IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed   
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 

Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Management Reports
1 - 25 of 3615 Matches Previous Page  |  Next Page
The Unified Access Management Playing Field
sponsored by OneLogin
RESOURCE: Today, employees expect to work the way they live—not to step back in time when they work, whether they're in the office or remote. Read on to find out why IT leaders are rethinking their IAM strategy and moving towards a unified approach to access management.
Posted: 17 Jan 2019 | Published: 17 Jan 2019

OneLogin

Analyst Identity and Access Management Maturity Assessment
sponsored by OneLogin
ANALYST REPORT: To help security leaders, Forrester developed an IAM maturity assessment tool to help identify gaps in their current IAM strategy and practices and improve their overall security posture. Read on to see where your organization stacks up.
Posted: 17 Jan 2019 | Published: 23 Aug 2018

OneLogin

Post-Perimeter Security
sponsored by Lookout
VIDEO: In order to stay secure in the post perimeter world, enterprises must first test the health of devices and then trust the user. Download this video to learn how Lookout's zero-trust access model can help secure your organization with continuous monitoring and alerts today
Posted: 16 Jan 2019 | Premiered: 31 Oct 2018

Lookout

Putting the Trust in Zero Trust: Post-Perimeter Security for a New Age of Work
sponsored by Lookout
WHITE PAPER: As employees continue to use a mix of managed and unmanaged devices, it sets up the need for a new security architecture: Post-perimeter security. Read on to find out why perimeter security is no longer viable and how you can embrace this new architecture in your environment.
Posted: 15 Jan 2019 | Published: 15 Jan 2019

Lookout

Empowering Big Data in a Data-driven Economy
sponsored by comForte GmbH
WHITE PAPER: Fewer things have been more transformational in IT than the rise of Big Data. It has given organizations the ability to use, monetize, and learn from data. However, bad actors also know the value of data so the threats are real. In this white paper, learn how to protect your most valuable asset: data.
Posted: 15 Jan 2019 | Published: 15 Jan 2019


SANS Product Review Webinar
sponsored by WhiteSource
WEBCAST: Whitesource's open source security solution helps automate the finding of vulnerabilities and open source components and then bridges the gap between development and security professionals. In this webcast, Serge Borso will share his experiences working with Whitesource over the last couple of months.
Posted: 14 Jan 2019 | Premiered: Oct 3, 2018

WhiteSource

DomainTools Guide to Threat Hunting with Splunk and Phantom
sponsored by DomainTools
WEBCAST: Threat hunting is a hypothesis driven approach to validating the collection, detection and analysis of data ahead of an incident. The first step to integrating threat hunting into your organization is establishing a true threat hunting program. In this webcast, learn about a number of threat hunting essentials.
Posted: 14 Jan 2019 | Premiered: Jan 14, 2019

DomainTools

SANS Fingerprinting Threat Actors with Web Assets
sponsored by DomainTools
WEBCAST: Threat intelligence helps companies better predict the actions of threat actors to stay ahead of their attacks. In order to do this, organizations must learn more about the enemy. In this webcast, SANS instructor Rebekah Brown and Data Systems Engineer at DomainTools, Mike Thompson discuss ways to better fingerprint threat actors.
Posted: 11 Jan 2019 | Premiered: May 31, 2018

DomainTools

SANS 2018 Threat Hunting Survey Results
sponsored by DomainTools
WHITE PAPER: Threat hunting is a focused and iterative approach to searching out, identifying and understanding adversaries who have entered the defender's networks. Threat hunting is a hypothesis-driven approach to validating the collection, detection and analysis of data ahead of an incident. In this white paper, learn about all things threat hunting.
Posted: 11 Jan 2019 | Published: 30 Sep 2018

DomainTools

Automating Open Source Security: A SANS Review of WhiteSource
sponsored by WhiteSource
PRODUCT OVERVIEW: In this SANS product review, explore how WhiteSource's technology works, how it can be set up, and how to use it to automate the process of open source component vulnerability detection, remediation, and overall vulnerability management.
Posted: 10 Jan 2019 | Published: 10 Jan 2019

WhiteSource

How Healthcare Organizations Can Combat Security Threats
sponsored by Arctic Wolf
EGUIDE: Learn how your organization can meet compliance obligations while maintaining an optimal security strategy that detects and responds to advanced security threats.
Posted: 10 Jan 2019 | Published: 28 Dec 2018

Arctic Wolf

2019: No Oscars for Bad Threat Actors
sponsored by DomainTools
WEBCAST: There has been a massive increase in the number and types of cybersecurity threats over the years. In this webcast, experts from DomainTools discuss some cyber forecasts and predictions for the coming years including IoT devices, automation, breaches and more.
Posted: 10 Jan 2019 | Premiered: Dec 31, 2018

DomainTools

2018 Threat Intelligence Report
sponsored by AlienVault
RESOURCE: Explore how organizations are leveraging threat intelligence data, the benefits and most critical features of threat intelligence platforms, and the biggest cyberthreats organizations are using their threat intelligence to combat.
Posted: 10 Jan 2019 | Published: 10 Jan 2019

AlienVault

2018 Cybersecurity Report Card: Organizations Rate their Security Posture and Share Best Practices
sponsored by DomainTools
WHITE PAPER: Responses from the 2018 Report Card survey shed light on how cybersecurity practices are evolving, and what the most successful organizations are doing to ensure they stay ahead of the ever-growing and changing threat landscape. This report outlines key findings from the survey and suggests how companies can improve their security efforts.
Posted: 10 Jan 2019 | Published: 31 Dec 2018

DomainTools

Detect Advanced Threats with Endpoint Detection and Response (EDR)
sponsored by AlienVault
RESOURCE: Learn how your security teams can detect and respond to threats faster using endpoint detection and response solutions.
Posted: 10 Jan 2019 | Published: 10 Jan 2019

AlienVault

Security Information and Event Management (SIEM) Mid-Market Analysis
sponsored by AlienVault
RESOURCE: Download this executive brief to view a SIEM market overview, primary SIEM use cases, a SWOT analysis of top mid-market competitors, and more.
Posted: 10 Jan 2019 | Published: 10 Jan 2019

AlienVault

Open Source Security: Case Study
sponsored by WhiteSource
CASE STUDY: Discover how Siemens Healthineers, the largest industrial manufacturer in Europe, was able to keep their open source software secure and compliant using WhiteSource.
Posted: 09 Jan 2019 | Published: 09 Jan 2019

WhiteSource

The State of Open Source Vulnerabilities Management
sponsored by WhiteSource
WEBCAST: Open source software has become an indispensible part of the software industry. However, development and security teams are challenged to meet open source security objectives, without compromising on speed and quality. This webcast discusses the key strategy for effective vulnerability management.
Posted: 09 Jan 2019 | Premiered: Nov 15, 2018

WhiteSource

Information Insight for GDPR Readiness
sponsored by Micro Focus
WHITE PAPER: The European Union General Data Protection Regulation (GDPR) is the world's most important regulation involving individuals' information. Organizations must comply with its regulations in order to guard against risk. In this white paper, learn how information management and governance software can help organizations.
Posted: 09 Jan 2019 | Published: 30 Jun 2018

Micro Focus

Top 10 IT security stories of 2018
sponsored by ComputerWeekly.com
EGUIDE: The discovery of the Meltdown and Spectre microprocessor vulnerabilities, and several similar vulnerabilities in the months that followed, were probably the single most challenging developments for enterprise IT security teams in 2018. Here's a look back over Computer Weekly's top 10 IT Security stories of 2018.
Posted: 09 Jan 2019 | Published: 09 Jan 2019

ComputerWeekly.com

Program Launch: Citrix Ready Secure Remote Access Program
sponsored by Citrix Ready
WEBCAST: Tune in at 9:00 AM PST on Thursday, February 7th to learn about the Citrix Ready Secure Remote Access Program, a new evolution in the cyber-security landscape designed to smoothly integrate security considerations into the flexibility of today's workforce.
Posted: 08 Jan 2019 | Premiered: Jan 8, 2019

Citrix Ready

Securing Open Source, Part 1 & 2
sponsored by WhiteSource
RESEARCH CONTENT: In this report, explore how the boom in open source software (OSS) has led to an increased awareness of open source risks, from licensing issues to security – and the measures that are required to protect organizations against those risks.
Posted: 08 Jan 2019 | Published: 07 Sep 2018

WhiteSource

When it Comes to Securing Your Open Source Components, WhiteSource Has You Fully Covered
sponsored by WhiteSource
WHITE PAPER: Open source components are the core building blocks of modern applications. However, development teams have been neglectful when it comes to ensuring that they meet basic security standards. In this white paper, learn about open source security challenges, the two pillars of open source security and why automation is king.
Posted: 08 Jan 2019 | Published: 08 Jan 2019

WhiteSource

The Complete Guide on Open Source Security
sponsored by WhiteSource
WHITE PAPER: Open source components are the core building blocks of application software, providing developers with a wealth of off-the-shelf possibilities that they can use for assembling their products. However, the industry has been lax when it comes to meeting basic security standards. In this white paper, learn about securing open source components.
Posted: 08 Jan 2019 | Published: 08 Jan 2019

WhiteSource

The State of Open Source Vulnerabilities Management
sponsored by WhiteSource
RESEARCH CONTENT: Open source usage is a mainstream practice in this day and age. The rise in open source usage has led to a dramatic rise in open source vulnerabilities, bringing to the fore interesting developments in open source security. This report drills down into the deeper layers of the open source phenomena.
Posted: 08 Jan 2019 | Published: 08 Jan 2019

WhiteSource
1 - 25 of 3615 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement