IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed   
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 

Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Management Reports
51 - 75 of 2599 Matches Previous Page  |  Next Page
SLED - 3 Easy Ways to Secure Your K-12 School District
sponsored by Cisco Umbrella
RESOURCE: Deployed in 3 simple steps, Cisco Umbrella secures your entire school district in minutes. Easily protect students and staff against phishing attacks, filter content, and gain visibility into all activity, on or off-campus. Download this infographic to learn more.
Posted: 14 Feb 2020 | Published: 14 Feb 2020

Cisco Umbrella

CIS Critical Security Controls Evaluation Guide
sponsored by Absolute Software Corporation
WHITE PAPER: The Center for Internet Security (CIS) Critical Security Controls have become a trusted resource for organizations looking to identify threats and enhance security. This evaluation guide measures the Absolute Platform against the CIS Top 20 Critical Security Controls to illustrate its capabilities.
Posted: 14 Feb 2020 | Published: 02 Nov 2018

Absolute Software Corporation

Prevent Browser-Injected Ads from Hijacking Your Customers
sponsored by Tala Security
WHITE PAPER: By eliminating browser-injected ads, you can enhance customer experience on your website, which can lead to increased conversions, reduced shopping cart abandonment, and more. But what is the best way to go about blocking unwanted ads? Download this white paper to learn more.
Posted: 14 Feb 2020 | Published: 14 Feb 2020

Tala Security

What secure email gateways can do for your enterprise
sponsored by SearchSecurity.com
EBOOK: It is important to evaluate secure email gateways before implementing them in your organization. Here's a look at some of the best email security gateway products in the industry, as well as implementation, cost and uses.
Posted: 14 Feb 2020 | Published: 14 Feb 2020

SearchSecurity.com

4 Ways to Leverage the MITRE ATT&CK Framework in Your Security Operations
sponsored by D3 Security
WHITE PAPER: While the MITRE ATT&CK Framework is popular amongst security professionals, many teams struggle to get optimize its efficiency. In this white paper, learn 4 ways your security team can incorporate the MITRE ATT&CK Framework into your operations.
Posted: 14 Feb 2020 | Published: 14 Feb 2020

D3 Security

2019 SANS Automation & Integration Survey
sponsored by D3 Security
WHITE PAPER: While automation may not be a new concept, advancements in technology and the growing threat of cyberattacks has increased its popularity among security professionals. The results from 2019’s SANS Automation & Integration study highlight the presence of security automation in today’s organizations and look at common automation misconceptions.
Posted: 14 Feb 2020 | Published: 31 Mar 2019

D3 Security

The GoAnywhere Book of Secure File Transfer Project Examples
sponsored by Help/Systems
WHITE PAPER: Managed file transfer (MFT) software is primarily used to automate and encrypt the data exchanged between an organization and its trading partners, users, and employees. A robust MFT solution can also solve problems that fall outside your basic file transfer needs. In this white paper, learn how your peers use managed file transfer.
Posted: 14 Feb 2020 | Published: 14 Feb 2020

Help/Systems

CW Nordics February-April 2020: Swedes lose faith in social media as data security fears increase
sponsored by ComputerWeekly.com
EZINE: Swedish citizens are becoming more concerned about the activities of social media companies and are reducing their online interaction with them as a result.
Posted: 14 Feb 2020 | Published: 27 Feb 2020

ComputerWeekly.com

Fujitsu & VMware – Multi-Cloud Security
sponsored by Fujitsu
WEBCAST: In this video, Fujitsu & VMware experts offer insights, guidance, and solutions to overcome the challenges of cloud security to ensure your applications, workloads and data are ‘secure by design’ – whether at rest or in motion as you transform.
Posted: 13 Feb 2020 | Premiered: Dec 3, 2019

Fujitsu

Cryptomining - How Cryptocurrency is Changing Cyber Security
sponsored by Cisco Umbrella
WEBCAST: The introduction of cryptocurrencies has changed the cyber threat landscape. New varieties of ransomware in the form of cryptojacking, mining, and exchange phishing are plaguing today’s businesses. In this episode of ‘A Cybersecurity Technical Mini Series’, learn how you can stay protected.
Posted: 13 Feb 2020 | Premiered: Dec 16, 2019

Cisco Umbrella

SIG - More Organizations are Using a Secure Internet Gateway for Secure Access
sponsored by Cisco Umbrella
WHITE PAPER: What if you could provide workers with safe access to the internet — no matter what device they’re using or where they’re located, even if they aren’t on the VPN? A Secure Internet Gateway (SIG) provides just that. Download this trend report to unlock an in-depth analysis of SIG.
Posted: 13 Feb 2020 | Published: 13 Feb 2020

Cisco Umbrella

Third Party Privileged Access to Critical Systems
sponsored by Cyber-Ark Software
EBOOK: Third-party vendors play a pivotal role in the way business is conducted today. Yet, organizations tend to use antiquated methods, like VPNs, to allow access. In this e-book, explore the results of a recent CyberArk study into third-party privileged access and learn the steps your organization can take to ensure secure vendor access.
Posted: 13 Feb 2020 | Published: 13 Feb 2020

Cyber-Ark Software

Ransomware - NEW for 2020: Ransomware Defense for Dummies - 2nd Edition
sponsored by Cisco Umbrella
WHITE PAPER: Many organizations that are targeted by ransomware attacks assume that paying the ransom is the fastest and most cost-effective way to get their data back, but this isn’t always the case. Download your copy of ‘Ransomware Defense for Dummies’ to learn how ransomware attacks work and how to defend against them.
Posted: 13 Feb 2020 | Published: 13 Feb 2020

Cisco Umbrella

Fayolle Preempts Cyberattacks and Persistent Threats
sponsored by Malwarebytes
CASE STUDY: In this case study, follow the story of Fayolle, a French engineering and construction company, as they partner with Malwarebytes to address the rise in cyberattacks as a result of a cloud environment transition. Download the study now to uncover Fayolle’s results.
Posted: 13 Feb 2020 | Published: 13 Feb 2020

Malwarebytes

Chart Industries Vaporizes Ransomware and Malware
sponsored by Malwarebytes
CASE STUDY: In this case study, follow the journey of Chart Industries, a global manufacturer and distributer, as they partner with Malwarebytes to address the growing risk of malware and phishing attacks targeted at mobile workers and endpoints. Download the report to see the results.
Posted: 13 Feb 2020 | Published: 13 Feb 2020

Malwarebytes

Top VPNs secretly owned by Chinese firms
sponsored by ComputerWeekly.com
EGUIDE: Nearly a third of top VPNs are secretly owned by Chinese companies, while other owners are based in countries with weak or no privacy laws, potentially putting users at risk, security researchers warn. Dive into this story now.
Posted: 13 Feb 2020 | Published: 13 Feb 2020

ComputerWeekly.com

The Impact of Unsecured Digital Identities
sponsored by Keyfactor
WHITE PAPER: In this report, uncover key research findings from a recent study conducted by the Ponemon Institute into the impact of unsecured digital identities. Download the full study to unlock the key insights from the research.
Posted: 12 Feb 2020 | Published: 12 Feb 2020

Keyfactor

Core - DNS - Abracadabra of Malware: Obfuscation
sponsored by Cisco Umbrella
WEBCAST: In this episode of ‘A Cybersecurity Technical Mini Series’, take an in-depth look at obfuscation malware techniques; how they work, types of attacks, and how to mitigate these threats. Watch now to learn more.
Posted: 12 Feb 2020 | Premiered: Nov 30, 2019

Cisco Umbrella

How to Create a Successful Cybersecurity Plan
sponsored by Malwarebytes
WHITE PAPER: According to a Ponemon Institute study, the average cost of a breach is $3.86 million. Aside from monetary costs, organizations also face potential legal and reputational ramifications. Download this paper to better understand the key areas for consideration to help get you started building a cybersecurity plan.
Posted: 12 Feb 2020 | Published: 31 Jul 2019

Malwarebytes

Ransomware Can’t Stop the Presses at La Sentinelle
sponsored by Malwarebytes
CASE STUDY: In this case study, La Sentinelle, a media group in Mauritius, sought to eliminate downtime associated with ransomware in the wake of a disruptive malware attack. Download this white paper to learn how they developed a program that would enable them to identify, mitigate, and prevent malware attacks.
Posted: 12 Feb 2020 | Published: 12 Feb 2020

Malwarebytes

Protecting Your Organization with Strong Security Controls
sponsored by OneNeck IT
WHITE PAPER: The Center for Internet Security (CIS) developed a standardized approach and set of best practices for businesses to use to identify their specific security requirements and develop a security strategy. This approach is known as the CIS Controls approach. Download this white paper to unlock the industry expertise outlined in the CIS Controls.
Posted: 12 Feb 2020 | Published: 12 Feb 2020

OneNeck IT

Abusing Code Signing for Profit
sponsored by Chronicle
WHITE PAPER: Code signing was originally developed as way of guaranteeing the authenticity of a published file. However, given that this process is based on trust, it can be easily manipulated by skilled hackers. Download this white paper to unlock the results of a recent study into this issue and discover where the key concerns lie.
Posted: 11 Feb 2020 | Published: 11 Feb 2020

Chronicle

Redefining security analytics with Chronicle Backstory
sponsored by Chronicle
WHITE PAPER: Today’s security teams face several challenges: from escalating threats and expanding networks and devices to the increased pressure of meeting security requirements. In this white paper, take a closer look at the 5 security requirements to include in your strategy and learn more about Chronicle’s Backstory data platform.
Posted: 11 Feb 2020 | Published: 11 Feb 2020

Chronicle

Network Security Made Simple
sponsored by Cisco Umbrella
EBOOK: In this e-book, look at the challenges facing today’s security professionals and explore some simple actions you can take to reduce malware, simplify security and improve network performance.
Posted: 11 Feb 2020 | Published: 11 Feb 2020

Cisco Umbrella

Core - DNS - Threat Spotlight: Emotet
sponsored by Cisco Umbrella
WEBCAST: In this edition of ‘A Cybersecurity Technical Mini Series’, take a closer look at the history and evolution of Emotet malware. This webinar highlights Emotet’s infection chain and modules, how this malware can affect your organizations & best practices for avoiding an infection.
Posted: 11 Feb 2020 | Premiered: Oct 31, 2019

Cisco Umbrella
51 - 75 of 2599 Matches Previous Page    1 2 3 4 5 6    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info