IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed   
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 

Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Management Reports
76 - 100 of 2492 Matches Previous Page  |  Next Page
Addressing Challenges in Hybrid Cloud Security
sponsored by Trend Micro, Inc.
WHITE PAPER: Enterprises are increasingly using hybrid environments, but this move can come with risks and challenges especially for organizations adopting DevOps. How can hybrid environment security fit naturally into development processes? Download this white paper to learn more.
Posted: 31 Jul 2019 | Published: 31 Jul 2019

Trend Micro, Inc.

Testing Security Effectiveness with the MITRE ATT&CK™ Framework
sponsored by Cymulate
PRODUCT OVERVIEW: The MITRE ATT&CK framework has gained traction thanks to its comprehensive mapping of adversary tactics and techniques used to infiltrate a network, compromise systems and act on malicious threat actor objectives. In this solution brief, learn how Cymulate can help organizations model threat simulations with the MITRE ATT&CK Framework.
Posted: 31 Jul 2019 | Published: 31 Jul 2019

Cymulate

Gaining a Strategic Endpoint Security Advantage in the Era of Advanced Threats
sponsored by Symantec
WHITE PAPER: Today's advanced threat landscape poses serious challenges for enterprises of any size. But the rising trend of attacks directed against midsized enterprises should bring security to the forefront of business planning for these organizations. In this report, learn how machine learning and AI can help in the fight against advanced threats.
Posted: 31 Jul 2019 | Published: 31 Jul 2019

Symantec

6 Steps to Container Security
sponsored by Trend Micro, Inc.
WHITE PAPER: Container security is challenging, as it covers so many aspects of the development process and supporting infrastructure. The overall strategy can be simply put as "secure outside in". In this white paper, discover 6 steps to implementing the "secure outside in" approach.
Posted: 31 Jul 2019 | Published: 31 Mar 2019

Trend Micro, Inc.

The California Consumer Privacy Act of 2018
sponsored by TITUS
WHITE PAPER: In this solution brief, discover more about how TITUS enhances CCPA compliance and its solution features and benefits.
Posted: 30 Jul 2019 | Published: 19 Jun 2018

TITUS

Is DNS Filtering the Best Cybersecurity Technology You're Not Using?
sponsored by Neustar
ANALYST REPORT: A new IDG Research study found that many IT decision-makers are overlooking an inexpensive technology that may already be in their arsenal: DNS filtering. In this IDG Quick Poll, explore security benefits that DNS filtering can provide and how to use it to its full potential.
Posted: 30 Jul 2019 | Published: 30 Jul 2019

Neustar

Protecting Your IT Assets from Cryptomining Malware
sponsored by Neustar
WHITE PAPER: Cryptomining malware has exploded on the threat landscape, becoming one of the most common malware attacks and posing a significant risk to your IT assets. In this white paper learn everything you need to know about cryptomining including what it does, how it gets in, and how to recognize and prevent it.
Posted: 30 Jul 2019 | Published: 19 Jul 2019

Neustar

Assessing Cloud Access Security Brokers
sponsored by Proofpoint
ANALYST REPORT: Cloud access security brokers are becoming a must have for enterprises as they commit to the cloud. Which CASB vendor is best for yours?
Posted: 30 Jul 2019 | Published: 29 Oct 2018

Proofpoint

RSA Conference 2019 Security Operations Center Findings Summary
sponsored by RSA Conference
RESOURCE: The RSA Conference SOC analyzed the Moscone Center wireless traffic which is an open network during the week of the conference. The goal of the RSAC SOC is to use technology to educate conference attendees about what happens on a typical wireless network. Download this resource to explore key findings from the educational exhibit.
Posted: 29 Jul 2019 | Published: 29 Jul 2019

RSA Conference

Our Own Worst Enemy: Tackling the Social Engineering Problem
sponsored by RSA Conference
RESOURCE: As it turns out, the weakest link in any cybersecurity solution is...us. With hackers using social engineering scams to fool people into giving up personal information, what's the best way to address this growing issue? Download this podcast transcript for an expert discussion on how to positively impact employee behavior.
Posted: 29 Jul 2019 | Published: 29 Jul 2019

RSA Conference

Faster Response with Crowdstrike and MITRE ATT&CK
sponsored by CrowdStrike
WHITE PAPER: As responders often lack the time and resources to investigate every alert, or even prioritize the most critical ones, a high-risk threat might go unnoticed. Potentially, this could allow devastating breaches to occur. In this white paper, learn how adopting the common industry framework MITRE ATT&CK can solve this challenge.
Posted: 24 Jul 2019 | Published: 24 Jul 2019

CrowdStrike

Acalvio Deception and the NIST Cybersecurity Framework 1.1
sponsored by Acalvio
WHITE PAPER: The NIST Cybersecurity Framework 1.1 (CSF) is being widely adopted by organizations of all types as they seek to minimize risk. In this white paper, explore an overview of the CSF core controls and learn how Acalvio supports the NIST Cybersecurity Framework.
Posted: 23 Jul 2019 | Published: 30 Jun 2018

Acalvio

DIY or NSP? Finding the optimal approach to deploying a next-generation SD-WAN
sponsored by Windstream Communications
WHITE PAPER: In this white paper from Windstream Enterprise, discover the key considerations as organizations demand a rapid response to updating the WAN to support a modern digital business.
Posted: 22 Jul 2019 | Published: 22 Jul 2019

Windstream Communications

5 practical tips for implementing SD-WAN
sponsored by Windstream Communications
WHITE PAPER: In this white paper, discover Forrester's 5 practical tips for implementing SD-WAN in your organization.
Posted: 22 Jul 2019 | Published: 22 Jul 2019

Windstream Communications

Utility Regulations Demand Robust Third-Party Risk Management
sponsored by BitSight
WHITE PAPER: In this white paper, learn how utilities organizations can comply with regulations and prevent cyberattacks, data breaches, and potential physical harm by using a robust third-party risk management program.
Posted: 18 Jul 2019 | Published: 18 Jul 2019

BitSight

Build a Strategic Approach to Network and App Security
sponsored by Citrix
EBOOK: In this e-book, discover how an integrated, intelligent approach to security can help you deliver the access, control, and security you need.
Posted: 18 Jul 2019 | Published: 18 Jul 2019

Citrix

Personnel Administration and Security Solution for Federal Agencies
sponsored by Appian
WHITE PAPER: In this white paper, learn how the Appian Personnel Administration and Security Solution (PASS) can help create a unified view of people and investigations in order to improve the efficiency and effectiveness of personnel security administration.
Posted: 17 Jul 2019 | Published: 17 Jul 2019

Appian

Tackling the Visibility Gap in Information Security
sponsored by ReliaQuest
ANALYST REPORT: Read on to uncover the most tangible pain points in security management and the emerging mandate required from people, processes and technology to continue optimizing threat protection.
Posted: 15 Jul 2019 | Published: 15 Jul 2019

ReliaQuest

The Risk Initiative: Building a Business Case with Mitigation ROI
sponsored by Cyber-Ark Software
ANALYST REPORT: CyberArk launched a multi-part research project "The Risk Initiative: Building a Business Case with Mitigation ROI" which is designed to investigate how cybersecurity professionals can mature their programs to move towards ROI-centric decision-making. Download this research report to explore key findings.
Posted: 15 Jul 2019 | Published: 28 Feb 2019

Cyber-Ark Software

Data Protection by Design
sponsored by Immuta, Inc
WHITE PAPER: Data Protection by Design (DPbD) is the core data protection requirement introduced by the GDPR. And yet despite DPbD's centrality to the GDPR, it receives scant attention. Why? It's quite difficult to implement because it consists of many different requirements. In this white paper, explore what the DPbD is and why it's central to the GDPR.
Posted: 15 Jul 2019 | Published: 15 Jul 2019

Immuta, Inc

Top 10 Anti-fraud Tips: The Cybersecurity Breach Aftermath
sponsored by LexisNexis Risk Solutions
EBOOK: In this eBook, discover the top 10 anti-fraud tips on how to accurately authenticate your users in real time, and secure against fraud and account takeover attacks.
Posted: 12 Jul 2019 | Published: 12 Jul 2019

LexisNexis Risk Solutions

3 Steps to Securing Enterprise Data on Cloud Platforms
sponsored by ReliaQuest
WHITE PAPER: Enterprises have leveraged cloud platforms to facilitate web applications for years. However, many organizations that move to cloud platforms mistakenly assume that the cloud provider delivers sufficient visibility and monitoring. In this white paper, explore 3 steps that can help you properly secure your enterprise data on cloud platforms.
Posted: 11 Jul 2019 | Published: 11 Jul 2019

ReliaQuest

What Makes a Standalone IPS so Effective?
sponsored by Trend Micro, Inc.
WHITE PAPER: In this white paper, explore the guiding principles security researchers need to follow when designing and developing effective vulnerability filters, with examples of how these filters can be used by an IPS to detect and block the latest threats.
Posted: 11 Jul 2019 | Published: 01 Mar 2019

Trend Micro, Inc.

CW ASEAN: Trend Watch – Security
sponsored by ComputerWeekly.com
EZINE: Artificial intelligence tools are becoming a vital part of the security arsenal for organizations and cyber criminals alike. In this handbook, Computer Weekly looks at how ASEAN firms are using AI to combat cyber threats and experts discuss the latest smart cyber security tools.
Posted: 11 Jul 2019 | Published: 18 Jul 2019

ComputerWeekly.com

THE THREE PHASES OF SECURING PRIVILEGED ACCOUNTS
sponsored by Cyber-Ark Software
WHITE PAPER: In this white paper, discover the 3 phases of securing privileged accounts and which action may benefit an organization the most.
Posted: 10 Jul 2019 | Published: 10 Jul 2019

Cyber-Ark Software
76 - 100 of 2492 Matches Previous Page    2 3 4 5 6 7    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement