IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed   
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 

Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Management Reports
51 - 75 of 2492 Matches Previous Page  |  Next Page
Privacy by Design: The Key to Unlock Your Compliance Strategy
sponsored by Immuta, Inc
WHITE PAPER: Privacy by Design (PbD), and its EU version Data Protection by Design (DPbD), aim to implement privacy controls from the outset. In this white paper, explore the beginnings of a framework for operationalizing PbD.
Posted: 06 Aug 2019 | Published: 06 Aug 2019

Immuta, Inc

Top VPNs secretly owned by Chinese firms
sponsored by ComputerWeekly.com
EGUIDE: Nearly a third of top VPNs are secretly owned by Chinese companies, while other owners are based in countries with weak or no privacy laws, potentially putting users at risk, security researchers warn. Dive into this story now.
Posted: 06 Aug 2019 | Published: 06 Aug 2019

ComputerWeekly.com

Evolution of ICS Attacks and the Prospects for Future Disruptive Events
sponsored by Dragos
WHITE PAPER: Headlines are full of proclamations covering the latest in industrial control system (ICS) attacks and threats to critical infrastructure. In this white paper, explore an analysis of ICS disruptive events from the past 4 years. Also, learn how these threats have evolved over time, and what measures are necessary to defeat them.
Posted: 06 Aug 2019 | Published: 06 Aug 2019

Dragos

The Definitive Guide to Public Cloud Security
sponsored by Lacework
WHITE PAPER: In this security report, discover how Lacework compares security vendors for AWS, Azure, and GCP and dive deeper into common security challenges presented by the cloud.
Posted: 06 Aug 2019 | Published: 06 Aug 2019

Lacework

Magecart PCI Advisory on CSP
sponsored by Tala Security
RESOURCE: The Payment Card Industry Security Standard Council issued a set of recommendations and guidance to address the growing threat by magecart. They suggested using Content Security Policies (CSP) to restrict compliant browsers from executing JavaScript from source which have not been explicitly whitelisted. In this blog, learn more about CSP.
Posted: 06 Aug 2019 | Published: 02 Aug 2019

Tala Security

Enhanced Security for AWS
sponsored by Lacework
WHITE PAPER: In this security solution brief, discover how Lacework uses threat detection, compliance, and automated security monitoring for workloads and accounts running in AWS and in multi-cloud environments.
Posted: 06 Aug 2019 | Published: 06 Aug 2019

Lacework

Are You Taking a Risk-Adaptive Approach to Dynamic Data Protection?
sponsored by Forcepoint
WEBCAST: In this webcast, Bharath Vasudevan from Forcepoint discusses how taking a risk-adaptive approach combined with behavioral analytics can enable your security to fluctuate based on the threat environment. The webcast will also explore how Forcepoint's solution, Dynamic Data Protection, delivers risk-adaptive protection.
Posted: 05 Aug 2019 | Premiered: Aug 5, 2019

Forcepoint

How to Start Building an Industrial Cybersecurity Program
sponsored by Dragos
WHITE PAPER: In this white paper, discover how to start building an industrial cybersecurity program and what organizations beginning to develop an ICS security program should do.
Posted: 05 Aug 2019 | Published: 05 Aug 2019

Dragos

Closing the People, Processes and Technology Gap: How Innovation Can Strengthen Your Cybersecurity Program
sponsored by Optiv
RESOURCE: A robust security model is built on 3 pillars—people, processes and technology. Unfortunately, a failure to innovate could negatively affect your ability to excel at all 3. In this blog, explore these 3 pillars and discover 5 steps to solving the people, process and technologies equation.
Posted: 05 Aug 2019 | Published: 24 Jul 2019

Optiv

Insights into Building an Industrial Control System Security Operations Center
sponsored by Dragos
WHITE PAPER: One of the most dedicated focuses towards security that can be implemented in an ICS is a security operations center (SOC). In this white paper, learn how best practices from enterprise IT SOCs can be adapted to focus on ICS environments.
Posted: 05 Aug 2019 | Published: 31 Mar 2017

Dragos

ICS Activity Groups and the Threat Landscape
sponsored by Dragos
WHITE PAPER: Throughout 2018, the amount of activity targeting industrial control systems (ICS) increased substantially. Also in 2018, ICS security risk grew even absent any destructive attacks. In this white paper, explore threat activity groups targeting ICS and details about their activity, methodologies, victimologies, and future concerns.
Posted: 05 Aug 2019 | Published: 05 Aug 2019

Dragos

Mastering Policy Setting and Control in the Cloud
sponsored by Forcepoint
WEBCAST: Join guest presenter Andras Cser, a Forrester Vice President and Principal Analyst, as he shares recommendations for securing data and mastering policy setting in the cloud.
Posted: 05 Aug 2019 | Premiered: Aug 5, 2019

Forcepoint

Top 10 Security Trends for 2019
sponsored by Micro Focus & DXC Technology
WHITE PAPER: In this white paper, learn about the top 10 security trends in 2019 & the driving factors behind them.
Posted: 02 Aug 2019 | Published: 02 Aug 2019

Micro Focus & DXC Technology

Making an Impact with Security Awareness Training
sponsored by Mimecast
ANALYST REPORT: Employees are the last line of defense against cyberattacks, and in too many cases these defenses fail. In this report, learn how to create a successful security awareness training program.
Posted: 02 Aug 2019 | Published: 15 Oct 2018

Mimecast

Dragos Industrial Cybersecurity Platform
sponsored by Dragos
VIDEO: The industrial security community faces strategic challenges in responding to cyberthreats. In this video, learn about Dragos' industrial cybersecurity platform which helps ICS defenders to identify assets, detect threats and respond via investigation playbooks.
Posted: 02 Aug 2019 | Premiered: 11 Nov 2018

Dragos

The Urgent Need for Security Instrumentation
sponsored by Verodin
ANALYST REPORT: In this IT Harvest report, cybersecurity research analyst and bestselling author Richard Stiennon tackles the fundamental flaws in traditional cybersecurity assessments, compliance and policies. Read on to explore a new, evidence-based approach to validating cybersecurity effectiveness and aligning it to the business.
Posted: 02 Aug 2019 | Published: 02 Aug 2019


Seamless Transition to CUI Markings
sponsored by TITUS
PRODUCT OVERVIEW: While it is critical to set standardized controls for the way information is handled, the process of implementing CUI markings is complex, time-consuming, and sometimes unclear. In this solution brief, learn how Titus data protection solutions can help organizations to ensure they meet CUI requirements.
Posted: 02 Aug 2019 | Published: 30 Jun 2019

TITUS

Holistic Privacy Readiness
sponsored by Okera
WEBCAST: In this Okera webcast, learn about the requirements for holistic privacy readiness and the best practices for S3 and azure data lakes.
Posted: 02 Aug 2019 | Premiered: Aug 2, 2019

Okera

Be the Disrupter, Not the Disrupted
sponsored by Micro Focus & DXC Technology
RESOURCE: On the journey to digitally transform your business, don't forget the essentials: enterprise security and risk management. After all, disrupting the status quo with better business outcomes requires not falling prey to disruptions from cyberthreats. In this infographic, learn the top challenges in cyberthreat defense and how you can overcome them.
Posted: 01 Aug 2019 | Published: 01 Aug 2019

Micro Focus & DXC Technology

Is Microsoft O365 Good Enough Protection & Recovery Webinar?
sponsored by Mimecast
WEBCAST: Many organizations are asking themselves, "Is Microsoft Office 365 good enough protection and recovery?" According to Gartner, investing in third-party tools for "faster, more-flexible recovery options" is a good idea. In this webinar, Shane Harris and Glenn Brown of Mimecast discuss where your biggest risks are and how to mitigate them.
Posted: 01 Aug 2019 | Premiered: Aug 1, 2019

Mimecast

Adopting Productivity: How SOCs can Evolve to Advanced Fusion Centers
sponsored by Optiv
RESOURCE: In this infographic, learn how security operations centers can evolve to advance fusion centers.
Posted: 01 Aug 2019 | Published: 01 Aug 2019

Optiv

A Quick Guide to Stopping Ransomware
sponsored by Webroot
RESOURCE: In this infographic, explore 9 proactive steps you can take to reduce the likelihood that you'll fall victim to a crypto-ransomware attack.
Posted: 01 Aug 2019 | Published: 01 Aug 2019

Webroot

The 4 Types of Threat Detection
sponsored by Dragos
WHITE PAPER: Threat detection comprises 1 of the 3 core cybersecurity functions along with prevention and response. But, detection plays an outsized role as arguably the most important cybersecurity function in an "assume breach" world. In this white paper, explore the 4 types of threat detection, how they are derived and the uses for each.
Posted: 01 Aug 2019 | Published: 13 Jul 2018

Dragos

The Vital Role of Security in Digital Transformation
sponsored by TITUS
ANALYST REPORT: A survey conducted by Market Strategies Internal showed that 78% of ITDMs believe that the success of their digital transformation relies heavily on strong IT security and data protection. In this research report, explore 2 different security professional personas and explore how they view digital transformation, security and data protection.
Posted: 01 Aug 2019 | Published: 31 May 2019

TITUS

Titus Military Classification for NATO Security Compliance
sponsored by TITUS
PRODUCT OVERVIEW: In recent years, intelligence and military communities have begun to embrace the need for sharing critical information with allies. In this solution brief, learn how Titus provides a common classification and policy solution that enables information-sharing in a way that minimizes the risk of compromise.
Posted: 01 Aug 2019 | Published: 30 Jun 2019

TITUS
51 - 75 of 2492 Matches Previous Page    1 2 3 4 5 6    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement