IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed   
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 

Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Management Reports
26 - 50 of 2442 Matches Previous Page  |  Next Page
How do you solve a problem like security training?
sponsored by ComputerWeekly.com
EGUIDE: In this E-Guide, we will the tricky topic of security awareness training. Firstly, we try to answer the burning question of how to get employees to pay attention to training and take it seriously. Then, we take a look at some security awareness best practices that you can use to craft training your users will actually benefit from.
Posted: 27 Aug 2021 | Published: 27 Aug 2021

ComputerWeekly.com

Security Think Tank: Biden's Cyber Security Plan
sponsored by ComputerWeekly.com
EGUIDE: As Biden sets out his agenda for the next four years, the Computer Weekly Security Think Tank considers the opportunities for renewed international collaboration on cyber security, what aspects of cyber policy Biden would be best advised to focus on, and asks how the industry can better make its voice heard.
Posted: 27 Aug 2021 | Published: 27 Aug 2021

ComputerWeekly.com

Counter Ransomware Attacks with Cohesity
sponsored by Cohesity and Wipro
WHITE PAPER: It’s important to be able to counter the ransomware threat by eliminating the risk of expensive downtime. Read on to learn how Cohesity uses machine learning technologies to help you protect your backup data with immutable file protection and multifactor authentication, detect intruders, and accelerate recovery times.
Posted: 24 Aug 2021 | Published: 24 Aug 2021

Cohesity and Wipro

Cloud-Native Data Protection in the Era of Ransomware
sponsored by Clumio
VIDEO: Take a quick survey to watch this webcast and learn how Clumio can protect your native cloud workloads in the era of ransomware.
Posted: 24 Aug 2021 | Premiered: 24 Aug 2021

Clumio

The Cloud - Trouble with Snapshots
sponsored by Clumio
VIDEO: When it comes to data protection in the cloud, cloud architects can’t just rely on snapshot management due to exorbitant costs and security vulnerabilities. Take a quick survey to access this video to learn about Clumio’s secure backup as a service for the all-cloud world.
Posted: 24 Aug 2021 | Premiered: 24 Aug 2021

Clumio

Best Practices to Protect your Organization Against Ransomware Threats
sponsored by Clumio
BLOG: This blog post covers 5 steps to developing a defensive security posture to safeguard your data against ransomware and lays out how Clumio can help. Take a quick survey to get access right away.
Posted: 24 Aug 2021 | Published: 27 Jul 2021

Clumio

Overcoming the Challenges with Backup for AWS
sponsored by Clumio
EBOOK: This e-book explores the major gaps that can put AWS data at risk, according to Clumio, and explains how Clumio’s data protection, with its improved visibility, simple management, and low TCO, can help. Take this quick survey to learn more.
Posted: 24 Aug 2021 | Published: 24 Aug 2021

Clumio

Stay ahead of Ransomware Get back up and running
sponsored by Clumio
DATA SHEET: Clumio Enterprise Backup as a Service’s air-gap protection provides a new approach to beating ransomware and ensuring a quick recovery. Take this quick survey to gain access to a free infographic and learn more.
Posted: 24 Aug 2021 | Published: 24 Aug 2021

Clumio

MPA Combats Ransomware and Frees Up IT Resources with Cloud- Native Backup-as-a-Service
sponsored by Clumio
EBOOK: Take a quick survey to gain access to this case study to learn how Clumio’s backup provided MPA with air-gapped coverage, reduced complexity, proactive support, lower TCO and more.
Posted: 24 Aug 2021 | Published: 24 Aug 2021

Clumio

Security Think Tank Pt.2 - 2020 bought us universal remote working. So what next?...
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide: Each month Computer Weekly poses a question to its Security Think Tank, a panel of cyber security experts comprising industry insiders, technologists, analysts, legal experts and educators, to share their years of collective cyber security wisdom with the security community.
Posted: 06 Aug 2021 | Published: 06 Aug 2021

ComputerWeekly.com

SIEM, SOAR or both? Our security experts weigh in
sponsored by ComputerWeekly.com
EGUIDE: In this E-Guide we turn to the Computer Weekly Security Think Tank, a hand-picked panel of cyber security insiders, experts, analysts, and advocates with over a century's worth of collective experience between them, to explore the topic of Security Information and Event Management (SIEM), and Security Orchestration, Automation and Response, (SOAR).
Posted: 06 Aug 2021 | Published: 06 Aug 2021

ComputerWeekly.com

Security Think Tank Pt.1 - 2020 bought us universal remote working. So what next?...
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide: Each month Computer Weekly poses a question to its Security Think Tank, a panel of cyber security experts comprising industry insiders, technologists, analysts, legal experts and educators, to share their years of collective cyber security wisdom with the security community.
Posted: 06 Aug 2021 | Published: 06 Aug 2021

ComputerWeekly.com

How to Shrink Supply Chain Risk
sponsored by TechTarget
RESOURCE: The SolarWinds Orion attacks made victims of government agencies overnight – and without proper protection, your organization could be at risk, too. Download this guide to learn about supply chain attacks, what CISOs are doing to prevent them and detailed instructions on how to prevent bad actors from tampering with your supply chain.
Posted: 02 Aug 2021 | Published: 29 May 2021

TechTarget

The CISO's guide to supply chain security
sponsored by ComputerWeekly.com
EGUIDE: Supply chain attacks have long been a concern in cyber security circles as it can be difficult to enforce security measures for suppliers and partners. In this e-guide, find out why supply chain attacks are intensifying amid the pandemic, how companies are responding to the attacks and what else organisations can do to disrupt the cyber kill chain.
Posted: 04 Jul 2021 | Published: 05 Jul 2021

ComputerWeekly.com

Manchester United praised for swift response to cyber attack
sponsored by ComputerWeekly.com
EGUIDE: The Theatre of Dreams briefly turned into The Theatre of Nightmares last week as Manchester United Football Club suffered a cyber-attack on their systems. This e-Guide dives into more depth about how the attack happened and what Manchester United's cyber security team did, in order to prevent a loss of data and keep a clean sheet.
Posted: 01 Jul 2021 | Published: 01 Jul 2021

ComputerWeekly.com

Ultimate Guide to Cybersecurity Incident Response
sponsored by IBM
EGUIDE: Security threats and vulnerabilities, and the subsequent incidents and breaches that they can lead to, affect all organizations, regardless of size or industry. In this e-guide, learn everything you need to know about Incident response and how to best secure your organization during a cyberattack.
Posted: 21 Jun 2021 | Published: 20 Aug 2021

IBM

The 8 Best Cloud Security Certifications for IT Pros in 2021
sponsored by IBM
EGUIDE: As cloud adoption has furthered the need for cloud security pros, it has also increased the number of cloud security certifications available. Want to grow your career? Complete a brief survey to download this e-guide detailing the 8 best cloud security certifications for IT pros in 2021.
Posted: 21 Jun 2021 | Published: 21 Jun 2021

IBM

Network Monitoring Market Converges with Security Analytics
sponsored by IBM
EGUIDE: In this e-guide, discover the future of network management, and how it has been affected by the COVID-19 pandemic.
Posted: 21 Jun 2021 | Published: 23 Aug 2021

IBM

Threat Detection and Response Demands Proactive Stance
sponsored by IBM
EGUIDE: In this e-guide, read about Threat Detection and Response and why the defenses we use to protect against cyberattacks must evolve.
Posted: 21 Jun 2021 | Published: 19 Aug 2021

IBM

Top Benefits of SOAR Tools, Plus Potential Pitfalls to Consider
sponsored by IBM
EGUIDE: To keep pace with a constant and dynamic barrage of cyberthreats, organizations are embracing next-generation capabilities, like security operations, automation and response (SOAR) into their cybersecurity stack. Read this e-guide to review the top SOAR tools and compare the benefits and drawbacks of SOAR technologies.
Posted: 21 Jun 2021 | Published: 21 Jun 2021

IBM

Cyber Security: 2021 Worst in Show
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide: Throughout 2021, there has been a strong focus worldwide on how to combat cyber security attacks for most businesses. In this e-guide we take a look at the best of the worst of those attacks to happen throughout January to June this year and how businesses can learn/adapt from these attacks.
Posted: 09 Jun 2021 | Published: 09 Jun 2021

ComputerWeekly.com

How do you solve a problem like security training?
sponsored by ComputerWeekly.com
EGUIDE: In this E-Guide, we will the tricky topic of security awareness training. Firstly, we try to answer the burning question of how to get employees to pay attention to training and take it seriously. Then, we take a look at some security awareness best practices that you can use to craft training your users will actually benefit from.
Posted: 17 May 2021 | Published: 17 May 2021

ComputerWeekly.com

Preventing identity theft in a data breach
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, we will explore the links between ransomware attacks, data breaches and identity theft. First, Nicholas Fearn investigates the phenomenon of the double extortion attack, and shares some insider advice on how to stop them, while we'll explore the top five ways data backups can protect against ransomware in the first place.
Posted: 06 May 2021 | Published: 06 May 2021

ComputerWeekly.com

IT Priorites 2020 - After Covid 19 security goes back to basics
sponsored by ComputerWeekly.com
EGUIDE: This year's transition to remote working highlighted big gaps in the fundamentals of security, as updated TechTarget/Computer Weekly data reveals.
Posted: 06 May 2021 | Published: 06 May 2021

ComputerWeekly.com

Computer Weekly - 24 August 2021: How datacentre power growth is leaving Dublin in distress
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at the challenges faced by Dublin's datacentre sector, as growth leaves the city's electricity infrastructure creaking. We ask whether recent initiatives to close the UK's digital skills gaps are working. And we examine the latest injustice to hit the Post Office Horizon scandal. Read the issue now.
Posted: 20 Aug 2021 | Published: 24 Aug 2021

ComputerWeekly.com
26 - 50 of 2442 Matches Previous Page    1 2 3 4 5    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences