IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed   
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 

Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Management Reports
101 - 125 of 3033 Matches Previous Page  |  Next Page
Developing A More Effective Risk Report for Your Board
sponsored by ServiceNow
WHITE PAPER: Today’s risk climate necessitates that everyone within the organization, regardless of job function, is invested in security and protection of their organization. However, organization-wide buy-in starts with getting the board involved. Download this white paper to learn how to convey the seriousness of cyber risk to your board.
Posted: 07 Oct 2020 | Published: 07 Oct 2020

ServiceNow

Cloud Email Needs Cloud Security
sponsored by Cisco
RESOURCE: 90% of breaches occur via email, and in today’s cloud-centric world, built-in email security may not be enough. In order to secure Microsoft 365 from threats inside and outside of your mailbox, businesses need to consider email security that’s built for the cloud. View this infographic to learn more and to discover another security opportunity.
Posted: 07 Oct 2020 | Published: 07 Oct 2020

Cisco

Comparing Top IT Vendor Risk Management Tools
sponsored by ServiceNow
RESOURCE: IT vendor risk management (IT VRM) software provides solutions to manage and automate the vendor risk management life cycle, address third-party risk and meet regulatory compliance. This Gartner Magic Quadrant Report provides an overview of the IT VRM market and a comprehensive evaluation of the top offerings – read on to get started.
Posted: 07 Oct 2020 | Published: 24 Aug 2020

ServiceNow

Hidden Text and Zero Font Attacks
sponsored by Inky Technology
RESOURCE: You may have heard that some phishing emails use something called zero font — text hidden in an email by various means. It is a brand forgery email intended to harvest login credentials. But what exactly is this technique, and why do attackers use it? Read this document to learn both the why and the how of hidden text and zero font.
Posted: 07 Oct 2020 | Published: 07 Oct 2020

Inky Technology

Exploiting a Pandemic: Coronavirus Stimulus Package Economic Impact Payments
sponsored by Inky Technology
WHITE PAPER: COVID-19 has introduced a flurry of phishing scams related to the virus, and millions of people have become victims as a result. But perhaps the most convincing of these attacks are the ones purporting to be from the US Federal Reserve offering to provide financial assistance. Read this white paper to see examples of these convincing emails.
Posted: 07 Oct 2020 | Published: 07 Oct 2020

Inky Technology

Don't be Afraid of Cloud Security
sponsored by Apcela
WEBCAST: The push to move applications and services to the cloud often opens security vulnerabilities that you read about as headlines. Conversely, the fear of these security events results in network policy that inhibits the speed and performance of business. Watch this webcast for a discussion on balancing speed and security from a CIO’s perspective.
Posted: 07 Oct 2020 | Premiered: Oct 31, 2019

Apcela

Security Operations Book of Knowledge
sponsored by ServiceNow
EBOOK: Security automation is emerging as one of the most important capabilities in protecting an organization against costly breaches – saving users an average of $3.58 million more per breach than those who don’t automate security. Read this e-book to learn more about the how security operations have transformed in 2020.
Posted: 07 Oct 2020 | Published: 07 Oct 2020

ServiceNow

All Together Now: IT & Security Collaboration
sponsored by ServiceNow
WHITE PAPER: 2020 has been a disastrous and disruptive year for organizations and their security programs. Upticks in cyberattacks – like malware – have led to significant and costly breaches. Read this white paper to learn more about the effects of 2020 and how IT and security teams can collaborate to drive operational resilience against today’s threats.
Posted: 07 Oct 2020 | Published: 07 Oct 2020

ServiceNow

Secure, Connected Digital Workplace
sponsored by TATA Communications
WHITE PAPER: The world of IT has undergone more transformation in the past six months than many could have predicted, but that doesn’t mean that organizations will be smooth-sailing when the pandemic is over. Businesses must continue to plan for the unexpected. Read this white paper to understand what to prioritize when it comes to post-COVID operations.
Posted: 07 Oct 2020 | Published: 07 Oct 2020

TATA Communications

Securing the Digital Workplace
sponsored by TATA Communications
DATA SHEET: Organizations are searching for ways to ensure secure remote access for identity, devices, apps, data and networks. The security perimeter has changed, and there are still many complex challenges that organizations need to overcome. Take control – view this data sheet to see how Tata Communications may be able to assist.
Posted: 06 Oct 2020 | Published: 06 Oct 2020

TATA Communications

Best Practices for Special-Purpose System Security
sponsored by ColorTokens
RESOURCE: A special-purpose system is an endpoint with a specific function, such as an airport kiosk or an ATM. And while these endpoints facilitate convenience, they also present significant security challenges. Read this article to learn more about where the vulnerabilities lie and how to address them.
Posted: 06 Oct 2020 | Published: 15 Aug 2020

ColorTokens

Mobile Malware and APT Espionage
sponsored by BlackBerry
WHITE PAPER: Mobile threats have been around nearly as long as the mobile phone, but these attacks continue to increase in volume and complexity – they even go so far as to be a primary target for state-sponsored espionage attacks. Read this research report for key insight and new intelligence regarding mobile malware and government espionage.
Posted: 06 Oct 2020 | Published: 06 Oct 2020

