IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed   
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 

Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Management Reports
151 - 175 of 2513 Matches Previous Page  |  Next Page
Industrial Controls System Vulnerabilities
sponsored by Dragos
ANALYST REPORT: In this report, explore key findings from the Dragos Intelligence team's analysis of ICS-specific vulnerabilities. Also discover the impacts, risk and mitigation options for defenders.
Posted: 07 Aug 2019 | Published: 07 Aug 2019

Dragos

Keeping Fraud Detection Software Aligned With the Latest Threats
sponsored by SAS
WHITE PAPER: Fraud and financial crimes weren't considered serious issues until the 1980s. Since then, they have become commonplace. As fraud changes and evolves, organizations must keep anti-fraud software current to detect new and emerging threats. In this white paper, learn how SAS Visual Investigator can help organizations do this.
Posted: 07 Aug 2019 | Published: 07 Aug 2019

SAS

CW Nordics August 2019: Copenhagen woos tech startups
sponsored by ComputerWeekly.com
EZINE: Copenhagen offers all the advantages startups need to get off the ground and many are setting up with the intention of staying there for the long haul. Also read how Nordic shipping giant Maersk is changing its approach to IT as nimble competitors strip complexity from the business of logistics.
Posted: 07 Aug 2019 | Published: 22 Aug 2019

ComputerWeekly.com

Top VPNs secretly owned by Chinese firms
sponsored by ComputerWeekly.com
EGUIDE: Nearly a third of top VPNs are secretly owned by Chinese companies, while other owners are based in countries with weak or no privacy laws, potentially putting users at risk, security researchers warn. Dive into this story now.
Posted: 06 Aug 2019 | Published: 06 Aug 2019

ComputerWeekly.com

Evolution of ICS Attacks and the Prospects for Future Disruptive Events
sponsored by Dragos
WHITE PAPER: Headlines are full of proclamations covering the latest in industrial control system (ICS) attacks and threats to critical infrastructure. In this white paper, explore an analysis of ICS disruptive events from the past 4 years. Also, learn how these threats have evolved over time, and what measures are necessary to defeat them.
Posted: 06 Aug 2019 | Published: 06 Aug 2019

Dragos

The Definitive Guide to Public Cloud Security
sponsored by Lacework
WHITE PAPER: In this security report, discover how Lacework compares security vendors for AWS, Azure, and GCP and dive deeper into common security challenges presented by the cloud.
Posted: 06 Aug 2019 | Published: 06 Aug 2019

Lacework

Magecart PCI Advisory on CSP
sponsored by Tala Security
RESOURCE: The Payment Card Industry Security Standard Council issued a set of recommendations and guidance to address the growing threat by magecart. They suggested using Content Security Policies (CSP) to restrict compliant browsers from executing JavaScript from source which have not been explicitly whitelisted. In this blog, learn more about CSP.
Posted: 06 Aug 2019 | Published: 02 Aug 2019

Tala Security

Enhanced Security for AWS
sponsored by Lacework
WHITE PAPER: In this security solution brief, discover how Lacework uses threat detection, compliance, and automated security monitoring for workloads and accounts running in AWS and in multi-cloud environments.
Posted: 06 Aug 2019 | Published: 06 Aug 2019

Lacework

Special Report: 2019 Email Security Trends
sponsored by Barracuda
ANALYST REPORT: How can you keep your pulse on the evolving threat landscape? Download the following report, which illustrates the current state of email security and spotlights trends around security spending, malware and phishing, Office 365 security, and more.
Posted: 06 Aug 2019 | Published: 06 Aug 2019

Barracuda

How to Start Building an Industrial Cybersecurity Program
sponsored by Dragos
WHITE PAPER: In this white paper, discover how to start building an industrial cybersecurity program and what organizations beginning to develop an ICS security program should do.
Posted: 05 Aug 2019 | Published: 05 Aug 2019

Dragos

Closing the People, Processes and Technology Gap: How Innovation Can Strengthen Your Cybersecurity Program
sponsored by Optiv
RESOURCE: A robust security model is built on 3 pillars—people, processes and technology. Unfortunately, a failure to innovate could negatively affect your ability to excel at all 3. In this blog, explore these 3 pillars and discover 5 steps to solving the people, process and technologies equation.
Posted: 05 Aug 2019 | Published: 24 Jul 2019

Optiv

Insights into Building an Industrial Control System Security Operations Center
sponsored by Dragos
WHITE PAPER: One of the most dedicated focuses towards security that can be implemented in an ICS is a security operations center (SOC). In this white paper, learn how best practices from enterprise IT SOCs can be adapted to focus on ICS environments.
Posted: 05 Aug 2019 | Published: 31 Mar 2017

Dragos

ICS Activity Groups and the Threat Landscape
sponsored by Dragos
WHITE PAPER: Throughout 2018, the amount of activity targeting industrial control systems (ICS) increased substantially. Also in 2018, ICS security risk grew even absent any destructive attacks. In this white paper, explore threat activity groups targeting ICS and details about their activity, methodologies, victimologies, and future concerns.
Posted: 05 Aug 2019 | Published: 05 Aug 2019

Dragos

Making an Impact with Security Awareness Training
sponsored by Mimecast
ANALYST REPORT: Employees are the last line of defense against cyberattacks, and in too many cases these defenses fail. In this report, learn how to create a successful security awareness training program.
Posted: 02 Aug 2019 | Published: 15 Oct 2018

Mimecast

Dragos Industrial Cybersecurity Platform
sponsored by Dragos
VIDEO: The industrial security community faces strategic challenges in responding to cyberthreats. In this video, learn about Dragos' industrial cybersecurity platform which helps ICS defenders to identify assets, detect threats and respond via investigation playbooks.
Posted: 02 Aug 2019 | Premiered: 11 Nov 2018

Dragos

Seamless Transition to CUI Markings
sponsored by TITUS
PRODUCT OVERVIEW: While it is critical to set standardized controls for the way information is handled, the process of implementing CUI markings is complex, time-consuming, and sometimes unclear. In this solution brief, learn how Titus data protection solutions can help organizations to ensure they meet CUI requirements.
Posted: 02 Aug 2019 | Published: 30 Jun 2019

TITUS

Holistic Privacy Readiness
sponsored by Okera
WEBCAST: In this Okera webcast, learn about the requirements for holistic privacy readiness and the best practices for S3 and azure data lakes.
Posted: 02 Aug 2019 | Premiered: Aug 2, 2019

Okera

Is Microsoft O365 Good Enough Protection & Recovery Webinar?
sponsored by Mimecast
WEBCAST: Many organizations are asking themselves, "Is Microsoft Office 365 good enough protection and recovery?" According to Gartner, investing in third-party tools for "faster, more-flexible recovery options" is a good idea. In this webinar, Shane Harris and Glenn Brown of Mimecast discuss where your biggest risks are and how to mitigate them.
Posted: 01 Aug 2019 | Premiered: Aug 1, 2019

Mimecast

Adopting Productivity: How SOCs can Evolve to Advanced Fusion Centers
sponsored by Optiv
RESOURCE: In this infographic, learn how security operations centers can evolve to advance fusion centers.
Posted: 01 Aug 2019 | Published: 01 Aug 2019

Optiv

A Quick Guide to Stopping Ransomware
sponsored by Webroot
RESOURCE: In this infographic, explore 9 proactive steps you can take to reduce the likelihood that you'll fall victim to a crypto-ransomware attack.
Posted: 01 Aug 2019 | Published: 01 Aug 2019

Webroot

The 4 Types of Threat Detection
sponsored by Dragos
WHITE PAPER: Threat detection comprises 1 of the 3 core cybersecurity functions along with prevention and response. But, detection plays an outsized role as arguably the most important cybersecurity function in an "assume breach" world. In this white paper, explore the 4 types of threat detection, how they are derived and the uses for each.
Posted: 01 Aug 2019 | Published: 13 Jul 2018

Dragos

The Vital Role of Security in Digital Transformation
sponsored by TITUS
ANALYST REPORT: A survey conducted by Market Strategies Internal showed that 78% of ITDMs believe that the success of their digital transformation relies heavily on strong IT security and data protection. In this research report, explore 2 different security professional personas and explore how they view digital transformation, security and data protection.
Posted: 01 Aug 2019 | Published: 31 May 2019

TITUS

Titus Military Classification for NATO Security Compliance
sponsored by TITUS
PRODUCT OVERVIEW: In recent years, intelligence and military communities have begun to embrace the need for sharing critical information with allies. In this solution brief, learn how Titus provides a common classification and policy solution that enables information-sharing in a way that minimizes the risk of compromise.
Posted: 01 Aug 2019 | Published: 30 Jun 2019

TITUS

Addressing Challenges in Hybrid Cloud Security
sponsored by Trend Micro, Inc.
WHITE PAPER: Enterprises are increasingly using hybrid environments, but this move can come with risks and challenges especially for organizations adopting DevOps. How can hybrid environment security fit naturally into development processes? Download this white paper to learn more.
Posted: 31 Jul 2019 | Published: 31 Jul 2019

Trend Micro, Inc.

6 Steps to Container Security
sponsored by Trend Micro, Inc.
WHITE PAPER: Container security is challenging, as it covers so many aspects of the development process and supporting infrastructure. The overall strategy can be simply put as "secure outside in". In this white paper, discover 6 steps to implementing the "secure outside in" approach.
Posted: 31 Jul 2019 | Published: 31 Mar 2019

Trend Micro, Inc.
151 - 175 of 2513 Matches Previous Page    5 6 7 8 9 10    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement