IT Agents  >   IT Workforce  >   Information Technology Professionals  >   IT Managers  >  

Security Managers

RSS Feed   
Security Managers Reports
1 - 25 of 723 Matches Previous Page  |  Next Page
How to Design and Maintain a Secure ICS Network
sponsored by SecurityMatters
WHITE PAPER: Learn about the IEC 62443 standards and their limitations so that you can reduce the exposure of industrial networks to constantly evolving threats with analytics, network segmentation, enhanced threat detection, and more.
Posted: 12 Feb 2018 | Published: 16 Jul 2015

SecurityMatters

The City of Frankfurt Enables Work from Home with Two-Factor Authentication
sponsored by One Identity
CASE STUDY: Find out how the City of Frankfurt created a better work-life balance for its employees by enabling secure work from home with effective, user-friendly two-factor authentication.
Posted: 12 Feb 2018 | Published: 31 Dec 2015

One Identity

Achieve Effective PCI Compliance by Automating Required Controls and Processes
sponsored by Skybox Security
WHITE PAPER: Find out how to improve PCI DSS compliance by incorporating a platform into your network and information security workflows that provides a holistic understanding of your attack surface.
Posted: 08 Feb 2018 | Published: 31 Dec 2016

Skybox Security

What is Attribute-Based Access Control?
sponsored by Axiomatics
WHITE PAPER: Learn about the evolution of traditional role-based access control and how the shift towards attribute-based access control is impacting cybersecurity.
Posted: 08 Feb 2018 | Published: 31 Dec 2016

Axiomatics

The Rising Face of Cybercrime: Ransomware
sponsored by BitSight
RESEARCH CONTENT: This BitSight Insights Report examines the cybersecurity performance of nearly 20,000 organizations in the face of rising ransomware attacks. Uncover the report's 5 key findings about the different types of ransomware attacks across industries like education, government, and finance.
Posted: 07 Feb 2018 | Published: 07 Feb 2018

BitSight

Bell Helicopter Enables Attribute-Based Access Control and Authorization
sponsored by Axiomatics
CASE STUDY: In this case study, find out how Bell Helicopter used a scalable attribute-based access control (ABAC) platform to prevent unauthorized access and handle their sensitive and regulated data throughout the enterprise.
Posted: 07 Feb 2018 | Published: 31 Dec 2015

Axiomatics

End-User Security Survey: How Common is Confidential File Sharing?
sponsored by Dell and Intel
RESEARCH CONTENT: To find out how widespread the unsafe sharing of confidential data has become, Dell commissioned a global survey of 2,608 professionals who handle confidential data at companies with 250 or more employees. Click inside to learn the results.
Posted: 26 Jan 2018 | Published: 29 Dec 2017

Dell and Intel

The DevSecOps Global Skills Survey
sponsored by Veracode, Inc.
RESEARCH CONTENT: This DevSecOps Global Skills Survey looks at the responses from 400 DevOps professionals on the state of DevOps workforces and education. Gain insight into how developers, IT ops, QA professionals, and even security view current DevOps and DevSecOps practices.
Posted: 18 Jan 2018 | Published: 18 Jan 2018

Veracode, Inc.

Getting Started with Secure DevOps
sponsored by Veracode, Inc.
WEBCAST: Find out how to extend the collaborative efforts between developers and IT operations to your security pros as well so that you can shift towards a DevSecOps culture and incorporate app security as early and often into the development lifecycle as you can.
Posted: 17 Jan 2018 | Premiered: May 25, 2017

Veracode, Inc.

The Security Professional's Role in a DevSecOps World
sponsored by Veracode, Inc.
WHITE PAPER: Learn about the evolving role of security professionals in the world of DevSecOps, and find out where app security fits into the shifting app development paradigms created by DevOps cultural changes.
Posted: 15 Jan 2018 | Published: 15 Jan 2018

Veracode, Inc.

How to Create a Scalable Threat Model
sponsored by Synopsys
WHITE PAPER: Find out how to make threat modeling more efficient and cost-effective with an automated, scalable, template-based approach.
Posted: 12 Jan 2018 | Published: 21 Sep 2017

Synopsys

The State of Software Security: Developer Guide
sponsored by Veracode, Inc.
WHITE PAPER: This State of Software Security report examines the increased burden on developers to ensure sound app security testing, particularly in DevOps and Agile environments. Discover best practices to improve app security testing and remediation, and learn about the tenets of DevSecOps.
Posted: 12 Jan 2018 | Published: 31 Dec 2017

Veracode, Inc.

Best Practices: Strategies For Making The Crucial Shift To DevSecOps
sponsored by Veracode, Inc.
RESEARCH CONTENT: This Forrester Research report examines the importance of incorporating security into DevOps methodologies. Discover 3 steps for shifting from DevOps to DevSecOps and find out how to deliver high-quality apps faster.
Posted: 11 Jan 2018 | Published: 01 May 2017

Veracode, Inc.

The Developers Guide to the DevSecOps Galaxy
sponsored by Veracode, Inc.
WHITE PAPER: Learn about the top app security challenges for DevOps methodologies and find out how to bolster app development with best practices for DevSecOps.
Posted: 10 Jan 2018 | Published: 10 Jan 2018

Veracode, Inc.

Mid-Year Cybersecurity Report 2017
sponsored by Cisco Systems, Inc.
RESEARCH CONTENT: Security teams are faced with protecting their companies' key assets from a constantly evolving threat landscape – making it imperative to stay on the pulse of cybersecurity. Explore this report to learn about current attacker behaviors, trends in vulnerability management, evolutions in malware, and beyond.
Posted: 20 Sep 2017 | Published: 31 Jul 2017

Cisco Systems, Inc.

A 5 Minute Guide to Security for Cognitive Search and Knowledge Management
sponsored by Attivio, Inc.
WHITE PAPER: Examine the resurgence of knowledge management, in conjunction with cognitive search and security, as a viable option for coordinating the vast amounts of information buried in big data environments.
Posted: 13 Sep 2017 | Published: 13 Sep 2017

Attivio, Inc.

The Essential Checklist: A Practical Guide to Efficient Security Response
sponsored by ServiceNow
WHITE PAPER: Find out how to detect and resolve data breaches faster by using a security operations checklist to identify which areas of your strategy could benefit most from updated methodologies like security automation.
Posted: 01 Sep 2017 | Published: 01 Sep 2017

ServiceNow

A Guide to Avoiding Financial Losses in Cybersecurity
sponsored by Kaspersky Lab
WHITE PAPER: 77% of U.S. businesses have suffered between 1 and 5 separate incidents of data loss, leakage or exposure in the past 12 months, according to Kaspersky Lab. This white paper reveals the financial woes across the threat landscape.
Posted: 31 Aug 2017 | Published: 31 Aug 2017

Kaspersky Lab

Cybersecurity — Whose Responsibility Is It?
sponsored by Armor
WHITE PAPER: Who is responsible for security in the enterprise? Learn how to determine roles and responsibilities, as well as policies and processes, to build a culture of security.
Posted: 30 Aug 2017 | Published: 31 Dec 2016

Armor

Security Analysis Principles and Techniques for IT Pros
sponsored by SearchSecurity.com
EBOOK: As a result of the recent developments affecting security analytics, uncover these tips for ensuring you get the most out of your security analytics tool.
Posted: 01 Dec 2017 | Published: 01 Dec 2017

SearchSecurity.com

Discover a Fully Managed Detection and Response System
sponsored by Rapid7
RESOURCE: Inside this resource, learn how to simplify the procurement of security tools and staff with a suite of managed detection and response services. Read on to find out how you can gain user behavior analytics, threat intelligence based on data from over 5,000 users, and more.
Posted: 27 Nov 2017 | Published: 27 Nov 2017

Rapid7

What does a CISO do now? It's a changing, increasingly vital role
sponsored by SearchSecurity.com
EBOOK: What does a CISO do now, with risks proliferating and the most-needed security skills in short supply? Learn why the CISO role is more vital than ever.
Posted: 11 Oct 2017 | Published: 11 Oct 2017

SearchSecurity.com

The Smart, Secure Cloud for India: Learn How Google Cloud Infrastructure Keeps Your Data Secure
sponsored by Google Cloud
WHITE PAPER: Google Cloud's Mumbai cloud region provides faster data transfers and reduced latency to the India region. Download the whitepaper for a look under the hood of Google's infrastructure security, and explicit detail on the process we go through to build and maintain GCP regions. Download the report and find out more now.
Posted: 25 Sep 2017 | Published: 25 Sep 2017

Google Cloud

The Role of Automation in Optimizing Network Performance and Security
sponsored by FireMon
WHITE PAPER: As networks become more complex, network visibility reduces making it harder to identify and contain threats. Access this resource to learn how to overcome the challenges with this network security complexity gap.
Posted: 11 Aug 2017 | Published: 11 Aug 2017

FireMon

Enterprise Defense at the Speed of Data
sponsored by ThreatConnect
WHITE PAPER: Discover 5 key factors for efficient security operations, including: using multi-sourced threat intelligence, using advanced analytics to operationalize security intelligence and more.
Posted: 10 Aug 2017 | Published: 10 Aug 2017

ThreatConnect
1 - 25 of 723 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement