IT Agents  >   IT Workforce  >   Information Technology Professionals  >   IT Managers  >  

Security Managers

RSS Feed   
Security Managers Reports
1 - 25 of 698 Matches Previous Page  |  Next Page
Adapt Security for Hybrid Cloud Environments
sponsored by Citrix
EGUIDE: In this expert e-guide, find out how you can overcome the security challenges of hybrid cloud, and learn about the organizational and cultural changes that accompany this shift in security.
Posted: 23 May 2018 | Published: 18 May 2018

Citrix

Voice of the Analyst Study: An Inside Perspective on Security Operations
sponsored by Respond Software
ANALYST REPORT: Find out why 45% say reality in the security operations centers (SOCs) does not meet expectations, and learn about the human side of the SOC to gain an understanding and insights to empower your SOC teams to be the best they can be.
Posted: 20 May 2018 | Published: 18 May 2018

Respond Software

Distributed Deception: A Critical Capability to Protect Infrastructure from Targeted Attacks
sponsored by Illusive Networks
RESOURCE: Discover 5 ways distributed deception can help resist and counter Dragonfly and other APT-style targeted attacks on your infrastructure.
Posted: 09 May 2018 | Published: 22 Mar 2018

Illusive Networks

IT Priorities 2018 - What's happening in security?
sponsored by ComputerWeekly.com
VIDEO: In this video, Computer Weekly's editor-in-chief, Bryan Glick, discusses what's happening in security according to our 2018 IT Priorities survey taken by over 250 IT decision makers and managers.
Posted: 02 May 2018 | Premiered: 02 May 2018

ComputerWeekly.com

Integrating, Coordinating, and Orchestrating Enterprise Security Tools
sponsored by Proofpoint, Inc.
VIDEO: Organizations have made significant investments in security technology in the last few years, but these tools are often underutilized due to staff capacity or skills. This webinar explores the security orchestration challenge organizations are facing today.
Posted: 24 Apr 2018 | Premiered: 19 Apr 2018

Proofpoint, Inc.

Data protection: A business imperative
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide: While many organisations are focusing on the huge fines for non-compliance and the significant financial and reputational costs of data breaches, it is the fact that good data protection and privacy practices builds consumer trust and enables the innovative use of data that should be driving organisations to act.
Posted: 24 Apr 2018 | Published: 24 Apr 2018

ComputerWeekly.com

Mobile security moving to a unified approach
sponsored by ComputerWeekly.com
EGUIDE: This e-guide offers expert insights into how the current trends in mobile security strategy are showing a move from mobile device management, to enterprise mobile management and unified endpoint management, which indicates a move towards a unified approach to mobile security.
Posted: 28 Feb 2018 | Published: 28 Feb 2018

ComputerWeekly.com

Simple, Effective Security for your Network Transformation
sponsored by Cisco Umbrella
EBOOK: Find out how to take advantage of a secure internet gateway, a single platform that provides 360 degree security for access to and use of the cloud, SaaS apps, branch offices, endpoints, and wherever else your users roam.
Posted: 12 Feb 2018 | Published: 12 Feb 2018

Cisco Umbrella

Achieve Effective PCI Compliance by Automating Required Controls and Processes
sponsored by Skybox Security
WHITE PAPER: Find out how to improve PCI DSS compliance by incorporating a platform into your network and information security workflows that provides a holistic understanding of your attack surface.
Posted: 08 Feb 2018 | Published: 31 Dec 2016

Skybox Security

The Rising Face of Cybercrime: Ransomware
sponsored by BitSight
RESEARCH CONTENT: This BitSight Insights Report examines the cybersecurity performance of nearly 20,000 organizations in the face of rising ransomware attacks. Uncover the report's 5 key findings about the different types of ransomware attacks across industries like education, government, and finance.
Posted: 07 Feb 2018 | Published: 07 Feb 2018

BitSight

The Security Professional's Role in a DevSecOps World
sponsored by Veracode, Inc.
WHITE PAPER: Learn about the evolving role of security professionals in the world of DevSecOps, and find out where app security fits into the shifting app development paradigms created by DevOps cultural changes.
Posted: 15 Jan 2018 | Published: 15 Jan 2018

Veracode, Inc.

How to Create a Scalable Threat Model
sponsored by Synopsys
WHITE PAPER: Find out how to make threat modeling more efficient and cost-effective with an automated, scalable, template-based approach.
Posted: 12 Jan 2018 | Published: 21 Sep 2017

Synopsys

The State of Software Security: Developer Guide
sponsored by Veracode, Inc.
WHITE PAPER: This State of Software Security report examines the increased burden on developers to ensure sound app security testing, particularly in DevOps and Agile environments. Discover best practices to improve app security testing and remediation, and learn about the tenets of DevSecOps.
Posted: 12 Jan 2018 | Published: 31 Dec 2017

Veracode, Inc.

Security Analysis Principles and Techniques for IT Pros
sponsored by SearchSecurity.com
EBOOK: As a result of the recent developments affecting security analytics, uncover these tips for ensuring you get the most out of your security analytics tool.
Posted: 01 Dec 2017 | Published: 01 Dec 2017

SearchSecurity.com

How To Become A Superstar Security Leader
sponsored by Google Cloud
ANALYST REPORT: As companies seek to innovate and engage customers through digital channels, they need superstar security leaders. This report looks at the biggest changes in firms' expectations of their chief information security officers and provides specific examples of how top information security professionals rise to those occasions.
Posted: 18 Oct 2017 | Published: 13 Feb 2017

Google Cloud

Mid-Year Cybersecurity Report 2017
sponsored by Cisco Systems, Inc.
RESEARCH CONTENT: Security teams are faced with protecting their companies' key assets from a constantly evolving threat landscape – making it imperative to stay on the pulse of cybersecurity. Explore this report to learn about current attacker behaviors, trends in vulnerability management, evolutions in malware, and beyond.
Posted: 20 Sep 2017 | Published: 31 Jul 2017

Cisco Systems, Inc.

A 5 Minute Guide to Security for Cognitive Search and Knowledge Management
sponsored by Attivio, Inc.
WHITE PAPER: Examine the resurgence of knowledge management, in conjunction with cognitive search and security, as a viable option for coordinating the vast amounts of information buried in big data environments.
Posted: 13 Sep 2017 | Published: 13 Sep 2017

Attivio, Inc.

The Essential Checklist: A Practical Guide to Efficient Security Response
sponsored by ServiceNow
WHITE PAPER: Find out how to detect and resolve data breaches faster by using a security operations checklist to identify which areas of your strategy could benefit most from updated methodologies like security automation.
Posted: 01 Sep 2017 | Published: 01 Sep 2017

ServiceNow

A Guide to Avoiding Financial Losses in Cybersecurity
sponsored by Kaspersky Lab
WHITE PAPER: 77% of U.S. businesses have suffered between 1 and 5 separate incidents of data loss, leakage or exposure in the past 12 months, according to Kaspersky Lab. This white paper reveals the financial woes across the threat landscape.
Posted: 31 Aug 2017 | Published: 31 Aug 2017

Kaspersky Lab

Cybersecurity — Whose Responsibility Is It?
sponsored by Armor
WHITE PAPER: Who is responsible for security in the enterprise? Learn how to determine roles and responsibilities, as well as policies and processes, to build a culture of security.
Posted: 30 Aug 2017 | Published: 31 Dec 2016

Armor

The City of Frankfurt Enables Work from Home with Two-Factor Authentication
sponsored by One Identity
CASE STUDY: Find out how the City of Frankfurt created a better work-life balance for its employees by enabling secure work from home with effective, user-friendly two-factor authentication.
Posted: 12 Feb 2018 | Published: 31 Dec 2015

One Identity

Discover a Fully Managed Detection and Response System
sponsored by Rapid7
RESOURCE: Inside this resource, learn how to simplify the procurement of security tools and staff with a suite of managed detection and response services. Read on to find out how you can gain user behavior analytics, threat intelligence based on data from over 5,000 users, and more.
Posted: 27 Nov 2017 | Published: 27 Nov 2017

Rapid7

What does a CISO do now? It's a changing, increasingly vital role
sponsored by SearchSecurity.com
EBOOK: What does a CISO do now, with risks proliferating and the most-needed security skills in short supply? Learn why the CISO role is more vital than ever.
Posted: 11 Oct 2017 | Published: 11 Oct 2017

SearchSecurity.com

The Smart, Secure Cloud for India: Learn How Google Cloud Infrastructure Keeps Your Data Secure
sponsored by Google Cloud
WHITE PAPER: Google Cloud's Mumbai cloud region provides faster data transfers and reduced latency to the India region. Download the whitepaper for a look under the hood of Google's infrastructure security, and explicit detail on the process we go through to build and maintain GCP regions. Download the report and find out more now.
Posted: 25 Sep 2017 | Published: 25 Sep 2017

Google Cloud

The Role of Automation in Optimizing Network Performance and Security
sponsored by FireMon
WHITE PAPER: As networks become more complex, network visibility reduces making it harder to identify and contain threats. Access this resource to learn how to overcome the challenges with this network security complexity gap.
Posted: 11 Aug 2017 | Published: 11 Aug 2017

FireMon
1 - 25 of 698 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement