IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed   
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 

Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Management Reports
151 - 175 of 3068 Matches Previous Page  |  Next Page
Microsegmentation: The First Step to Zero-Trust Security
sponsored by ColorTokens
RESOURCE: Modern security will see the elimination of adding network layer after network layer to fix security vulnerabilities. Businesses need a tighter security method, one that allows them to control traffic within and between segments. This is the basis of microsegmentation. Read this article to learn why microsegmentation is the way forward.
Posted: 06 Oct 2020 | Published: 23 Mar 2020

ColorTokens

Understanding Phishing: Invisible Characters
sponsored by Inky Technology
WHITE PAPER: Similar to hidden text and zero font, invisible characters is a phishing tactic designed to obscure text in order to bypass secure email gateways (SEGs). Read this edition of Understanding Phishing for a full breakdown of invisible text – including real-world examples and best practices for stopping it.
Posted: 06 Oct 2020 | Published: 06 Oct 2020

Inky Technology

Cox Communications: The Anatomy of an Email Hack
sponsored by Cox Communications, Inc.
WEBCAST: Email security has never been under greater threat. The boom in remote employees accessing private networks has demanded more of firewalls than ever before, and as such, there are bound to be some attacks that will work their way through. Watch this webcast to understand the anatomy of a live email hack.
Posted: 06 Oct 2020 | Premiered: Oct 6, 2020

Cox Communications, Inc.

Zero Trust eXtended Ecosystem Platform Providers
sponsored by Ionic Security
WHITE PAPER: This Forrester Wave Report evaluates the top vendors and offerings within the Zero Trust platform market – read on to unlock the vendor comparison matrix, scoring criteria and an in-depth analysis of each of the 15 most significant Zero Trust platform providers.
Posted: 06 Oct 2020 | Published: 24 Sep 2020

Ionic Security

Compliance Made Easy
sponsored by Armor
RESOURCE: The Armor Compliance Matrix was created with the intention of helping IT, IT security and compliance teams understand the major compliance mandates their organizations are subject to and how Armor can help accelerate adherence. Read on for an exclusive look at the matrix.
Posted: 06 Oct 2020 | Published: 06 Oct 2020

Armor

Simple Steps for Setting Up A Project Risk Register
sponsored by LogicGate
RESOURCE: For sophisticated projects, organizations typically turn to a project manager to assess and plan for risks. One emerging practice being used by project managers is the curation of a risk register. But what is a risk register? What does it entail? How can your organization get started making one? Read on to find out.
Posted: 06 Oct 2020 | Published: 18 Jun 2019

LogicGate

Top 6 Myths About SIEM
sponsored by IBM
WHITE PAPER: Traditionally, SIEM solutions were complex and targeted towards larger organizations. But with the need for security solutions ever-increasing, progressive SIEM vendors cater to businesses of all sizes.In this white paper, uncover the top 6 myths about SIEM and what organizations should expect from SIEM today. Read on to learn more.
Posted: 06 Oct 2020 | Published: 06 Oct 2020

IBM

Simplifying Security for Software-as-a-Service
sponsored by Armor
WHITE PAPER: The growth of SaaS companies has been crucial for both businesses and consumers. It’s given them the ability to save your customers time and money by quickly responding to changing needs. That said, SaaS comes with its set of security challenges. Jump into this white paper to learn how you can keep your SaaS enterprises secure.
Posted: 05 Oct 2020 | Published: 05 Oct 2020

Armor

Leading the Way with Secure Mobile Keyless Hotel Access
sponsored by Armor
CASE STUDY: The Trustwave Global Security Report lists the hospitality industry as one of the top five industries subjected to network breaches. Customer data is sensitive but attainable for threat actors, and developers must use caution when developing keyless hotel access. Read this case study to learn how one business balanced usability and security.
Posted: 05 Oct 2020 | Published: 05 Oct 2020

Armor

Transformative Risk Management
sponsored by LogicGate
PODCAST: Like social distancing to “flatten the curve”, effective risk management starts with focusing on the self and a small inner circle. In this podcast, join 3 distinguished GRC experts and risk leaders as they discuss the new era of risk management. Listen in to hear what they have to say.
Posted: 05 Oct 2020 | Premiered: Oct 5, 2020

LogicGate

GRC & Me: A Conversation on Risk Language
sponsored by LogicGate
PODCAST: Communication is one of the foundational elements of an organization’s ability to ensure productive relationships both within and between companies. In this podcast, join Melissa Ryan, co-founder of Asureti, as she discusses how her risk language and threat rating tools facilitate communication within and between organizations.
Posted: 05 Oct 2020 | Premiered: Oct 5, 2020

LogicGate

Approaches to Micro-Segmentation: Pros and Cons
sponsored by ColorTokens
RESOURCE: Micro-segmentation is emerging as one of the most effective methods in combating lateral threats that perimeter security fails to protect against. This article provides an overview of the 3 primary approaches to micro-segmentation, including the pros and cons of each approach – read on to get started.
Posted: 05 Oct 2020 | Published: 22 Apr 2020

ColorTokens

How to Comply with PCI-DSS 4.0
sponsored by ColorTokens
RESOURCE: PCI-DSS 4.0 is expected to roll out mid-2021, and organizations are preparing their compliance strategies to reflect the expected adjustments. This article provides an overview of what will change in PCI-DSS 4.0, what will carry over, and how to pick a technology partner to help achieve compliance.
Posted: 05 Oct 2020 | Published: 05 Jun 2020

ColorTokens

Global Phishing Pandemic? You Be the Judge.
sponsored by Inky Technology
RESOURCE: Since the start of the COVID-19 health crisis, complaints to the FBI’s Internet Crime Complaint Center (IC3) have more than tripled. Why are there so many of these coronavirus-related email phishing threats and where are they coming from? View this article to get a link to a free report of COVID-19 phishing examples around the world.
Posted: 05 Oct 2020 | Published: 05 Oct 2020

Inky Technology

Computer Weekly – 6 October 2020: The Most Influential Women in UK Technology 2020
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we announce our annual list of the Most Influential Women in UK Technology, and talk to this year's winner, Stemettes CEO and diversity campaigner Anne-Marie Imafidon. Meet our five Rising Stars and the latest entrants to our women in tech Hall of Fame. Read the issue now.
Posted: 05 Oct 2020 | Published: 06 Oct 2020

ComputerWeekly.com

The Ultimate Guide to The NIST Cybersecurity Framework
sponsored by CyberSaint
EBOOK: In this 10-minute read, understand the purpose, origin, and value of the NIST Cybersecurity Framework, important methods to simplify adoption, and actionable recommendations from compliance and risk expert – read on to get started.
Posted: 05 Oct 2020 | Published: 05 Oct 2020

CyberSaint

Rethink Firewalls: The Compelling Economic Case for Software-Based Segmentation
sponsored by Guardicore
WHITE PAPER: Why are IT and security teams still relying on legacy firewalls to do internal network segmentation? As policy-protected applications and segments proliferate, physical firewall appliances are proving ineffective in today’s increasingly dynamic hybrid-cloud environments. Read this white paper to learn about software-based segmentation.
Posted: 05 Oct 2020 | Published: 05 Oct 2020

Guardicore

Watch: Calculating and Using RoSI
sponsored by CyberSaint
VIDEO: The ability to calculate and demonstrate return on security investments (RoSI) plays a major role in ensuring buy-in from the CEO and board as well as securing more budget. Watch this video to learn how to calculate and use RoSI for future cybersecurity initiatives.
Posted: 05 Oct 2020 | Premiered: 05 Oct 2020

CyberSaint

Distance Learning’s Impact on Education IT
sponsored by Absolute Software Corporation
WHITE PAPER: The spread of COVID-19 has brought about a rapid and dramatic shift towards remote learning models in order to facilitate classroom effectiveness at K-12 schools. This report provides an overview of these challenges, risks and opportunities – gathered from a recent study into the impact of COVID-19 and remote learning on education IT.
Posted: 05 Oct 2020 | Published: 05 Oct 2020

Absolute Software Corporation

SD-WAN’s New SASE (“Sassy”) Friend
sponsored by Hughes Network Systems
EBOOK: Now that much of the working world has gone remote, legacy security architectures will not cut it when it comes to safeguarding from threats. The ever-growing number of new devices connecting to cloud networks need a smarter way to have identity and context brokered. Read this e-book to learn about SASE, a close friend of SD-WAN.
Posted: 05 Oct 2020 | Published: 05 Oct 2020

Hughes Network Systems

Manage Security Risk with Red Hat Insights
sponsored by Red Hat
WHITE PAPER: Access this white paper to learn about Red Hat Enterprise Linux, a tool that offers 5 key benefits for organizations looking to analyze, prioritize, and remediate issues as well as report their status.
Posted: 02 Oct 2020 | Published: 02 Oct 2020

Red Hat

What is Operational Resilience?
sponsored by LogicGate
RESOURCE: According to Gartner, operational resilience is a set of techniques that allows people, processes and information systems to adapt to changing patterns. How do businesses not just prepare but succeed when faced with the unexpected? Read this quick article to get an understanding of how organizations comprehend their respective risk.
Posted: 02 Oct 2020 | Published: 17 Sep 2020

LogicGate

What is Micro-Segmentation?
sponsored by ColorTokens
WHITE PAPER: The cost of a data breach and the time it takes to find and isolate it are both inordinately high, underscoring the fact that the traditional castle-and-moat approach to cybersecurity is no longer relevant. Read on to learn why micro-segmentation is gaining traction as the best way to secure and govern all areas of your business’s data systems.
Posted: 02 Oct 2020 | Published: 02 Oct 2020

ColorTokens

The Top 5 InfoSec Professional Challenges
sponsored by LogicGate
RESOURCE: What keeps you up at night? If you’re anything like most risk and information security professionals, the list is long. Juggling security concerns, reporting on risk data, and managing the latest regulatory requirements all add up. To stay in the know, read the top 5 challenges infosec professionals face, and the common thread linking them all.
Posted: 02 Oct 2020 | Published: 24 Sep 2020

LogicGate

Cybersecurity Risk Management Simplified
sponsored by CyberSaint
DATA SHEET: There could be no greater luxury in today’s unpredictable world than having cybersecurity and risk management simplified. In this white paper, you can learn about a standardized risk management platform that allows you to integrate your strategy for a unified approach, manage expectations for risk reduction, and intelligently present cost.
Posted: 02 Oct 2020 | Published: 02 Oct 2020

CyberSaint
151 - 175 of 3068 Matches Previous Page    5 6 7 8 9 10    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info