IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed   
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 

Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Management Reports
1 - 25 of 2537 Matches Previous Page  |  Next Page
SEG Campaign Accountability Ebook
sponsored by Area 1 Security
WHITE PAPER: Phishing attacks are on the rise, and current defense methods are ineffective at identifying and mitigating a malicious email. In this e-book, take a closer look at the faults in current security and discover Area 1’s approach to accountable phishing protection.
Posted: 28 Jan 2020 | Published: 07 Jan 2020

Area 1 Security

CISOs: How to Maintain Your Security (and Sanity) in a Hybrid Cloud World
sponsored by vArmour
WHITE PAPER: Regardless of your organization’s preferred cloud model, ensuring data and application security is critical in order to maintain control, compliance and productivity. Download this white paper to learn how to maintain security in hybrid and multi-cloud environments.
Posted: 28 Jan 2020 | Published: 28 Jan 2020


Webinar Recording: Linux Kernel Live Patching in VMware Cloud on AWS
sponsored by CloudLinux
VIDEO: While many organizations opt for hybrid cloud due to its adaptability, the disparate tools and controls required for it to function optimally can create security vulnerabilities and data leakage. In this webinar, go in-depth into combining hybrid cloud services, like VMware and AWS, to ensure security compliance efforts.
Posted: 27 Jan 2020 | Premiered: 16 Sep 2019


Webinar recording: The Importance of Live Patching for Linux Kernel Vulnerabilities
sponsored by CloudLinux
VIDEO: When it comes to Linux operating systems, security patching can be a time-consuming and often disruptive event. In this webinar, go in-depth into Linux kernel live security patches; what they are, how they work, who should be using it – and why.
Posted: 27 Jan 2020 | Premiered: 10 May 2019


Analyst Report: Cloud Workload Security, Q4 2019
sponsored by Trend Micro
WHITE PAPER: The increasingly adoption of cloud technologies emphasizes the corresponding need for cloud security. In this Forrester Wave report, discover what to look for in a cloud workload security provider by evaluating and comparing 13 providers in order to equip potential customers with a comprehensive guide of what to look for in a partner.
Posted: 27 Jan 2020 | Published: 09 Dec 2019

Trend Micro

CISO’s Guide to DevOps
sponsored by ShieldX
WHITE PAPER: Today’s CISOs are under pressure to establish data security protocols while enabling an agile development environment. Automation allows much of the development process to be agile, however, security remains largely manual. The following guide is a checklist designed to help CISOs with the issue of incorporating security into DevOps.
Posted: 27 Jan 2020 | Published: 31 Oct 2018

ShieldX

CISO’s Guide to Multicloud Security
sponsored by ShieldX
WHITE PAPER: As IT security leaders struggle to keep pace with advancing technology and increasing threats within multicloud environments, adopting an agile approach to cloud security may help solve the problem. In the following guide, uncover a checklist that features recommendations for CISOs interested in bolstering their cloud security strategy.
Posted: 27 Jan 2020 | Published: 31 Oct 2018

ShieldX

How Does Security Innovation Power Digital Transformation?
sponsored by ZeroNorth
WHITE PAPER: Digital transformation is defined by its seeming-endless search for technological innovation. Unfortunately, security can sometimes be an afterthought for companies looking to stay ahead of the competition. In this white paper, discover how security innovation can augment digital transformation.
Posted: 24 Jan 2020 | Published: 31 Oct 2019

ZeroNorth

How to Become Cyber Resilient: A Digital Enterprise Guide
sponsored by Malwarebytes
WHITE PAPER: Tap into this white paper to explore the current market influences that impact how an organization pursues cyber resilience, the key methods that should be adopted in becoming cyber resilient, and the reasons why cyber resilience can transform an organization into a digital enterprise highly focused on growth.
Posted: 24 Jan 2020 | Published: 24 Jan 2020

Malwarebytes

The New Norm: Trend Micro Security Predictions for 2020
sponsored by Trend Micro
WHITE PAPER: Industry experts at Trend Micro recently conducted research into past cybersecurity trends to develop their predictions for ever-evolving landscape of cybersecurity threats and defense methods in 2020 and beyond. Continue to read the full report.
Posted: 24 Jan 2020 | Published: 24 Jan 2020

Trend Micro

IDC Worldwide Cloud Security Market Shares, 2018: Protecting Workloads in Hybrid and Multicloud
sponsored by Trend Micro
WHITE PAPER: SDC workload security spans threat protection, vulnerability management, analytics, and data integrity to protect what runs on top of the SDC infrastructure. This research report offers advice for technology suppliers and highlights the global market share. Read on to uncover the results.
Posted: 24 Jan 2020 | Published: 30 Nov 2019

Trend Micro

Webinar: You Need Live Patching to Achieve SOC2 Compliance
sponsored by CloudLinux
VIDEO: In this webinar, join industry experts as they share best practices and use cases of data protection and vulnerability management for maintaining compliance in their Linux-based systems. Continue to view the webinar.
Posted: 24 Jan 2020 | Premiered: 11 Jul 2019


A CISO’s Guide to Fixing Flat Networks and Vulnerable Systems
sponsored by ShieldX
WHITE PAPER: Traditional perimeter security is obsolete when it comes to preventing lateral hacker movement in the cloud era. Even Gartner recommends an updated approach focused on security access at the workload level. This guide highlights the faults of traditional security tactics includes a checklist of the benefits of a micro-segmentation approach.
Posted: 24 Jan 2020 | Published: 30 Nov 2018

ShieldX

Magecart Attack on Focus Camera
sponsored by Tala Security
WHITE PAPER: Magecart attacks continue to plague websites and sensitive customer data. In this solution brief, learn how Tala Security protects against client-side attacks by exploring the features and capabilities the enable them to provide website security.
Posted: 24 Jan 2020 | Published: 24 Jan 2020

Tala Security

Zero Trust Access Helps UK County Improve Productivity and Access Control
sponsored by PortSys
CASE STUDY: The initiation of GDPR caused widespread change in the way organizations handled consumer data across the EU. In this case study, follow the Essex County Council, keepers of personal data for their residents, through their post-GDPR journey towards zero-trust access control to enable their employees to collaborate in a secure environment.
Posted: 24 Jan 2020 | Published: 24 Jan 2020

PortSys

Spear-phishing Analysis with ThreatQ Investigations
sponsored by ThreatQuotient
WEBCAST: Spear-phishing attacks are a growing security threat to organizations and their employees. These attacks target victims from a seemingly reliable source to lure them to a malware-ridden site. View this webinar to learn how to develop your spear-phishing investigation skills to spot an and attack before it becomes troublesome.
Posted: 23 Jan 2020 | Premiered: Jan 23, 2020

ThreatQuotient

A CISO’s Guide to Micro-Segmentation
sponsored by ShieldX
WHITE PAPER: Micro-segmentation is growing increasingly popular amongst organizations that operate within multi-cloud environments. It focuses on the workload-level, and only allows permissions based on what the specific task requires. Download this guide for a comprehensive checklist that can help take the pain out of micro-segmentation adoption.
Posted: 23 Jan 2020 | Published: 31 Oct 2018

ShieldX

Security Controls for Effective Micro-Segmentation
sponsored by ShieldX
WHITE PAPER: With cyberattacks becoming increasingly difficult to identify and mitigate, organizations shift towards Forrester’s Zero Trust Model to protect their post-perimeter environments against lateral movements. In this white paper, explore security controls and evaluation criteria for the foundational elements of your zero-trust strategy.
Posted: 23 Jan 2020 | Published: 30 Sep 2017

ShieldX

Implementing Effective Cyberprotection Demands New Approaches
sponsored by NWN Corporation
WHITE PAPER: As cyberattackers become more skilled and launch harder-to-detect campaigns, organizations need to revise their security strategies to match the pace of modern attacks. Use this white paper to explore the 7 essential services that your chosen provider should include.
Posted: 23 Jan 2020 | Published: 23 Jan 2020

NWN Corporation

ESG XDR Paper: Beyond EDR
sponsored by Trend Micro
WHITE PAPER: 76% of companies feel that threat detection and response is more difficult today than it was 2 years ago. SIEM approaches are becoming too costly, and EDR tools aren’t a standalone option. So, what options, if any, do organizations have? Read on to learn more.
Posted: 23 Jan 2020 | Published: 31 Aug 2019

Trend Micro

Lattes, Lunch, and VPNs: Securing Remote Workers the Right Way
sponsored by Malwarebytes
WHITE PAPER: This short story follows the journey of two remote workers as they face the cybersecurity threats associated with remote access, VPNs and cloud platforms. Read on to learn how they overcome these challenges and reshape their security strategy.
Posted: 23 Jan 2020 | Published: 23 Jan 2020

Malwarebytes

Board Ready Endpoint Resilience in 5 Steps
sponsored by Malwarebytes
EBOOK: The increasing popularity in mobile workspaces and BYOD devices has transformed the way CISOs have to think about security. With cyberattacks on the rise, implementing endpoint resilience has become critical. In this e-book, uncover the 5 essential steps to establishing endpoint security and the recommendations for achieving each step.
Posted: 23 Jan 2020 | Published: 23 Jan 2020

Malwarebytes

How to Build a Winning Cybersecurity Team
sponsored by Global Knowledge
WHITE PAPER: Just like a sports team, cybersecurity teams need to be carefully built and managed in order to reach peak performance. Effective cybersecurity teams also require adequate processes and technologies to support their efforts. So, what should you consider when building a winning cybersecurity team? Read on to find out.
Posted: 23 Jan 2020 | Published: 23 Jan 2020

Global Knowledge

Interview with Identity Expert
sponsored by Mitek Systems, Inc.
WHITE PAPER: In this Q and A, the head of risk and payments at an American money transfer company sits down with the customer success leader at Mitek to talk about role of identity verification in innovation and how increasing regulations will affect financial institutions. Read on to learn more.
Posted: 23 Jan 2020 | Published: 21 Jan 2020


Making MITRE ATT&CK Actionable
sponsored by ThreatQuotient
WEBCAST: In this webinar, join technical experts at ThreatQuotient as they outline merging MITRE ATT&CK with SIEM visibility and threat intelligence in the ThreatQ platform to unify threat detection efforts. Interested in seeing how this platform works? Watch the webinar to learn more.
Posted: 23 Jan 2020 | Premiered: Jan 23, 2020

ThreatQuotient
1 - 25 of 2537 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info