IT Agents  >   IT Workforce  >   Information Technology Professionals  >   IT Managers  >  

Security Managers

RSS Feed   
Security Managers Reports
51 - 75 of 634 Matches Previous Page  |  Next Page
Addressing Complexity and Expertise in Application Security Testing
sponsored by WhiteHat Security
RESEARCH CONTENT: The Verizon’s 2020 DBIR indicated that 43% of data breaches begin by targeting a web application. This discovery has begun to shift the cybersecurity paradigm from focusing on on-premise infrastructures to protecting their web apps with application security testing (AST). Read this 451 Research brief to learn more about AST.
Posted: 23 Nov 2020 | Published: 23 Nov 2020

WhiteHat Security

Reduce API Security
sponsored by WhiteHat Security
WEBCAST: Digital businesses have widespread API usage, making it easier for organizations to share data and integrate with customer applications. However, APIs have increasingly become a target for attackers, leading to many serious data breaches in recent history. How do we reduce API security risks? View this webcast to learn why testing may be the key.
Posted: 20 Nov 2020 | Premiered: Jul 15, 2020

WhiteHat Security

A Security Engineer’s Nightmare
sponsored by Cribl.io
WHITE PAPER: For security pros, preventing breaches and ensuring data privacy is hectic enough – having an incompetent system on top of these challenges can introduce new levels of stress. Read this white paper to learn how Cribl is helping security engineers log information and incidents so they can focus their efforts on more important tasks.
Posted: 19 Nov 2020 | Published: 19 Nov 2020

Cribl.io

How a Top Financial Firm Scaled Their Application Security Program & Accelerated Their Digital Transformation
sponsored by WhiteHat Security
CASE STUDY: A top 10 U.S. bank was faced with the challenges of scaling application security automation, regulatory compliance and triaging false positives from an automated scanner. And after factoring in time and budget constraints, it’s clear that this was a tall mountain to climb. Read this case study to see how they reached the top.
Posted: 19 Nov 2020 | Published: 19 Nov 2020

WhiteHat Security

2020 Election Security
sponsored by WhiteHat Security
WHITE PAPER: Around the globe, we’ve witnessed how cybercriminals can create chaos during election cycles by disqualifying legitimate voters, corrupting voter data and launching denial-of-service attacks. In recent years, U.S. elections have come under continuous assault. See this white paper to learn about the security challenges this causes for the country.
Posted: 17 Nov 2020 | Published: 17 Nov 2020

WhiteHat Security

DevSecOps Framework
sponsored by WhiteHat Security
WEBCAST: Organizational infrastructure is becoming more and more vulnerable, and as a result, development teams are searching for ways to securely develop, build and deploy business-driving applications. So, what can these teams do to get started? They can begin by watching this webcast to learn the keys to a successful DevSecOps implementation.
Posted: 16 Nov 2020 | Premiered: Nov 16, 2020

WhiteHat Security

Intelligent Privacy Automation: The Future Of Data Privacy
sponsored by ServiceNow
WHITE PAPER: Growing privacy concerns and emerging data privacy laws require organizations to not only know the location and usage of all personal data, but operationalize their privacy policies and accommodate a timely response to data access requests. But how can you ensure you’re always in compliance? Read this white paper to get the answer.
Posted: 12 Nov 2020 | Published: 12 Nov 2020

ServiceNow

Business Continuity Management Continuity Planning, Disaster Recovery, Crisis Response
sponsored by ServiceNow
PRODUCT OVERVIEW: Business continuity management (BCM) tools are an effective way for organizations to ensure crisis preparation and disaster recover plans are in place prior to an unforeseen disruption. This solution brief highlights the key features and capabilities of ServiceNow’s BCM tool – read on for more information.
Posted: 12 Nov 2020 | Published: 12 Nov 2020

ServiceNow

Covid-19 Lessons Learned—Business Continuity Management
sponsored by ServiceNow
WHITE PAPER: Regardless of whether an organization had a business continuity management (BCM) program in place prior to COVID-19, 2020 has been a learning experience for the shortcomings of most BCM programs. This white paper highlights common oversights and lessons learned regarding BCM in the era of COVID-19 – read on to get started.
Posted: 11 Nov 2020 | Published: 11 Nov 2020

