IT Agents  >   IT Workforce  >   Information Technology Professionals  >   IT Managers  >  

Security Managers

RSS Feed   
Security Managers Reports
1 - 25 of 879 Matches Previous Page  |  Next Page
How Okta’s IT + Workplace Teams Are Getting Ready for Dynamic Work
sponsored by Okta
WEBCAST: While the trends and practices within workplace optimization have varied over the last few decades, the main objective has remained the same: Optimize the productivity of people and processes. Watch this webinar and listen to 2 distinguished Okta leaders as they discuss the future of workplace optimization.
Posted: 08 Jul 2020 | Premiered: Jul 8, 2020

Okta

Hot Topic Live Okta Guy Mason
sponsored by Okta
WEBCAST: In this episode of Hot Topics Live, join the CIO of Bourne Leisure, a major player in the UK holiday and hospitality industry, as they discuss how the organization dealt with the pandemic and its ensuing lockdown.
Posted: 08 Jul 2020 | Premiered: Jul 8, 2020

Okta

Shor's Algorithm
sponsored by Thales
WEBCAST: While quantum computing presents a tremendous opportunity, it’s not without its risks. This webinar highlights the security implications of quantum computing, including the potential cyber threats that may be used by hackers and how organizations can address them. Watch now to learn more about the quantum threat.
Posted: 08 Jul 2020 | Premiered: Jul 8, 2020

Thales

Hunt for Data Protection Ends with Encryptionizer®
sponsored by NetLib Security
CASE STUDY: In this case study, discover how a medical device manufacturer (MDM) was able to address the risks targeting their patient data and overcome internal challenges related to protecting PHI, encrypting devices and ensuring compliance with increasingly stringent regulations.
Posted: 08 Jul 2020 | Published: 08 Jul 2020

NetLib Security

Data Catalogs for Privacy
sponsored by BigID
WHITE PAPER: The growing need for data privacy is a driving force for data catalogs: organizations need to be able to layer in context from personal, sensitive, and situational data to get value out of data management. Download this white paper to learn more about evolving traditional data catalogs to reflect the needs of the privacy age.
Posted: 08 Jul 2020 | Published: 08 Jul 2020

BigID

Securing the New Normal: A Virtual Happy Hour on Moving Forward
sponsored by RSA Conference
WEBCAST: In this webcast, a panel of industry leaders discuss the future of cybersecurity, highlighting what’s next for the industry, and the ways in which cybersecurity will evolve as we come to understand the “new normal” – focusing on business processes, procedures and policies, network security architecture and much more.
Posted: 08 Jul 2020 | Premiered: Apr 7, 2020

RSA Conference

Wavefront Secures DevOps Environments at Scale with Lacework
sponsored by Lacework
CASE STUDY: Due to the continually changing nature of their public cloud environment, Wavefront was facing visibility and security issues related to detecting and tracking vulnerabilities and threats. Download this white paper to see what led to their partnership with Lacework, as well as the results.
Posted: 08 Jul 2020 | Published: 08 Jul 2020

Lacework

Carson Living Secures Rapidly Growing Cloud Environment
sponsored by Lacework
CASE STUDY: Due to the rapid growth in adoption (400% in the past year) of their AWS-hosted application, Carson Living was facing issues related to ensuring cloud compliance and maintaining security configurations. Download this white paper to see what led to their partnership with Lacework, as well as the results.
Posted: 08 Jul 2020 | Published: 08 Jul 2020

Lacework

Five Key Elements of Continuous IT Compliance
sponsored by BMC
WHITE PAPER: As compliance regulations become more stringent, security and compliance teams are under additional pressure to ensure security, reduce risk and avoid conflicts. Download this white paper to learn more about a modern, intelligent approach to security – including 5 critical elements necessary for continuous IT compliance.
Posted: 08 Jul 2020 | Published: 08 Jul 2020

BMC

Driving Resiliency and Security in the Financial Services Industry
sponsored by BMC
WHITE PAPER: Resiliency is critical to the long-term success of the financial services industry. This is due to the amount of sensitive personal and financial data they manage that have attracted increasingly sophisticated cyberattack methods. Read on to discover best practices for ensuring security and resiliency of t financial services organizations.
Posted: 08 Jul 2020 | Published: 08 Jul 2020

BMC

An Introduction to Ranking a Vulnerability’s Priority Based on its Network Context
sponsored by Delve
WHITE PAPER: To help organizations quantify their vulnerabilities, they need to understand its context within their network. Download this white paper for an introductory look at contextual prioritization, an approach to vulnerability risk scoring that works to understand context and uses that information to identify potential risk areas.
Posted: 07 Jul 2020 | Published: 07 Jul 2020

Delve

Leveraging AI to Modernize Vulnerability Management and Remediation
sponsored by Delve
WHITE PAPER: Advances in AI provide organizations with the ability to automate workloads and offer intelligent decision-making capabilities, easing the burden on IT and security teams and allowing them to focus on strategic imperatives. Download this white paper to learn more about embracing AI to modernize vulnerability management and remediation.
Posted: 07 Jul 2020 | Published: 07 Jul 2020

Delve

From 30% to 100% Remote: How to Lead the Rapid Shift to a Remote Workforce
sponsored by Okta
WEBCAST: Connecting and communicating is critical for maintaining a semblance of normality, especially during times of crisis. Achieving this in the era of COVID-19, which saw the remote workforce jump from 30% to 100%, has been particularly challenging. Watch this webinar to see how IT and workplace technology experts at Okta handled this transition.
Posted: 07 Jul 2020 | Premiered: Jul 7, 2020

Okta

Access Management is Essential for Cloud Transformation
sponsored by Thales
RESOURCE: Each year, Thales conducts a study into the trends, challenges and tactics of access management in order to better understand their efficacy and usage. The following infographic highlights the key findings from this year’s survey – which features topics like password credentials, cloud transformations, user convenience, and more.
Posted: 07 Jul 2020 | Published: 07 Jul 2020

Thales

Cloud Migration Challenges
sponsored by BigID
PRODUCT OVERVIEW: Cloud migrations are nearing the point of necessity – even for highly regulated and risk-averse organizations. So, how can these organizations minimize risk, ensure data privacy and avoid costly disruptions? Read on to learn more about the challenges of cloud migration and how BigID is helping organizations overcome these obstacles.
Posted: 07 Jul 2020 | Published: 07 Jul 2020

BigID

7 Ways AI Can Automate and Improve Vulnerability Management Operations
sponsored by Delve
WHITE PAPER: Although under-utilized, AI has the potential to streamline operations through automation while reducing vulnerability risk for vulnerability management operations. Read this white paper to discover 7 ways AI can automate and enhance traditional or stagnant vulnerability management operations.
Posted: 06 Jul 2020 | Published: 06 Jul 2020

Delve

MSPs: The 5 Essentials from Your Endpoint Security Partner
sponsored by Malwarebytes
EBOOK: When it comes to managing cybersecurity, safeguarding client endpoints is a critical piece of the MSP service offering—as well as a complicated one. Read this e-book to view 5 essentials that MSPs need from their endpoint security providers and for tips and solutions to ensure your MSP is successful in this area.
Posted: 06 Jul 2020 | Published: 06 Jul 2020

Malwarebytes

Kaspersky Lab’s COVID-19 Relief Initiatives
sponsored by Kaspersky Lab
EGUIDE: Amid the stress caused by the COVID-19 pandemic, it’s nice to know that there are companies out there offering resources and assistance to organizations heavily affected. Download this e-guide to unlock 2 articles highlighting current COVID-19 relief initiatives at Kaspersky Lab.
Posted: 06 Jul 2020 | Published: 29 Jun 2020

Kaspersky Lab

How Threat Modeling & Attack Simulation Works
sponsored by Coalfire
WEBCAST: In this webinar, join Mike Weber, VP of Innovation at Coalfire, as he overviews how threat modeling and cyberattack simulations work within security program architectures – including how to interpret simulation data. Watch now to learn more about identifying and understanding the risks within your environment.
Posted: 06 Jul 2020 | Premiered: Jul 6, 2020

Coalfire

Data Minimization Challenges
sponsored by BigID
PRODUCT OVERVIEW: As the volume of data to manage grows exponentially, the need for data minimizations in cloud migrations and other cybersecurity endeavors becomes critical. Download this solution brief and discover how BigID can help organization to implement an automated approach to reduce security, compliance and governance risks.
Posted: 06 Jul 2020 | Published: 06 Jul 2020

BigID

RSAC Resource Guide: U.S. Election Security 2020
sponsored by RSA Conference
EGUIDE: Many cybersecurity experts have expressed concerns about the security of the upcoming U.S. elections. This RSAC Resource Guide: U.S. Election Security 2020 compiles expertise from industry leaders to provide readers with the insight and information they need to understand this topic.
Posted: 06 Jul 2020 | Published: 06 Jul 2020

RSA Conference

Light Agent or Agentless
sponsored by Kaspersky Lab
PRODUCT OVERVIEW: Virtual environments require a cybersecurity approach that goes beyond the scope of traditional systems. Download this features guide for an in-depth look at Kaspersky Security for Virtualization, an advanced network protection offering designed to improve threat detection speeds while offering the scalability needed for modern environments.
Posted: 02 Jul 2020 | Published: 02 Jul 2020

Kaspersky Lab

How malware authors make attack detection simple yet complex
sponsored by Cisco Umbrella
VIDEO: Emerging malware techniques indicate that cybercriminals are favoring simple, yet complex tricks in order to successfully conduct their campaigns. Watch this video to learn more about trending threat patterns, new malware tricks and how the simplest techniques can help organizations overcome these challenges.
Posted: 02 Jul 2020 | Premiered: 01 Jun 2020

Cisco Umbrella

Privacy Essentials for Security Professionals
sponsored by BigID
DATA SHEET: Today’s security professionals face growing pressure – both internally (cybersecurity initiatives) and externally (CCPA, GDPR & other data privacy regulations). This data sheet outlines key consideration areas to help organizations meet compliance requirements and ensure data protection across their environment.
Posted: 02 Jul 2020 | Published: 02 Jul 2020

BigID

Discovery-In-Depth: The Path to Data Intelligence
sponsored by BigID
WHITE PAPER: Data discover is the foundational element of an effective data management strategy – and discovery enables data intelligence, insight and analysis. Download this white paper and discover how to leverage multiple modes of data discovery in order to successfully find & identify sensitive data.
Posted: 02 Jul 2020 | Published: 02 Jul 2020

BigID
1 - 25 of 879 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info