IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed   
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 

Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Management Reports
1 - 25 of 2525 Matches Previous Page  |  Next Page
ACCELERATE SECURITY RESPONSE AND RANSOMWARE RECOVRY
sponsored by Rubrik
VIDEO: Ransomware defense has become one of the most critical functions of the modern security team. Watch this episode of Data Security Talks to join Kyle Van Schalkwyk, a Systems Engineer Specialist at Palo Alto Networks, for a discussion around ransomware trends, challenges and defensive strategies.
Posted: 23 Jul 2021 | Premiered: 23 Jul 2021

Rubrik

The Fundamentals Of Behavior-Changing Cybersecurity Training Content
sponsored by Hoxhunt
EBOOK: Cybersecurity training can prove to be an invaluable asset in the never-ending battle against cyberthreats. Read this e-book to learn about the fundamentals of behavior-changing cybersecurity training and discover how to get started at your organization.
Posted: 14 Jul 2021 | Published: 14 Jul 2021


The CISO's guide to supply chain security
sponsored by ComputerWeekly.com
EGUIDE: Supply chain attacks have long been a concern in cyber security circles as it can be difficult to enforce security measures for suppliers and partners. In this e-guide, find out why supply chain attacks are intensifying amid the pandemic, how companies are responding to the attacks and what else organisations can do to disrupt the cyber kill chain.
Posted: 04 Jul 2021 | Published: 05 Jul 2021

ComputerWeekly.com

Manchester United praised for swift response to cyber attack
sponsored by ComputerWeekly.com
EGUIDE: The Theatre of Dreams briefly turned into The Theatre of Nightmares last week as Manchester United Football Club suffered a cyber-attack on their systems. This e-Guide dives into more depth about how the attack happened and what Manchester United's cyber security team did, in order to prevent a loss of data and keep a clean sheet.
Posted: 01 Jul 2021 | Published: 01 Jul 2021

ComputerWeekly.com

Challenging The Rules Of Security
sponsored by Dell
EBOOK: PH
Posted: 29 Jun 2021 | Published: 29 Jun 2021

Dell

Cloud Computing and Customer Experience In The Public Sector
sponsored by Salesforce
EBOOK: Citizens are demanding that government agencies respond to them with the same speed, efficiency, and accuracy they’re accustomed to experiencing with their favorite companies. Learn how to get started in this Guide to Cloud Computing and Customer Experience in the Public Sector—after a brief multiple-choice survey.
Posted: 23 Jun 2021 | Published: 23 Jun 2021

Salesforce

Developing A Customer-First Mindset
sponsored by Salesforce
EBOOK: As businesses look to transform UX and develop a customer-first mindset, it’s clear that a digital-first approach to CX is the next move. In this guide, explore how the public sector is prioritizing digital strategies and services, from fostering employee development to minimizing the skills shortage. Take a brief survey to get your copy.
Posted: 23 Jun 2021 | Published: 23 Jun 2021

Salesforce

Ultimate Guide to Cybersecurity Incident Response
sponsored by IBM
EBOOK: PH
Posted: 21 Jun 2021 | Published: 21 Jun 2021

IBM

The 8 Best Cloud Security Certifications for IT Pros in 2021
sponsored by IBM
EBOOK: PH
Posted: 21 Jun 2021 | Published: 21 Jun 2021

IBM

Threat Detection and Response Demands Proactive Stance
sponsored by IBM
EBOOK: PH
Posted: 21 Jun 2021 | Published: 21 Jun 2021

IBM

Top Benefits of SOAR Tools, Plus Potential Pitfalls to Consider
sponsored by IBM
EBOOK: PH
Posted: 21 Jun 2021 | Published: 21 Jun 2021

IBM

Network Monitoring Market Converges with Security Analytics
sponsored by IBM
EBOOK: PH
Posted: 21 Jun 2021 | Published: 21 Jun 2021

IBM

Top Ten Features of Micro Focus Data Protector to Prevent Ransomware
sponsored by Micro Focus
EBOOK: The sophistication of recent cyberattacks has many security experts recommending organizations follow the 3-2-1 backup rule. Check out this data sheet to see how Micro Focus Protector, with its functionalities, addresses this recommendation in the 10 features and benefits described inside.
Posted: 14 Jun 2021 | Published: 14 Jun 2021

Micro Focus

2 Steps to Close the Gap in Ransomware Defense
sponsored by Micro Focus
EBOOK: Ransomware is a global epidemic that is spreading like wildfire. However, organizations can dramatically reduce the threat of ransomware with a 2-step approach. Check out this data sheet to learn what goes into this ransomware defense strategy. Please complete a brief survey to gain access.
Posted: 14 Jun 2021 | Published: 14 Jun 2021

