IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed   
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 

Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Management Reports
1 - 25 of 2384 Matches Previous Page  |  Next Page
Cybersecurity Risk Rating Solutions Buyers Guide and Recommendations
sponsored by BitSight
EBOOK: PH
Posted: 20 Oct 2021 | Published: 20 Oct 2021

BitSight

Establishing a Universal Understanding of Cyber Risk With Financial Quantification
sponsored by BitSight
EBOOK: PH
Posted: 20 Oct 2021 | Published: 20 Oct 2021

BitSight

Ransomware The Rapidly Evolving Trend
sponsored by BitSight
EBOOK: PH
Posted: 20 Oct 2021 | Published: 20 Oct 2021

BitSight

Using Continuous Monitoring Technology To Revolutionize Vendor Risk Managment
sponsored by BitSight
EBOOK: PH
Posted: 20 Oct 2021 | Published: 20 Oct 2021

BitSight

Credential Stuffing 2021: The Latest Attack Trends and Tools
sponsored by F5 Networks
WHITE PAPER: From the stereotypical loner in the basement to organized criminal gangs and nation states, attackers have become increasingly sophisticated over the past decade. So, how can security and fraud teams stay ahead? The key lies in using automation, machine learning and AI to create a security deterrent. Download this white paper to learn more.
Posted: 18 Oct 2021 | Published: 15 Oct 2021

F5 Networks

CW APAC, October 2021: Tech Career Guide
sponsored by ComputerWeekly.com
EZINE: In this handbook, Computer Weekly looks what is being done to close cyber security’s gender gap in the Asia-Pacific region
Posted: 14 Oct 2021 | Published: 14 Oct 2021

ComputerWeekly.com

Cyber Security: 2021 Worst in Show
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide: Throughout 2021, there has been a strong focus worldwide on how to combat cyber security attacks for most businesses. In this e-guide we take a look at the best of the worst of those attacks to happen throughout January to June this year and how businesses can learn/adapt from these attacks.
Posted: 08 Oct 2021 | Published: 08 Oct 2021

ComputerWeekly.com

Your Edge Computing opportunities
sponsored by Vodafone
EBOOK: In this paper, examine 4 of the main security implications and challenges that must be overcome to embrace and reap the benefits of edge computing. Access the white paper after completing a brief survey.
Posted: 05 Oct 2021 | Published: 05 Oct 2021

Vodafone

SASE: the next generation of security architecture
sponsored by Vodafone
VIDEO: The Secure Access Service Edge (SASE), coined by Gartner, is a rapidly evolving protection security architecture for businesses today. In the age of a remote and hybrid workforce, security and network complexity has only increased. Take the survey to learn about SASE capabilities and features.
Posted: 05 Oct 2021 | Premiered: 25 Oct 2021

Vodafone

The Reality of IAM and Blockchain
sponsored by TechTarget
RESOURCE: You've been chosen to participate in our Identity and Access Management Research Program! By participating in the questionnaire and sharing your valuable cybersecurity insights, you'll gain FREE access to our whole IAM library. We regularly add content, so you'll always be up-to-date on the latest trends, insights, technologies & data.
Posted: 03 Oct 2021 | Published: 02 Nov 2021

TechTarget

MicroScope – October 2021: Choosing a channel career
sponsored by MicroScope
EZINE: In this issue, we explore whether more partners equals better business, and take a closer look at how IT consumption is changing thanks to subscription services. Also read a special feature looking into whether the channel offers good prospects for school-leavers hoping to start on a career path that could make a difference
Posted: 01 Oct 2021 | Published: 01 Oct 2021

MicroScope

Top 10 cyber crime stories of 2019
sponsored by ComputerWeekly.com
EGUIDE: Once again, in 2019 the cyber threat landscape proved the old biblical adage correct – there is nothing new under the sun. Data breaches were 10 a penny – indeed, in some cases they can actually be bought for pennies. Here are Computer Weekly's top 10 cyber crime stories of 2019.
Posted: 10 Sep 2021 | Published: 27 Dec 2019

ComputerWeekly.com

Real- world SLAs and Availability Requirements
sponsored by Pure Storage
ESG: As organizations shift to more hybrid and data-intelligent infrastructures, it becomes critical for both IT practitioners and supporting technology vendors to understand real-world data protection and availability SLAs. Upon completing a short survey, download this ESG report to learn the requirements for both and their effects on business.
Posted: 10 Sep 2021 | Published: 10 Sep 2021

Pure Storage

A Computer Weekly buyer's guide to SIEM and SOAR
sponsored by ComputerWeekly.com
EGUIDE: The question of how to use data has big implications on a company's performance. In this 16-page buyer's guide, Computer Weekly looks at how SIEM and SOAR tools assist IT teams, why security tools require strong internal security processes to work effectively and what role they have in a rapidly changing cyber threat landscape.
Posted: 09 Sep 2021 | Published: 09 Sep 2021

ComputerWeekly.com

The Future of Successful Cloud Migration is Now
sponsored by WANdisco
VIDEO: PH
Posted: 02 Sep 2021 | Premiered: 02 Sep 2021

WANdisco

Strategies for Migrating Hadoop On-Premises to AWS
sponsored by WANdisco
EBOOK: Read this white paper to learn how you can more easily migrate your Hadoop data to AWS to boost performance, save money, and improve processes.
Posted: 31 Aug 2021 | Published: 31 Aug 2021

WANdisco

Security Think Tank: Critical National Infrastructure
sponsored by ComputerWeekly.com
EGUIDE: We asked our regular panel of cyber experts, the Computer Weekly Security Think Tank, to consider and highlight the risks posed to industrial control systems (ICS) and other elements of operational technology (OT), and advise on what steps CNI operators should be taking to address them.
Posted: 27 Aug 2021 | Published: 27 Aug 2021

ComputerWeekly.com

How do you solve a problem like security training?
sponsored by ComputerWeekly.com
EGUIDE: In this E-Guide, we will the tricky topic of security awareness training. Firstly, we try to answer the burning question of how to get employees to pay attention to training and take it seriously. Then, we take a look at some security awareness best practices that you can use to craft training your users will actually benefit from.
Posted: 27 Aug 2021 | Published: 27 Aug 2021

ComputerWeekly.com

Security Think Tank: Biden's Cyber Security Plan
sponsored by ComputerWeekly.com
EGUIDE: As Biden sets out his agenda for the next four years, the Computer Weekly Security Think Tank considers the opportunities for renewed international collaboration on cyber security, what aspects of cyber policy Biden would be best advised to focus on, and asks how the industry can better make its voice heard.
Posted: 27 Aug 2021 | Published: 27 Aug 2021

ComputerWeekly.com

Cloud-Native Data Protection in the Era of Ransomware
sponsored by Clumio
VIDEO: Take a quick survey to watch this webcast and learn how Clumio can protect your native cloud workloads in the era of ransomware.
Posted: 24 Aug 2021 | Premiered: 24 Aug 2021

Clumio

The Cloud - Trouble with Snapshots
sponsored by Clumio
VIDEO: When it comes to data protection in the cloud, cloud architects can’t just rely on snapshot management due to exorbitant costs and security vulnerabilities. Take a quick survey to access this video to learn about Clumio’s secure backup as a service for the all-cloud world.
Posted: 24 Aug 2021 | Premiered: 24 Aug 2021

Clumio

Best Practices to Protect your Organization Against Ransomware Threats
sponsored by Clumio
BLOG: This blog post covers 5 steps to developing a defensive security posture to safeguard your data against ransomware and lays out how Clumio can help. Take a quick survey to get access right away.
Posted: 24 Aug 2021 | Published: 27 Jul 2021

Clumio

Overcoming the Challenges with Backup for AWS
sponsored by Clumio
EBOOK: This e-book explores the major gaps that can put AWS data at risk, according to Clumio, and explains how Clumio’s data protection, with its improved visibility, simple management, and low TCO, can help. Take this quick survey to learn more.
Posted: 24 Aug 2021 | Published: 24 Aug 2021

Clumio

MPA Combats Ransomware and Frees Up IT Resources with Cloud- Native Backup-as-a-Service
sponsored by Clumio
EBOOK: Take a quick survey to gain access to this case study to learn how Clumio’s backup provided MPA with air-gapped coverage, reduced complexity, proactive support, lower TCO and more.
Posted: 24 Aug 2021 | Published: 24 Aug 2021

Clumio

Stay ahead of Ransomware Get back up and running
sponsored by Clumio
DATA SHEET: Clumio Enterprise Backup as a Service’s air-gap protection provides a new approach to beating ransomware and ensuring a quick recovery. Take this quick survey to gain access to a free infographic and learn more.
Posted: 24 Aug 2021 | Published: 24 Aug 2021

Clumio
1 - 25 of 2384 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences