IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed   
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 

Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Management Reports
1 - 25 of 2493 Matches Previous Page  |  Next Page
Top 10 cyber crime stories of 2019
sponsored by ComputerWeekly.com
EGUIDE: Once again, in 2019 the cyber threat landscape proved the old biblical adage correct – there is nothing new under the sun. Data breaches were 10 a penny – indeed, in some cases they can actually be bought for pennies. Here are Computer Weekly's top 10 cyber crime stories of 2019.
Posted: 10 Sep 2021 | Published: 27 Dec 2019

ComputerWeekly.com

A Gorilla Guide to Modern Data Protection
sponsored by Pure Storage
EBOOK: PH
Posted: 10 Sep 2021 | Published: 10 Sep 2021

Pure Storage

Improved Ransomware Recoverability wth SafeMode on FlashBlade from Pure Storage
sponsored by Pure Storage
EBOOK: PH
Posted: 10 Sep 2021 | Published: 10 Sep 2021

Pure Storage

A Hacker's Guide to Ransomware Mitigation and Recovery
sponsored by Pure Storage
EBOOK: PH
Posted: 10 Sep 2021 | Published: 10 Sep 2021

Pure Storage

Real- world SLAs and Availability Requirements
sponsored by Pure Storage
EBOOK: PH
Posted: 10 Sep 2021 | Published: 10 Sep 2021

Pure Storage

A Computer Weekly buyer's guide to SIEM and SOAR
sponsored by ComputerWeekly.com
EGUIDE: The question of how to use data has big implications on a company's performance. In this 16-page buyer's guide, Computer Weekly looks at how SIEM and SOAR tools assist IT teams, why security tools require strong internal security processes to work effectively and what role they have in a rapidly changing cyber threat landscape.
Posted: 09 Sep 2021 | Published: 09 Sep 2021

ComputerWeekly.com

The Future of Successful Cloud Migration is Now
sponsored by WANdisco
VIDEO: PH
Posted: 02 Sep 2021 | Premiered: 02 Sep 2021

WANdisco

Strategies for Migrating Hadoop On-Premises to AWS
sponsored by WANdisco
EBOOK: Read this white paper to learn how you can more easily migrate your Hadoop data to AWS to boost performance, save money, and improve processes.
Posted: 31 Aug 2021 | Published: 31 Aug 2021

WANdisco

Security Think Tank: Critical National Infrastructure
sponsored by ComputerWeekly.com
EGUIDE: We asked our regular panel of cyber experts, the Computer Weekly Security Think Tank, to consider and highlight the risks posed to industrial control systems (ICS) and other elements of operational technology (OT), and advise on what steps CNI operators should be taking to address them.
Posted: 27 Aug 2021 | Published: 27 Aug 2021

ComputerWeekly.com

How do you solve a problem like security training?
sponsored by ComputerWeekly.com
EGUIDE: In this E-Guide, we will the tricky topic of security awareness training. Firstly, we try to answer the burning question of how to get employees to pay attention to training and take it seriously. Then, we take a look at some security awareness best practices that you can use to craft training your users will actually benefit from.
Posted: 27 Aug 2021 | Published: 27 Aug 2021

ComputerWeekly.com

Security Think Tank: Biden's Cyber Security Plan
sponsored by ComputerWeekly.com
EGUIDE: As Biden sets out his agenda for the next four years, the Computer Weekly Security Think Tank considers the opportunities for renewed international collaboration on cyber security, what aspects of cyber policy Biden would be best advised to focus on, and asks how the industry can better make its voice heard.
Posted: 27 Aug 2021 | Published: 27 Aug 2021

ComputerWeekly.com

Counter Ransomware Attacks with Cohesity
sponsored by Cohesity and Wipro
WHITE PAPER: It’s important to be able to counter the ransomware threat by eliminating the risk of expensive downtime. Read on to learn how Cohesity uses machine learning technologies to help you protect your backup data with immutable file protection and multifactor authentication, detect intruders, and accelerate recovery times.
Posted: 24 Aug 2021 | Published: 24 Aug 2021

Cohesity and Wipro

Cloud-Native Data Protection in the Era of Ransomware
sponsored by Clumio
VIDEO: Take a quick survey to watch this webcast and learn how Clumio can protect your native cloud workloads in the era of ransomware.
Posted: 24 Aug 2021 | Premiered: 24 Aug 2021

Clumio

The Cloud - Trouble with Snapshots
sponsored by Clumio
VIDEO: When it comes to data protection in the cloud, cloud architects can’t just rely on snapshot management due to exorbitant costs and security vulnerabilities. Take a quick survey to access this video to learn about Clumio’s secure backup as a service for the all-cloud world.
Posted: 24 Aug 2021 | Premiered: 24 Aug 2021

Clumio

Best Practices to Protect your Organization Against Ransomware Threats
sponsored by Clumio
BLOG: This blog post covers 5 steps to developing a defensive security posture to safeguard your data against ransomware and lays out how Clumio can help. Take a quick survey to get access right away.
Posted: 24 Aug 2021 | Published: 27 Jul 2021

Clumio

Overcoming the Challenges with Backup for AWS
sponsored by Clumio
EBOOK: This e-book explores the major gaps that can put AWS data at risk, according to Clumio, and explains how Clumio’s data protection, with its improved visibility, simple management, and low TCO, can help. Take this quick survey to learn more.
Posted: 24 Aug 2021 | Published: 24 Aug 2021

Clumio

MPA Combats Ransomware and Frees Up IT Resources with Cloud- Native Backup-as-a-Service
sponsored by Clumio
EBOOK: Take a quick survey to gain access to this case study to learn how Clumio’s backup provided MPA with air-gapped coverage, reduced complexity, proactive support, lower TCO and more.
Posted: 24 Aug 2021 | Published: 24 Aug 2021

Clumio

Stay ahead of Ransomware Get back up and running
sponsored by Clumio
DATA SHEET: Clumio Enterprise Backup as a Service’s air-gap protection provides a new approach to beating ransomware and ensuring a quick recovery. Take this quick survey to gain access to a free infographic and learn more.
Posted: 24 Aug 2021 | Published: 24 Aug 2021

Clumio

Security Think Tank Pt.2 - 2020 bought us universal remote working. So what next?...
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide: Each month Computer Weekly poses a question to its Security Think Tank, a panel of cyber security experts comprising industry insiders, technologists, analysts, legal experts and educators, to share their years of collective cyber security wisdom with the security community.
Posted: 06 Aug 2021 | Published: 06 Aug 2021

ComputerWeekly.com

SIEM, SOAR or both? Our security experts weigh in
sponsored by ComputerWeekly.com
EGUIDE: In this E-Guide we turn to the Computer Weekly Security Think Tank, a hand-picked panel of cyber security insiders, experts, analysts, and advocates with over a century's worth of collective experience between them, to explore the topic of Security Information and Event Management (SIEM), and Security Orchestration, Automation and Response, (SOAR).
Posted: 06 Aug 2021 | Published: 06 Aug 2021

ComputerWeekly.com

Security Think Tank Pt.1 - 2020 bought us universal remote working. So what next?...
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide: Each month Computer Weekly poses a question to its Security Think Tank, a panel of cyber security experts comprising industry insiders, technologists, analysts, legal experts and educators, to share their years of collective cyber security wisdom with the security community.
Posted: 06 Aug 2021 | Published: 06 Aug 2021

ComputerWeekly.com

How to Shrink Supply Chain Risk
sponsored by TechTarget
RESOURCE: The SolarWinds Orion attacks made victims of government agencies overnight – and without proper protection, your organization could be at risk, too. Download this guide to learn about supply chain attacks, what CISOs are doing to prevent them and detailed instructions on how to prevent bad actors from tampering with your supply chain.
Posted: 02 Aug 2021 | Published: 29 May 2021

TechTarget

Platform Security For The ASEAN Market
sponsored by Datto
WHITE PAPER: As ransomware, cyberattacks, phishing and other forms of malware are becoming increasingly dangerous, it’s important to select a security approach that can guarantee data protection and recovery. Read on to learn why platform security is a cornerstone of effective cyber resilience strategies around the world for many reasons.
Posted: 02 Aug 2021 | Published: 02 Aug 2021

Datto

Secure SD-WAN & SASE: Your 2021 Guidebook
sponsored by TechTarget
RESOURCE: Is your organization prepared for the coming paradigm shift in security? Is your threat defense as strong as it needs to be? Take our short survey to become a member of SearchSecurity's Content Program, where you'll have access to a litany of professional resources to help you bolster security now and into the future.
Posted: 30 Jul 2021 | Published: 28 Aug 2021

TechTarget

Computer Weekly - 24 August 2021: How datacentre power growth is leaving Dublin in distress
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at the challenges faced by Dublin's datacentre sector, as growth leaves the city's electricity infrastructure creaking. We ask whether recent initiatives to close the UK's digital skills gaps are working. And we examine the latest injustice to hit the Post Office Horizon scandal. Read the issue now.
Posted: 20 Aug 2021 | Published: 24 Aug 2021

ComputerWeekly.com
1 - 25 of 2493 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences