IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed   
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 

Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Management Reports
1 - 25 of 2925 Matches Previous Page  |  Next Page
The Fidelis Threat Intelligence Toolkit is Here
sponsored by Fidelis
RESOURCE: Organizations are struggling to keep up with threat actors as they engage different vectors and develop their toolkit of attacks. It seems only fair, then, that you have a toolkit of your own. Click here to access your Fidelis Threat Intelligence Toolkit. Leverage the latest cybersecurity news and know what’s on the prowl and how to defend.
Posted: 21 Jan 2021 | Published: 21 Jan 2021

Fidelis

Vendor Research Report for IT Risk Management
sponsored by MetricStream
ANALYST REPORT: By 2025, 50% of businesses will depend on risk management solutions. As such, security and risk management leaders are hunting for such solutions based on cybersecurity initiatives, board risk oversight and digital compliance obligations. Use this Gartner Magic Quadrant to evaluate the strengths and cautions of various players in the space.
Posted: 21 Jan 2021 | Published: 11 Aug 2020

MetricStream

Avoiding the Crippling Effects of Ransomware Through Early Detection & Response
sponsored by Fidelis
PODCAST: Ransomware remains high on the list of security concerns for enterprises, CISOs and CIOs. But early detection can help your organization, and it’s key in avoiding significant damage and cost. Tune into this podcast to hear former NSA CISO Chris Kubic as he discusses why ransomware is so dangerous and how to protect against it.
Posted: 21 Jan 2021 | Premiered: Jan 21, 2021

Fidelis

The Top 10 UEBA Use Cases for Today’s SOCs
sponsored by Exabeam
VIDEO: User and Entity Behavior Analytics (UEBA) is a threat detection practice created by Gartner in which human and machine behavior is observed in order to establish a baseline, making it easier to find and investigate anomalies. This webinar provides an in-depth look at UEBA, offering expert tips, use cases, and more – watch now to get started.
Posted: 21 Jan 2021 | Premiered: 21 Jan 2021

Exabeam

DevOps Security, Monitoring & Compliance with OpenShift and Sysdig
sponsored by Red Hat
VIDEO: IT, cloud and DevOps-related risks are on the rise and addressing these challenges alone can be resource-intensive. In this webinar, join experts at Red Hat and Sysdig as they discuss how to extend security, compliance and monitoring capabilities with a secure-by-design platform – watch now to get started.
Posted: 21 Jan 2021 | Premiered: 21 Jan 2021

Red Hat

Automating TLS provisioning with OpenShift Service Mesh
sponsored by Red Hat
VIDEO: Traditional application servers are being replaced by modern application microservices architectures that enable distributed workforces to collaborate. This webinar highlights the importance of using mutual TLS (mTLS) to secure communications between services and overviews some of the nuances about its setup – watch now to get started.
Posted: 21 Jan 2021 | Premiered: 21 Jan 2021

Red Hat

Why Hackers Hack
sponsored by Carbonite
WHITE PAPER: This white paper breaks down some of the most common hacker myths and unveils the true methods and motivations behind these myths to help your organization lock down and protect customers against today’s biggest threats. Download to read more.
Posted: 21 Jan 2021 | Published: 21 Jan 2021

Carbonite

Curated Insights on IT GRC
sponsored by MetricStream
EBOOK: Sustainable cyber resilience requires a proactive approach to address today’s cyber risks. In this e-book, discover how organization can achieve cyber resilience in an increasingly digitized world, gain quick tips for achieving budgetary approval from the board and discover how to combat todays threats – read on to unlock this exclusive insight.
Posted: 20 Jan 2021 | Published: 20 Jan 2021

MetricStream

Financial Grade APIs Using OAuth and OpenID Connect
sponsored by Curity AB
WHITE PAPER: OAuth and OpenID Connect are international standards that define methods for securing APIs. They carry much weight when it comes to financial compliance. In this white paper, explore various aspects of OAuth and OpenID Connect that can be used to conform to the revised Directive on Payment Services (PSD2) and the GDPR.
Posted: 20 Jan 2021 | Published: 20 Jan 2021

Curity AB

IT and Cyber Risk Management: The Accelerated Approach
sponsored by MetricStream
EBOOK: While business leaders agree on the seriousness of cyber risks, there is often disagreement on where to allocate budge – leading to fractured security efforts that are rarely effective. Read this e-book to unlock a 5-step approach that CISOs can use to address these disagreements and direct a unified approach to security and risk management.
Posted: 20 Jan 2021 | Published: 20 Jan 2021

MetricStream

The API Security Maturity Model
sponsored by Curity AB
EBOOK: API security has become a forefront issue for modern enterprises. Many API security implementations exist, but not all are effective. How can you ensure that your APIs are mature and secure? Download The API Security Maturity Model, which reframes the degrees of web service development maturity through a security lens.
Posted: 20 Jan 2021 | Published: 20 Jan 2021

Curity AB

Using Online Identities in Professional Investigations
sponsored by Pipl
WHITE PAPER: As interactions have become more and more digital, online identities have emerged to replace the traditional notion of a user identity. Read this white paper to learn more about the changing nature of identity and how Pipl leverages online identity data to enhance investigations into today’s cyberthreats.
Posted: 20 Jan 2021 | Published: 20 Jan 2021

Pipl

Online Identity and the Digital Economy of Tomorrow
sponsored by Pipl
EGUIDE: Identity verification has evolved from traditional methods – which required the presence of government-issued documents – towards digital, multi-layered methods. Read this e-guide for an in-depth analysis of the challenges of today’s environments and explore the emerging trends shaping the future of identity verification.
Posted: 20 Jan 2021 | Published: 20 Jan 2021

Pipl

Inky 2020 End of Year Phishing Report
sponsored by Inky Technology
RESEARCH CONTENT: With most people working remote in 2020, reliance on email for communication grew even higher – leading to a stark rise in phishing attacks. This report reflects on the top threat types and security strategies for phishing in 2020 and offers insight into what to expect in 2021 – read on to unlock the full report.
Posted: 20 Jan 2021 | Published: 20 Jan 2021

Inky Technology

Fighting Hackers & Responding to Ransomware: A How-To
sponsored by Fidelis
EGUIDE: Cyberthreats aren’t going away any time soon. It’s vital that you take steps to ready your organization for any attack that comes your way. In this expert e-guide, explore 5 actionable deception-tech steps for fighting hackers as well as 9 steps for creating a ransomware incident response plan. Open now to put your best security foot forward.
Posted: 20 Jan 2021 | Published: 15 Jan 2021

Fidelis

API Security Checklist
sponsored by Curity AB
EGUIDE: As APIs grow in usage, they become a more valuable target for cybercriminals. This API Security Checklist was written to help guide you on your journey towards protecting web APIs by offering insight into emerging threats, best practices and expert insights – read on to unlock the full guide.
Posted: 19 Jan 2021 | Published: 19 Jan 2021

Curity AB

AT&T Business: Customer Stories – NHS Management, LLC
sponsored by AT&T Cybersecurity
CASE STUDY: In this case study, see how NHS Management, a healthcare provider that supports 50 nursing homes, was able to address the growing security needs of their patients and establish a threat detection and incident response program that allowed them to protect and prevent unwanted access to patient data – read on for the full story.
Posted: 19 Jan 2021 | Published: 19 Jan 2021

AT&T Cybersecurity

AT&T Managed Threat Detection and Response
sponsored by AT&T Cybersecurity
DATA SHEET: Threat detection and incident response is the bread and butter of an organization’s ability to quickly and reliably mitigate potential threats. Read this data sheet for a closer look at the capabilities and potential benefits of AT&T’s Managed Threat Detection and Response offering.
Posted: 19 Jan 2021 | Published: 19 Jan 2021

AT&T Cybersecurity

Online Identity Information for Professionals
sponsored by Pipl
DATA SHEET: Microsoft, IBM, Twitter, BBC, eBay are among the industry leaders that use Pipl in their identity information investigations – but why? This Pipl data sheet provides an overview of Pipl’s mission, key features, strategic capabilities, and more. Read on to unlock the full data sheet.
Posted: 19 Jan 2021 | Published: 19 Jan 2021

Pipl

How to Protect Your Organization with Managed Threat Detection and Response
sponsored by AT&T Cybersecurity
WEBCAST: Security is spreading its wings. SD-WAN and cloud-based security are both being adopted at a high rate, and this adoption begins with conversations about cyber risk. Because security talent is in short supply, professionals need to find ways to fend off threats. Watch this webcast for a live demo of AT&T’s Managed Threat Detection and Response.
Posted: 19 Jan 2021 | Premiered: Jan 19, 2021

AT&T Cybersecurity

New rules, risks, and rewards: protecting the future of retail
sponsored by AT&T Cybersecurity and Fortinet
WHITE PAPER: For today’s retailers, gathering valuable insights from customer interactions can be pivotal in enhancing and customizing the user experience – hopefully leading to a purchase and lifetime loyalty. However, these advancements can invite a new wave of cyberthreats. Read this white paper to explore a modern security approach for retailers.
Posted: 19 Jan 2021 | Published: 19 Jan 2021

AT&T Cybersecurity and Fortinet

RiskTech 100 2021 Research Report
sponsored by MetricStream
RESEARCH CONTENT: Changes in the risk and compliance landscape were accelerated last year, likely due to the spread of COVID-19 – So what will the technology trends, security threat types and emerging offerings in this landscape look like in 2021? Read this exclusive RiskTech 100 research report to find out.
Posted: 19 Jan 2021 | Published: 19 Jan 2021

MetricStream

OAuth and OpenID Connect - What's Next?
sponsored by Curity AB
WEBCAST: The OAuth 2.0 framework has provided identity professionals open standards for authenticating users, but the world is now mobile, and the way apps are being built is changing. OpenID Connect by Curity is an identity layer on top of the current OAuth protocol that is API-ready for a remote workforce. Watch this webcast to see why this matters now.
Posted: 19 Jan 2021 | Premiered: Jan 19, 2021

Curity AB

Seamlessly Scale Security on AWS with Fortinet
sponsored by Fortinet, Inc.
VIDEO: While cloud is at the foundation of modern innovation, it has the potential to introduce a new array of risks and threats to organizations that aren’t prepared. Watch this webinar – which features security leaders at Fortinet and AWS – to unlock best practices, expert insights, and more.
Posted: 19 Jan 2021 | Premiered: 19 Jan 2021

Fortinet, Inc.

JumpStart Guide to Application Security in AWS
sponsored by Fortinet, Inc.
VIDEO: Deploying and securing critical business applications in cloud environments is becoming a standard practice for today’s IT and security driven organizations. In this webinar, join security experts from SANS, Fortinet and AWS as they discuss how to deploy and security applications in AWS environments – watch now for exclusive insight.
Posted: 19 Jan 2021 | Premiered: 19 Jan 2021

Fortinet, Inc.
1 - 25 of 2925 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info