Micro Focus

Cyber Security: 2021 Worst in Show
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide: Throughout 2021, there has been a strong focus worldwide on how to combat cyber security attacks for most businesses. In this e-guide we take a look at the best of the worst of those attacks to happen throughout January to June this year and how businesses can learn/adapt from these attacks.
Posted: 09 Jun 2021 | Published: 09 Jun 2021

ComputerWeekly.com

How do you solve a problem like security training?
sponsored by ComputerWeekly.com
EGUIDE: In this E-Guide, we will the tricky topic of security awareness training. Firstly, we try to answer the burning question of how to get employees to pay attention to training and take it seriously. Then, we take a look at some security awareness best practices that you can use to craft training your users will actually benefit from.
Posted: 17 May 2021 | Published: 17 May 2021

ComputerWeekly.com

Preventing identity theft in a data breach
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, we will explore the links between ransomware attacks, data breaches and identity theft. First, Nicholas Fearn investigates the phenomenon of the double extortion attack, and shares some insider advice on how to stop them, while we'll explore the top five ways data backups can protect against ransomware in the first place.
Posted: 06 May 2021 | Published: 06 May 2021

ComputerWeekly.com

IT Priorites 2020 - After Covid 19 security goes back to basics
sponsored by ComputerWeekly.com
EGUIDE: This year's transition to remote working highlighted big gaps in the fundamentals of security, as updated TechTarget/Computer Weekly data reveals.
Posted: 06 May 2021 | Published: 06 May 2021

ComputerWeekly.com

Security Think Tank: Critical National Infrastructure
sponsored by ComputerWeekly.com
EGUIDE: We asked our regular panel of cyber experts, the Computer Weekly Security Think Tank, to consider and highlight the risks posed to industrial control systems (ICS) and other elements of operational technology (OT), and advise on what steps CNI operators should be taking to address them.
Posted: 27 Apr 2021 | Published: 27 Apr 2021

ComputerWeekly.com

The Enterprise Technology Orchestration Guide To Infosec
sponsored by Oomnitza
WHITE PAPER: The security aspect of IT asset management (ITAM) cannot be understated. Especially today – when resources are spread out and harder to keep an eye on. Technology orchestration gives your enterprise the opportunity to let IT take care of itself, tightening security and simplifying management. View this white paper to learn more.
Posted: 22 Apr 2021 | Published: 22 Apr 2021

Oomnitza

Security Think Tank: Biden's Cyber Security Plan
sponsored by ComputerWeekly.com
EGUIDE: As Biden sets out his agenda for the next four years, the Computer Weekly Security Think Tank considers the opportunities for renewed international collaboration on cyber security, what aspects of cyber policy Biden would be best advised to focus on, and asks how the industry can better make its voice heard.
Posted: 22 Apr 2021 | Published: 22 Apr 2021

ComputerWeekly.com

CYA (Cover Your Assets): Leveraging Enterprise Technology Orchestration For Cybersecurity
sponsored by Oomnitza
DATA SHEET: After an asset is compromised, the first question asked by security operations is always ‘which asset?’. Through orchestration of enterprise technology, SecOps can leverage automation to answer this question (and others) in less time. Dive into this data sheet to discover 3 use cases or technology orchestration for cybersecurity.
Posted: 20 Apr 2021 | Published: 26 Feb 2021

Oomnitza

The 10 Essential Capabilities Of A Best-of-breed Soar
sponsored by Splunk
WHITE PAPER: Security analysts face high alert volumes, an overload of point-products to manage and a shortage of skilled talent. Security orchestration, automation and response (SOAR) tools have served as remedies, but not all of these tools are created equal. In this white paper, Splunk outlines 10 capabilities to look for when evaluating SOAR technology.
Posted: 09 Apr 2021 | Published: 09 Apr 2021

Splunk

The Fundamental Guide To Building A Better Soc
sponsored by Splunk
RESOURCE: There simply isn’t enough skilled security talent out there, and that which does exist is expensive. So what are companies who rely on dinosaur technology to do? They need to start building a next generation, modern SOC, today. Download your complimentary copy of The Fundamental Guide to Building a Better Security Operation Center (SOC) today.
Posted: 08 Apr 2021 | Published: 08 Apr 2021

Splunk

How to Become a Threat Hunter
sponsored by Cisco Systems Inc.
EGUIDE: Much of hunting is instinct, and when it comes to hunting cyberthreats, it’s no different. Threat hunters are good at what do because they aren’t as ‘by-the-book’ as other professionals. But they do have a set of learnable skills that make them successful. Download this e-guide featuring Gartner analyst John Collins to know what these skills are.
Posted: 14 Apr 2021 | Published: 07 Apr 2021

Cisco Systems Inc.
1 - 25 of 2525 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences