IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Information Management

RSS Feed   
Security Information Management Reports
Foundstone Targeted Malware Threat Assessment 360
sponsored by McAfee
DATA SHEET: Reactionary approaches to cybersecurity are no longer viable, security teams need to actively hunt out threats and stop them before they strike. The following data sheet provides an overview of the Foundstone Targeted Malware Threat Assessment 360, designed to equip security pros with threat hunting capabilities – read on to learn more.
Posted: 20 Nov 2020 | Published: 20 Nov 2020


Key IAM Automation Policies and Controls for Stronger Governance
sponsored by Hitachi Vantara
RESOURCE: Colleges and universities need a flexible IAM solution that can keep users secure and systems compliant. Still, many schools stick with manual homegrown, legacy systems believing they’re the only way to ensure both flexibility and security. But there’s a simpler way. Read this short article to learn 3 key policies for IAM automation.
Posted: 12 Nov 2020 | Published: 15 Sep 2020

Hitachi Vantara

Success Patterns for Supply Chain Security
sponsored by Panorays
WHITE PAPER: Threats targeting supply chains are on the rise, impacting businesses across all 3 elements of the confidentiality, integrity and availability (CIA) triad. The following SANS whitepaper further explores these challenges and highlights the key components of an effective supply chain security program – read on to get started.
Posted: 24 Nov 2020 | Published: 24 Nov 2020


3 Steps to Building Business-Centered Data Protection
sponsored by InteliSecure
EGUIDE: Even though research suggests that security focused on protecting the perimeter is obsolete, organizations continue to invest resources towards this effort. Modern threats require a shift in cybersecurity mindset – an approach focused on protecting the people. Read on to learn more about this approach and how to implement it.
Posted: 24 Nov 2020 | Published: 24 Nov 2020


4 Ways Digital Transformation Can Help the Bottom Line and How a SIEM Can Help
sponsored by Splunk
WHITE PAPER: IDC estimates that digital transformation could translate to over $18 trillion of new value. This is great, but what specific effects could these transformation strategies have on the bottom line and on cybersecurity? Read this white paper to get the answer.
Posted: 20 Nov 2020 | Published: 20 Nov 2020


The Key To Successful Digital Transformation In Banking
sponsored by Onegini
WHITE PAPER: In order to compete with FinTechs, banks need to rethink their digital presence to ensure a secure and user-friendly experience. But digital transformations are far from simple. This helpful guide explores some of the challenges of going digital, as well as an overview of their Onegini’s Identity Cloud offering – read on to get started.
Posted: 13 Nov 2020 | Published: 13 Nov 2020


A Security Engineer’s Nightmare
sponsored by
WHITE PAPER: For security pros, preventing breaches and ensuring data privacy is hectic enough – having an incompetent system on top of these challenges can introduce new levels of stress. Read this white paper to learn how Cribl is helping security engineers log information and incidents so they can focus their efforts on more important tasks.
Posted: 19 Nov 2020 | Published: 19 Nov 2020

Overview of Dark Web Threats Against the Gaming Industry
sponsored by Sixgill
ANALYST REPORT: Discussions of all things related to gaming thrive on the deep and dark web. Apps such as Discord and Telegram allow gamers to exchange reviews about the latest games, swap strategies or simply socialize with their fellow gamers. But the dark side of these chat rooms involve hacking, fraud and even DDoS. Read this report to learn more.
Posted: 13 Nov 2020 | Published: 13 Nov 2020


BlackBerry Cylance 2020 Threat Report
sponsored by BlackBerry
RESEARCH CONTENT: The comprehensive findings from the BlackBerry Cylance 2020 Threat Report provide a holistic summary of the trends and vulnerabilities of this year’s most common and prominent cyberthreats. Read on to learn more about 2020’s threat landscape and prepare your organization for 2021’s cyberthreats.
Posted: 16 Nov 2020 | Published: 16 Nov 2020


The Evolution of Evidence Collection
sponsored by Aptible
EBOOK: Evidence collection is mundane & exhausting, and what’s worse is that it can happen once a quarter or more. But despite its time-consuming nature, evidence collection is critical to passing an audit & proving compliance. By reading this guide, you can learn how to leverage automation to make evidence collection a bit less painful.
Posted: 16 Nov 2020 | Published: 16 Nov 2020


About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.


All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info