BlackBerry

BlackBerry Helps ONGC Systems Achieve Significant Endpoint Security ROI
sponsored by BlackBerry
CASE STUDY: For ONGC Systems, who oversees IT management and security for more than 64,000 SMBs in Queensland, Australia, finding an endpoint security tool that would meet the security, visibility and budgetary needs was a daunting task. Read this case study to discover how ONGC partnered with BlackBerry to meet ROI needs.
Posted: 06 Oct 2020 | Published: 06 Oct 2020

BlackBerry

Top COVID-19 Phishing Scams
sponsored by Inky Technology
RESOURCE: Phishing scammers have taken advantage of the frequent updates regarding COVID-19 information to use it as an entry point for their campaigns. This article, Top COVID-19 Phishing Scams, looks at the emerging threat types and what to look for to identify an attack – read on to get started.
Posted: 06 Oct 2020 | Published: 06 Oct 2020

Inky Technology

Microsegmentation: The First Step to Zero-Trust Security
sponsored by ColorTokens
RESOURCE: Modern security will see the elimination of adding network layer after network layer to fix security vulnerabilities. Businesses need a tighter security method, one that allows them to control traffic within and between segments. This is the basis of microsegmentation. Read this article to learn why microsegmentation is the way forward.
Posted: 06 Oct 2020 | Published: 23 Mar 2020

ColorTokens

Understanding Phishing: Invisible Characters
sponsored by Inky Technology
WHITE PAPER: Similar to hidden text and zero font, invisible characters is a phishing tactic designed to obscure text in order to bypass secure email gateways (SEGs). Read this edition of Understanding Phishing for a full breakdown of invisible text – including real-world examples and best practices for stopping it.
Posted: 06 Oct 2020 | Published: 06 Oct 2020

Inky Technology

Cox Communications: The Anatomy of an Email Hack
sponsored by Cox Communications, Inc.
WEBCAST: Email security has never been under greater threat. The boom in remote employees accessing private networks has demanded more of firewalls than ever before, and as such, there are bound to be some attacks that will work their way through. Watch this webcast to understand the anatomy of a live email hack.
Posted: 06 Oct 2020 | Premiered: Oct 6, 2020

Cox Communications, Inc.

Zero Trust eXtended Ecosystem Platform Providers
sponsored by Ionic Security
WHITE PAPER: This Forrester Wave Report evaluates the top vendors and offerings within the Zero Trust platform market – read on to unlock the vendor comparison matrix, scoring criteria and an in-depth analysis of each of the 15 most significant Zero Trust platform providers.
Posted: 06 Oct 2020 | Published: 24 Sep 2020

Ionic Security

Compliance Made Easy
sponsored by Armor
RESOURCE: The Armor Compliance Matrix was created with the intention of helping IT, IT security and compliance teams understand the major compliance mandates their organizations are subject to and how Armor can help accelerate adherence. Read on for an exclusive look at the matrix.
Posted: 06 Oct 2020 | Published: 06 Oct 2020

Armor

Simple Steps for Setting Up A Project Risk Register
sponsored by LogicGate
RESOURCE: For sophisticated projects, organizations typically turn to a project manager to assess and plan for risks. One emerging practice being used by project managers is the curation of a risk register. But what is a risk register? What does it entail? How can your organization get started making one? Read on to find out.
Posted: 06 Oct 2020 | Published: 18 Jun 2019

LogicGate

Simplifying Security for Software-as-a-Service
sponsored by Armor
WHITE PAPER: The growth of SaaS companies has been crucial for both businesses and consumers. It’s given them the ability to save your customers time and money by quickly responding to changing needs. That said, SaaS comes with its set of security challenges. Jump into this white paper to learn how you can keep your SaaS enterprises secure.
Posted: 05 Oct 2020 | Published: 05 Oct 2020

Armor

Leading the Way with Secure Mobile Keyless Hotel Access
sponsored by Armor
CASE STUDY: The Trustwave Global Security Report lists the hospitality industry as one of the top five industries subjected to network breaches. Customer data is sensitive but attainable for threat actors, and developers must use caution when developing keyless hotel access. Read this case study to learn how one business balanced usability and security.
Posted: 05 Oct 2020 | Published: 05 Oct 2020

Armor

Transformative Risk Management
sponsored by LogicGate
PODCAST: Like social distancing to “flatten the curve”, effective risk management starts with focusing on the self and a small inner circle. In this podcast, join 3 distinguished GRC experts and risk leaders as they discuss the new era of risk management. Listen in to hear what they have to say.
Posted: 05 Oct 2020 | Premiered: Oct 5, 2020

LogicGate

GRC & Me: A Conversation on Risk Language
sponsored by LogicGate
PODCAST: Communication is one of the foundational elements of an organization’s ability to ensure productive relationships both within and between companies. In this podcast, join Melissa Ryan, co-founder of Asureti, as she discusses how her risk language and threat rating tools facilitate communication within and between organizations.
Posted: 05 Oct 2020 | Premiered: Oct 5, 2020

LogicGate

Approaches to Micro-Segmentation: Pros and Cons
sponsored by ColorTokens
RESOURCE: Micro-segmentation is emerging as one of the most effective methods in combating lateral threats that perimeter security fails to protect against. This article provides an overview of the 3 primary approaches to micro-segmentation, including the pros and cons of each approach – read on to get started.
Posted: 05 Oct 2020 | Published: 22 Apr 2020

ColorTokens
101 - 125 of 3033 Matches Previous Page    3 4 5 6 7 8    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info