IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed   
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 

Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Management Reports
151 - 175 of 2701 Matches Previous Page  |  Next Page
Solving IoT’s Access Control Conundrum
sponsored by PortSys
RESOURCE: It’s no surprise that organizations are embracing the collaboration and innovation benefits of the internet of things (IoT). In fact, its predicted that by 2024, the number of IoT connections will grow by 130%. So, how are IT and security teams going to manage access requests across growing environments? Read on to find out.
Posted: 09 Jun 2020 | Published: 29 May 2020

PortSys

Guide to AV Replacement
sponsored by Crowdstrike
WHITE PAPER: As cyberattacks evolve into most sophisticated and directed attacks, traditional detection methods, like antivirus (AV) tools, grow increasingly insufficient. Download this guide to better understand the critical information needed to make an informed decision about replacing your AV or endpoint security tools.
Posted: 08 Jun 2020 | Published: 08 Jun 2020


Retooling Cybersecurity Programs for the Cloud-first Era
sponsored by Capsule8
WHITE PAPER: The amount of cloud-resident sensitive data is expected to double over the next 2 years, and organizations are preparing for the onslaught of threats by making careful reconsiderations within their cybersecurity strategy to include the protection of cloud data and applications, but how are they going about this? Read on to find out.
Posted: 08 Jun 2020 | Published: 08 Jun 2020


Why IDS is Ineffective for Linux Production Environments
sponsored by Capsule8
WHITE PAPER: While intrusion detection systems (IDS) may have been a core component in traditional security strategies, they lack the scalability, agility and visibility to keep up with today’s fast-paced cyberattacks. Download this white paper to discover 9 ways IDS in no longer a viable security option and how to detect threats in modern environments.
Posted: 08 Jun 2020 | Published: 08 Jun 2020


5 Security Recommendations for CIOs Managing a Digital Transformation Program
sponsored by Dell SecureWorks
WHITE PAPER: In order to establish an effective digital transformation program, organizations must maintain a balance of agility, cost reduction and innovation, with security as a supportive underline. Read this white paper to discover 5 ways CIOs can maintain security during a digital transformation.
Posted: 08 Jun 2020 | Published: 08 Jun 2020

Dell SecureWorks

What Boards Should Know About the Company’s Cybersecurity Strategy
sponsored by Dell SecureWorks
WHITE PAPER: In order to stay ahead of today’s cyberthreats, security leadership is opting to include board members and non-security leaders in their strategic planning so they can achieve an organization-wide resiliency approach. Download this white paper to discover how to develop a collaborative strategy.
Posted: 08 Jun 2020 | Published: 08 Jun 2020

Dell SecureWorks

7 Key Steps to Developing an Audit-Ready Security Program
sponsored by Ostendio
VIDEO: In this webinar, join the President and CEO of Ostendio as he provides a comprehensive overview of the 7 steps to developing an audit-ready security program, including key considerations for ensuring organization-wide buy-in. Watch now to get started.
Posted: 08 Jun 2020 | Premiered: 08 Jun 2020

Ostendio

Capsule8 for PCI Compliance
sponsored by Capsule8
PRODUCT OVERVIEW: As e-commerce becomes essential to the revenue stream of digital businesses, ensuring the PCI DSS compliance and securing cardholder data becomes increasingly critical. Download this solution brief and explore Capsule8’s Protect platform, designed to ensure security while easing PCI DSS compliance workload.
Posted: 05 Jun 2020 | Published: 05 Jun 2020


5 Best Practices for AWS Security Monitoring
sponsored by Sumo Logic AWS
WHITE PAPER: Cloud infrastructures and capabilities enable organizations to enhance their operations with improved scalability, agility and cost savings. However, security unfortunately remains a key pain point for cloud users. In this white paper discover a set of best practices designed to help protect sensitive data in AWS environments.
Posted: 05 Jun 2020 | Published: 05 Jun 2020

Sumo Logic AWS

Top 10 Considerations for GRC Software Tools
sponsored by Ostendio
RESOURCE: The GRC tool selection process is often flooded with an overwhelming amount of choices, made more difficult by confusing terminology and varied opinions. This article helps to break down the problem by providing a brief overview on why and how companies are using GRC as well as 10 questions to consider during the evaluating process.
Posted: 05 Jun 2020 | Published: 28 Jan 2020

Ostendio

Solution Brief: Best Practices for Secure Mobile Access
sponsored by SonicWall
PRODUCT OVERVIEW: As organizations shift towards digital workspaces, ensuring the protection of mobile devices becomes increasingly critical. The following solution brief provides a comprehensive set of best practices and practical steps to ensure your organization protects its mobile devices against modern threats.
Posted: 04 Jun 2020 | Published: 04 Jun 2020

SonicWall

How Can A Risk Management Platform Support Your Business During A Crisis?
sponsored by Ostendio
RESOURCE: While organizations may be anxious to return to work, it’s critical to keep in mind the lessons learnt about maintaining security and productivity during a crisis. Developing a solid crisis management plan can help with responding to future incidents. Read this article to uncover 6 key steps to help you get started.
Posted: 04 Jun 2020 | Published: 29 Apr 2020

Ostendio

Data Privacy and Non-Compliance: From Silicon Valley to SMBs
sponsored by Ostendio
RESOURCE: In this article written by the President and CEO of Ostendio, learn about the data privacy and non-compliance issues that are plaguing companies of all sizes – from Silicon Valley to SMBs.
Posted: 04 Jun 2020 | Published: 10 Apr 2020

Ostendio

How to Choose a SOC 2 Auditor: 6 Questions to Ask
sponsored by Ostendio
RESOURCE: For organizations looking to conduct a SOC 2 audit, choosing the right external audit firm can be a daunting, yet crucial, process. To make sure you choose the right partner, this article highlights 6 questions to consider during the selection process. Read on to find out what they are.
Posted: 04 Jun 2020 | Published: 27 Sep 2019

Ostendio

2020 SonicWall Cyber Threat Report
sponsored by SonicWall
WHITE PAPER: Each year is a constant struggle between cybercriminals attempting to conduct successful attacks and organizations defending their users and data. 2019 was a good year for organizations as malware attacks dropped by 6%. Read on to uncover key statistics and insights about last year’s cyberattack trends.
Posted: 04 Jun 2020 | Published: 04 Jun 2020

SonicWall

Phishing. The biggest threat to SMBs
sponsored by Crosskey Cyber Security
RESOURCE: Phishing emails are the most common threat to small and medium businesses, and their growing efficacy leads to increasingly costly disruptions. In the following article, you’ll find an overview of the signs of a phishing attack, specific examples of what these attacks look like and advice for how employees can protect themselves.
Posted: 03 Jun 2020 | Published: 03 Jun 2020

Crosskey Cyber Security

Successfully Scaling Cybersecurity for Remote Work: Keep the Cloud Your Safe Place
sponsored by Forcepoint
RESOURCE: As organizations work to enable and secure remote workers, it’s critical to keep in mind that having people work remotely can mean an increase in security threats. So, how can IT and security teams protect users and data without hurting productivity or morale? Read this article to find out.
Posted: 03 Jun 2020 | Published: 03 Jun 2020

Forcepoint

Successfully Scaling Cybersecurity for Remote Work: Protect Your People
sponsored by Forcepoint
RESOURCE: One of the key directives for today’s IT and security teams is to safeguard the users and data within their distributed environment and implement cyber defenses that can protect those users—regardless of their location or device. Read on to learn how to keep your remote workers secure against today’s internal and external threats.
Posted: 03 Jun 2020 | Published: 03 Jun 2020

Forcepoint

Executive Guide to the 2020 Global Threat Intelligence Report
sponsored by NTT
WHITE PAPER: COVID-19 has been a major disruption to nearly every aspect of life, and work environments are no exception. Organizations have had to adjust to a dramatic shift towards remote work and address the cyberattacks that ensue. To learn more about these cyberattacks, download this 2020 Global Threat Intelligence Report.
Posted: 02 Jun 2020 | Published: 02 Jun 2020

NTT

CW Europe - June-August 2020: 5G rush in Russia
sponsored by ComputerWeekly.com
EZINE: Russian mobile operators are pooling their resources to help them overcome the technical challenges of creating 5G networks. Also read how Swedbank is rebuilding its anti-money laundering systems after a damning report, and how a public-private partnership in the Netherlands is helping to combat cyber fraudsters.
Posted: 02 Jun 2020 | Published: 11 Jun 2020

ComputerWeekly.com

Executive Brief: The Dark Side of Encryption
sponsored by SonicWall
WHITE PAPER: Encryption plays a key role in providing security for digital interactions. However, these encryption protocols can also serve as a lucrative vector for cybercriminals, allowing them to gain easy access to networks. This white paper explores how (and why) organizations should decrypt traffic in order to identity and mitigate potential threats.
Posted: 01 Jun 2020 | Published: 01 Jun 2020

SonicWall

Blueprint: Modern Layered Security
sponsored by SonicWall
WHITE PAPER: The concept of a layered security strategy is nothing new. However, as threats evolve, each layer needs to be revised to ensure it addresses modern security demands. This white paper provides an overview of a comprehensive 11-layer security approach, designed to strengthen your security posture without sacrificing business objectives.
Posted: 01 Jun 2020 | Published: 01 Jun 2020

SonicWall

Enhance the Safety and Security of Your People, Assets and Operations
sponsored by Dell Technologies and Intel
WHITE PAPER: For organizations looking to keep pace with today’s dynamic world, the addition of each new IoT device requires storage, security, and performance considerations. In this white paper, take a closer look at today’s IoT challenges and discover how Dell is working to address them. Learn more about Dell solutions powered by Intel®
Posted: 01 Jun 2020 | Published: 01 Jun 2020

Dell Technologies and Intel

Executive Brief: Why Secure Mobile Access Is A Strategic Business Imperative
sponsored by SonicWall
WHITE PAPER: According to a recent study, 75% of organizations consider flex work to be the new norm. However, in order to support their distributed workforce, organizations need to ensure they make secure mobile access a strategic imperative. Download this white paper to learn more about secure mobile access and discover why organizations are embracing it.
Posted: 29 May 2020 | Published: 29 May 2020

SonicWall

Data Security in today's borderless, multi-cloud landscape
sponsored by Forcepoint
WHITE PAPER: While mobile devices and cloud applications enable organizations to enhance productivity, scalability and cost-savings, these modern environments come with new security risks. Download this e-book to learn more about the current and expected challenges and discover the benefits of a people-centric approach to cybersecurity.
Posted: 29 May 2020 | Published: 29 May 2020

Forcepoint
151 - 175 of 2701 Matches Previous Page    5 6 7 8 9 10    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info