the solution to increased security risk is incorporating more technology, overcomplicating your environment with tools – and not the right personnel – can lead to increased risk. In this white paper, leverage expertise from a recent think tank for advice on how to address cybersecurity complexity.
Posted: 11 Dec 2019 | Published: 11 Dec 2019

Mimecast

Bringing it all Together: Okta, HR and Your Directories
sponsored by Okta
RESOURCE: For IT and HR, managing access to multiple applications for employees can be challenging. In this infographic, learn how IAM and user lifecycle management can make it easier to manage systems by automation the onboarding and offboarding of key apps and resources for every employee.
Posted: 10 Dec 2019 | Published: 10 Dec 2019

Okta

The Beginner’s Guide to Bug Bounty Programs
sponsored by HackerOne
WHITE PAPER: In The Beginners’ Guide to Bug Bounty Programs, discover how organizations including Starbucks, Airbnb, GitHub, Hyatt, Nintendo and Google Play are working with hackers to protect their customers and brands.
Posted: 10 Dec 2019 | Published: 10 Dec 2019

HackerOne

Building Online Portals for Your Customers and Partners with Okta
sponsored by Okta
DATA SHEET: Read on to view how Okta's IAM service can allow organizations to present a single, well-integrated web application to all customers and partners, who can navigate it with a single set of credentials.
Posted: 10 Dec 2019 | Published: 10 Dec 2019

Okta
76 - 100 of 1693 Matches Previous Page    2 3 4 5 6 7    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info