IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed   
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 

Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Management Reports
1 - 25 of 2956 Matches Previous Page  |  Next Page
Leveraging Public Cloud to Operationalize Security While Confronting Today’s Workplace Realities
sponsored by Splunk
WHITE PAPER: With the amount of people now working from home, it stands to reason that organizations are searching for ways to amplify their security in a way that is manageable. Cloud-based security may be the answer. Read this custom white paper to learn about the benefits of security through the cloud and how they align with the future.
Posted: 25 Sep 2020 | Published: 25 Sep 2020

Splunk

Definitive Guide to Moving Target Defense for Automated Bot Attacks
sponsored by BotRX
WHITE PAPER: As of February 2020, the total number of websites has topped 1.7 billion, with nearly half of the traffic to those sites credited to bots. Threat actors have evolved malicious bots to where their detection has become near-impossible, even by advanced AI & ML. But there’s another way. Read this white paper to learn about Moving Target Defense.
Posted: 25 Sep 2020 | Published: 25 Sep 2020

BotRX

AI, CWPPs & DevSecOps: The Future of Cybersecurity
sponsored by Rezilion
EGUIDE: Artificial intelligence, DevSecOps and cloud security have all emerged as transformative technologies within the cybersecurity industry. This e-guide explores each of these areas by providing 3 expert articles. Read on to unlock your copy.
Posted: 25 Sep 2020 | Published: 01 Sep 2020

Rezilion

Zero Trust Architecture
sponsored by PortSys
WHITE PAPER: Zero trust architecture is an evolution in the access control paradigm. Jump into this detailed document to learn how Total Access Control by PortSys maps to NIST SP 800-207, a special publication designed to provide detailed guidance for organizations on six areas of zero trust architecture.
Posted: 25 Sep 2020 | Published: 27 Aug 2020

PortSys

The 2020 Trust Report
sponsored by Synack
RESEARCH CONTENT: The 2020 Trust Report is Synack's essential guide for CISOs and CIOs, executives, and other security professionals to understand how different industries and sectors of the economy measure up when it comes to security preparedness. Download the report to uncover the findings.
Posted: 25 Sep 2020 | Published: 25 Sep 2020

Synack

PortSys: Zero Trust e-book
sponsored by PortSys
EBOOK: Zero trust is gaining popularity due to its flexible approach to enterprise protection. According to the International Data Group, 52% of companies are researching or piloting a zero trust model. If you’re considering a model of your own, read these 5 security questions to learn where you stand, and to see where you could benefit from zero trust.
Posted: 25 Sep 2020 | Published: 01 Aug 2020

PortSys

How to Build a Security Operations Center
sponsored by AT&T Cybersecurity
EBOOK: A robust SOC requires skilled team members and the right technology to truly enhance security—and as an MSP, you can’t afford to let things slip through the cracks. Jump into this guide to learn how to piece together a Security Operations Center that can ensure airtight security protocols without breaking the bank—and without making compromises.
Posted: 25 Sep 2020 | Published: 25 Sep 2020

AT&T Cybersecurity

Executive Summary 2020 Thales Data Threat Report
sponsored by Thales
ANALYST REPORT: Threat intelligence and information has never been more valuable to businesses. As such, an IDC survey commissioned by Thales found that 45% of respondents felt that their organizations would exceed their original 2020 security budgets. In APAC, the time for action is now. Read the full threat report to see how attitudes are changing.
Posted: 24 Sep 2020 | Published: 24 Sep 2020

Thales

Ask These Critical Questions and Consider These Risks When Selecting an MDR Provider
sponsored by GoSecure
RESOURCE: According to Gartner, 25% of organizations will be using managed detection and response (MDR) services by 2024. So when considering key requirements and managing risks associated with outsourcing threat detection and response, it’s critical that you ask the right questions. View this Gartner report to learn what these questions are and more.
Posted: 23 Sep 2020 | Published: 31 Oct 2019

GoSecure

Phishing Attacks Advanced Techniques That Evade Detection
sponsored by Vade Secure
WHITE PAPER: The advancement of the phishing attack has left organizations looking for ways to identify the growing number of unique phishing URLs sent to their email servers. From spoofing addresses to exploiting credentials, these attacks grow more complex yearly. Don’t get left behind – read this comprehensive guide on phishing.
Posted: 22 Sep 2020 | Published: 22 Sep 2020


Email Security for Microsoft 365
sponsored by Vade Secure
WHITE PAPER: Cybercriminals are using email to target the weakest link in an organization’s cybersecurity chain: humans. You may have enabled email security add-ons for Microsoft 365, but you’re not as safe as you think. Read this white paper to learn how to keep your email safe from phishing, spear phishing and zero-day attacks.
Posted: 22 Sep 2020 | Published: 22 Sep 2020


Putting the Trust in Zero Trust
sponsored by Lookout
WHITE PAPER: As workforces become more distributed and employees favor their BYOD devices, cybersecurity risks evolve to the point where traditional perimeter tactics are no longer relevant. Enter zero trust for mobile – a scalable approach to protecting every device within the network. Read on to learn more about this.
Posted: 22 Sep 2020 | Published: 22 Sep 2020

Lookout

How Lookout Helps You Align with NIST Guidelines
sponsored by Lookout
CASE STUDY: When it comes to structuring cybersecurity strategies and initiatives, many organizations turn to guidelines and best practices outlined by the National Institute of Standard and Technology (NIST). In this case study, take a closer look at NIST’s updated mobile security guidelines and discover how Lookout can help get you aligned.
Posted: 22 Sep 2020 | Published: 22 Sep 2020

Lookout

AppSec for the Newly Hired CISO/CSO
sponsored by Contrast Security
EBOOK: For new CISOs and CSOs, the tasks and demands of the new role can be overwhelming – especially as digital transformation changes conventional approaches to application security. Read this e-book for AppSec guidance and best practices for new CISO/CIOs.
Posted: 22 Sep 2020 | Published: 22 Sep 2020

Contrast Security

How companies in Asia-Pacific are addressing remote workplace security challenges
sponsored by Barracuda
WHITE PAPER: According to a recent study, 62% of APAC organizations said they wouldn’t have implemented remote working for another 5 years if it weren’t for COVID-19. The rapid adoption of the new normal has left many of these organizations vulnerable – read this white paper to learn how APAC organizations are addressing these security challenges.
Posted: 22 Sep 2020 | Published: 22 Sep 2020

Barracuda

How to Respond Rapidly to Emerging Cyberthreats
sponsored by ThreatQuotient
PRODUCT DEMO: Since the COVID-19 pandemic began, organization’s have had to deal with a growing volume of cyberthreats that look to take advantage of uncertainty and commotion as an entry point for their attacks. Watch this video demo to see how the ThreatQ platform handles these kinds of threats.
Posted: 21 Sep 2020 | Premiered: 21 Sep 2020

ThreatQuotient

Why Privileged Access Management Needs to Be Part of Your Virtualization Strategy
sponsored by Tehama
RESOURCE: As organizations rely more on remote capabilities for ensuring productivity during the new normal, cybercriminals have shifted their tactics to focus on this lucrative new vector. This article highlights emerging cyberthreat tactics and overviews the benefits of incorporating privileged access management (PAM) into virtualization strategies.
Posted: 21 Sep 2020 | Published: 17 Sep 2020

Tehama

2020 Application Security Observability Report
sponsored by Contrast Security
WHITE PAPER: Nearly 96% of applications contain at least one vulnerability, yet only 26% have a serious vulnerability – modern vulnerability management, especially when it comes to applications – is about effectively prioritization. For more findings and guidance for building an application security strategy, read this research report.
Posted: 21 Sep 2020 | Published: 13 Jul 2020

Contrast Security

Incident Response Tools: How, When & Why to Use Them
sponsored by Claranet
EGUIDE: Incident response tools are growing in popularity as an effective method for proactively analyzing and addressing the vulnerabilities within your network. This e-guide was written to help readers through the vetting process as well as understand how, when and why to use them – read on to get started.
Posted: 21 Sep 2020 | Published: 17 Sep 2020

Claranet

Securing the Remote Revolution
sponsored by AWS & CrowdStrike
EBOOK: Protecting modern remote workforces requires security capabilities that go beyond traditional approaches. This e-book provides an overview of the emerging adversary tactics targeting remote workforces and highlights new and effective cybersecurity strategies for a fully remote world – read on to get started.
Posted: 21 Sep 2020 | Published: 21 Sep 2020

AWS & CrowdStrike

Enhancing Orchestration Using Threat Intelligence
sponsored by ThreatQuotient
VIDEO: Managing modern risk requires dedicated threat intelligence platforms that equip organizations with the information and guidance needed to identity and thwart potential cyberattacks. Watch this webinar to learn about how threat intelligence can (and should) be used to enhance security orchestration initiatives.
Posted: 21 Sep 2020 | Premiered: 21 Sep 2020

ThreatQuotient

How to Spot a Spear Phishing Email
sponsored by Vade Secure
RESOURCE: The personal nature of spear phishing emails can often make them hard to spot – especially when the sender adopts the persona of a trusted friend or colleague. To help you better spot these attempts, this resource highlights 5 details to look for to determine if an email is spear phishing or legitimate.
Posted: 18 Sep 2020 | Published: 18 Sep 2020


Dunkirk Enhances Microsoft 365 Email Security with Vade Secure for Microsoft 365
sponsored by Vade Secure
CASE STUDY: The victim of targeted attacks, the city and urban community of Dunkirk sought to bolster their defenses against email-based cyberattacks. This case study provides an overview of Dunkirk’s selection criteria as well as the results of their email security project – read on to get started.
Posted: 18 Sep 2020 | Published: 18 Sep 2020


The Evolution of Application Fraud
sponsored by F5 Networks
RESOURCE: Cyberattacks targeting business applications have been on the rise in recent years – an issue made exponentially more prominent as web applications grew in popularity due to COVID-19 changes. This resource provides an overview of the evolution of application fraud – read on to get started.
Posted: 18 Sep 2020 | Published: 18 Sep 2020

F5 Networks

Credential Stuffing 2020: Attack Tools and Trends
sponsored by F5 Networks
VIDEO: Recently emerging as one of the most prominent threats targeting web applications, credential stuffing has found its way into news headlines and mainstream media. This webinar provides an overview of the current credential stuffing trends and tactics – highlighting how the threat has evolved over the years.
Posted: 18 Sep 2020 | Premiered: 18 Sep 2020

F5 Networks
1 - 25 of 2956 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info