IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed   
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 

Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Management Reports
126 - 150 of 3008 Matches Previous Page  |  Next Page
Changing the Rules of Ransomware
sponsored by Dell SecureWorks
VIDEO: Ransomware has become a series threat to an organization’s data – and there is conflicting advice on whether an organization should pay the ransom or not. This webinar provides a closer look at the evolution of ransomware attacks, which regions and industries are most affected, why an organization should or shouldn’t pay, and more.
Posted: 01 Oct 2020 | Premiered: 01 Oct 2020

Dell SecureWorks

The Business Executive’s Guide to Cybersecurity
sponsored by Dell SecureWorks
WHITE PAPER: The days of cybersecurity being a siloed business function is no longer appropriate when considering the financial, reputational and legal implications of today’s cyberthreats. This white paper provides a guide for communication and collaboration between technical and non-technical business leaders – read on to learn more.
Posted: 01 Oct 2020 | Published: 01 Oct 2020

Dell SecureWorks

Armor Secure Hosting Proactive Security for Payment Transactions and PCI Data
sponsored by Armor
DATA SHEET: Businesses requiring PCI compliance are in between a rock and a hard place when it comes to continuity. They need to be able to scale, but various security vulnerabilities introduce themselves through the process. Now, you can be both secure and compliant. Scan this data sheet on Armor Secure Hosting to learn how to proactively secure payments.
Posted: 01 Oct 2020 | Published: 01 Oct 2020

Armor

Definitive Guide to Zero-Trust Security
sponsored by ColorTokens
EBOOK: Upon first hearing the term zero-trust, it can feel a bit worrying to implement what sounds like a “never trust” security policy. But what it actually provides is “just enough trust” to authorized users while blocking out all other traffic. To learn more, dive into the Definitive Guide to Zero-Trust Security to understand how zero trust works.
Posted: 01 Oct 2020 | Published: 01 Oct 2020

ColorTokens

Exploiting a Pandemic Coronaphish COVID-19 Phishing Scams
sponsored by Inky Technology
WHITE PAPER: Phishing scams are constantly evolving, seeking out more effective ways to bypass security measures and trick recipients. In this edition of Understanding Phishing, explore how the COVID-19 pandemic has changed phishing campaigns by dissecting a few real-world examples.
Posted: 01 Oct 2020 | Published: 01 Oct 2020

Inky Technology

The New Normal: Working from Home and Phishing Threats
sponsored by Inky Technology
RESOURCE: It’s estimated that during the COVID-19 pandemic, close to 50% of the US workforce is remote – this massive and sudden transition towards remote work is known as the “new normal”. With this change in workplace comes a change in cyberthreats – with phishing being the most prominent. Read this blog post to learn more.
Posted: 01 Oct 2020 | Published: 01 Oct 2020

Inky Technology

Top Trends in Customer Identity and Access Management (CIAM) with analyst Mary Ruddy
sponsored by Okta
WEBCAST: Customer identity has gone mainstream. A seamless customer experience across devices is now expected. At the same time, security and privacy concerns are at an all-time high. View this webinar to hear from Gartner analyst Mary Ruddy and learn about findings from her recent research "Top 5 Trends in CIAM Solution Design".
Posted: 30 Sep 2020 | Premiered: Sep 30, 2020

Okta

McAfee Unified Cloud Edge
sponsored by McAfee
PRODUCT OVERVIEW: Nearly every company today uses cloud services to some extent, most store sensitive data in the cloud – however, those with effective cloud security measures represent a small fraction of the overall user base. Read this solution brief for a closer look at McAfee’s Unified Cloud Edge – designed to protect cloud data and devices.
Posted: 30 Sep 2020 | Published: 30 Sep 2020

McAfee

How to Secure Your Remote Workforce Effectively
sponsored by BlackBerry
EBOOK: Remote working capabilities enable organizations to support a global workforce – and if done effectively it can yield benefits related to efficiency, flexibility and cost-effectiveness without sacrificing security. Read this eBook to learn how to secure remote workforces.
Posted: 30 Sep 2020 | Published: 30 Sep 2020

BlackBerry

11-Minute Webinar: Strategies to Work from Anywhere
sponsored by Okta
WEBCAST: Telework involves more than getting your employees up and running with video conferencing – it requires a massive shift in how people work and how you think about securing users and their devices. Don’t float adrift in a sea of distributed workforce challenges – watch this 10-minute webinar and learn how to manage access and security.
Posted: 30 Sep 2020 | Premiered: Jul 24, 2020

Okta

Microsoft 365 Endpoint DLP: Is it Ready for the Enterprise?
sponsored by InteliSecure
WHITE PAPER: Organizations are in dire need of a reliable and simple way to protect their endpoints – in an effort to meet this growing need, Microsoft responded with their new Endpoint DLP tool, which was announced at a virtual event earlier this year. Read this guide learn more about the new Endpoint DLP tool.
Posted: 30 Sep 2020 | Published: 30 Sep 2020

InteliSecure

Executive Summary: Threat Hunting Made Easy
sponsored by Malwarebytes
RESOURCE: “Threat hunting” may sound like buzzword when you first hear it, but it is a very real practice that allows you to contain suspicious activity, determine if a threat is malicious or benign and remediate with just the click of a button. View this short brief and uncover a threat hunting opportunity your organization could use.
Posted: 30 Sep 2020 | Published: 30 Sep 2020

Malwarebytes

Email Security vs. Email Privacy: What You Need to Know
sponsored by Inky Technology
RESOURCE: Since it was first introduced, email has blown up into a business-critical communication tool. However, its popularity has led to an innumerable amount of cyberattacks over the years. In this blog post, explore the differences between email security and email privacy – and discover how to achieve both.
Posted: 30 Sep 2020 | Published: 30 Sep 2020

Inky Technology

Enduring from Home
sponsored by Malwarebytes
ANALYST REPORT: 2020 is a test of business continuity. Now-remote workers are connecting to potentially unsecured home networks while accessing company resources from personal devices, and their unique cybersecurity needs must be considered. Read this report to learn perspectives on IT leaders on the sudden shift to remote work and its impact on security.
Posted: 30 Sep 2020 | Published: 30 Sep 2020

Malwarebytes

Understanding Phishing: Text Direction Deception!
sponsored by Inky Technology
WHITE PAPER: Phishing scams continue to evolve, and attackers apply an ever-growing bag of tricks to fool recipients as well as email protection tools. In this edition of Understanding Phishing, the cybersecurity experts at INKY dissect a recently uncovered tactic which uses Cascading Style Sheets (CSS) to bypass security protocols by mixing scripts.
Posted: 30 Sep 2020 | Published: 30 Sep 2020

Inky Technology

Security and Compliance for a Case Management SaaS
sponsored by Armor
CASE STUDY: When a private case management platform evolved into a software-as-a-service (SaaS) offering, a healthcare tech company needed a secure cloud-based solution that could help ensure HIPAA compliance. Read this comprehensive case study to learn about Armor Anywhere, a secure hosting platform designed with security and compliance in mind.
Posted: 30 Sep 2020 | Published: 30 Sep 2020

Armor

Key Tenets of Zero Trust Architecture
sponsored by ColorTokens
RESOURCE: Zero-trust architecture (ZTA) is a security blueprint built on the premise that attackers are already present and that anything can be compromised at any point. Broadly speaking, the tenets of ZTA can be classified under three security domains. Read this short article alongside the NIST SP 800-207 to examine the vital roles of these tenets.
Posted: 30 Sep 2020 | Published: 04 Sep 2020

ColorTokens

How to Develop a Robust Security Strategy
sponsored by Insight
VIDEO: In this webcast, join distinguished cybersecurity experts as they discuss why organizations should reconsider their current security approach and how to develop a robust cybersecurity strategy that reflects the needs of today’s organizations.
Posted: 29 Sep 2020 | Premiered: 29 Sep 2020

Insight

Data Sheet: Malwarebytes Malware Removal Service
sponsored by Malwarebytes
DATA SHEET: One-off remediation efforts are no longer able to keep pace with today’s malware attacks – so how should organizations address the growing risk of malware? Download this data sheet for an overview of Malwarebytes’ Malware Remove Service, designed to enable your organization to quickly overcome an incident and regain resilience.
Posted: 29 Sep 2020 | Published: 29 Sep 2020

Malwarebytes

Email Security Threats: How to Protect Your Business, People and Data
sponsored by Barracuda
WEBCAST: Every organization is challenged by email security. Rogue actors are increasingly using email to target employees and system administrators with a growing range of threats and techniques – and detection has become more difficult as a result. Stay up to date by viewing this webcast on the latest email security threats and how to defend from them.
Posted: 29 Sep 2020 | Premiered: Sep 29, 2020

Barracuda

Brazilian Multinational Manufacturer Protects Data on the Internet and in the Cloud
sponsored by McAfee, Inc.
CASE STUDY: For Brazilian manufacturer WEG Industries, a recent expansion through acquisition meant it was time to rethink their data protection strategy. Read this case study to learn more about the specific challenges WEG was facing and discover the outcomes of their partnership with McAfee.
Posted: 29 Sep 2020 | Published: 29 Sep 2020

McAfee, Inc.

Is Your Company’s Online Security Strategy Enough?
sponsored by Inky Technology
RESOURCE: Cyberattacks are costly - $10.2 billion in the U.S. alone to be exact. It’s proven that businesses are underprepared for cyberattacks, and what’s more is that every person at an organization who has an email account is vulnerable to threats. Read this article on how you can improve email security and get access to a free demo download.
Posted: 29 Sep 2020 | Published: 29 Sep 2020

Inky Technology

Innovation Insight for Extended Detection and Response
sponsored by Palo Alto Cortex
RESOURCE: In this Gartner Reprint report, discover a complete assessment of extended detection and response (XDR) – both in terms of the functionality of XDR as well as the XDR market as a whole. Read on for the analysis, recommendations, key findings and more.
Posted: 29 Sep 2020 | Published: 19 Mar 2020

Palo Alto Cortex

Cybersecurity Risk: A Board’s-Eye View Chapter 4
sponsored by PortSys
WHITE PAPER: Access control is now the single most important aspect of an organization’s security architecture. What if you could view the context of a user’s access request, then have that request analyzed against your security policies for authentication? Read this brief to look at Total Access Control by PortSys.
Posted: 29 Sep 2020 | Published: 01 Aug 2020

PortSys

How Okta's Cloud First IT Strategy Enables a Dynamic Work Environment
sponsored by Okta
VIDEO: Back in 2009, 30% of organizations were using some sort of cloud computing. Since then, it has erupted into one of the most important aspects of an organization’s work environment. Watch this webinar to discover how cloud has changed and the role it plays in enabling today’s dynamic workforce.
Posted: 28 Sep 2020 | Premiered: 28 Sep 2020

Okta
126 - 150 of 3008 Matches Previous Page    4 5 6 7 8 9    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info