ServiceNow

Computer Weekly - 7 April 2020: Adapting IT to the new normal
sponsored by ComputerWeekly.com
EGUIDE: In this week's Computer Weekly, we talk to four top IT leaders to find out how they are supporting their organisations through the coronavirus crisis. We look at the security best practices recommended by experts to ensure safe remote working for staff. And the CISO of Equifax explains why the firm is moving to public cloud. Read the issue now.
Posted: 23 Oct 2020 | Published: 23 Oct 2020

ComputerWeekly.com

Prevent Fraud And Phishing Attacks With DMARC
sponsored by Mimecast
PRODUCT OVERVIEW: The FBI estimates that between 2013 and 2018, cybercriminals stole more than $12 billion using business email compromise (BEC) attacks. To prevent BEC and phishing, organisations are turning to email authentication tools. Read this Forrester report, which analyzes the features and capabilities of the DMARC standard.
Posted: 21 Oct 2020 | Published: 31 Mar 2020

Mimecast

The New Reality
sponsored by BlackBerry
WHITE PAPER: Although issues related to protecting and managing endpoints existed long before COVID-19, the recent pandemic put a spotlight on these issues. In order to address these challenges, organizations are opting for unified endpoint security solutions – read on for an in-depth look at what that entails and why it’s gaining popularity.
Posted: 13 Oct 2020 | Published: 13 Oct 2020

BlackBerry

CYBERSECURITY BUILT FOR YOUR BUSINESS, BUDGET AND STAFF
sponsored by Panda Security
EBOOK: In the US, 42% of employees are working from home full-time. As a result, managing distributed workforces has become a priority for organizational leaders. Remote deployment and lack of centralization have both created security and compliance risks. To regain control, view this e-book about the top organizational challenges and their solutions.
Posted: 13 Oct 2020 | Published: 13 Oct 2020

Panda Security

KuppingerCole Market Compass IT-GRC Tools
sponsored by ServiceNow
WHITE PAPER: IT GRC tools are emerging as one of the most effective ways for organizations to create, organize and manage GRC policies. This KuppingerCole Market Compass report covers the top IT GRC vendors and tools that can assist organizations in reducing the risk of non-compliance – read on to unlock the full report.
Posted: 12 Oct 2020 | Published: 21 Jul 2020

ServiceNow

Enterprise Risk Management (ERM) and Governance, Risk and Compliance (GRC) Digital tools for oversight in the enterprise
sponsored by ServiceNow
WHITE PAPER: In this report, discover the results of Constellation Research’s initiative into determining the most effective digital tools for oversight in the enterprise and observe a shortlist of 12 unique enterprise risk management (ERM) and governance, risk and compliance (GRC) offerings you should be aware of.
Posted: 09 Oct 2020 | Published: 09 Oct 2020

ServiceNow

Gartner Magic Quadrant for IT Risk Management
sponsored by ServiceNow
RESOURCE: IT risk management (ITRM) has emerged as a key pillar in assessing risk, bolstering security and addressing compliance needs. Read this Gartner Magic Quadrant Report for an in-depth comparison of the capabilities of top ITRM vendors and offerings in today’s market.
Posted: 09 Oct 2020 | Published: 11 Aug 2020

ServiceNow

Future-Proofing Enterprise Security Awareness in the Age of Workforce Mobility
sponsored by Barracuda
WHITE PAPER: With enterprises gearing towards a more mobile workforce, security awareness is now more important than ever – and the trends behind it are crucial for IT professionals. To get a sense of the readiness of organizations in employee awareness and training, read this Forrester report to explore these trends, as well as priorities, in this space.
Posted: 09 Oct 2020 | Published: 30 Sep 2020

Barracuda

Developing a more effective risk report for your board
sponsored by ServiceNow
WHITE PAPER: Today’s risk climate necessitates that everyone within the organization, regardless of job function, is invested in security and protection of their organization. However, organization-wide buy-in starts with getting the board involved. Download this white paper to learn how to convey the seriousness of cyber risk to your board.
Posted: 07 Oct 2020 | Published: 07 Oct 2020

ServiceNow

Gartner Magic Quadrant for IT Vendor Risk Management Tools (ITVRM)
sponsored by ServiceNow
RESOURCE: IT vendor risk management (IT VRM) software provides solutions to manage and automate the vendor risk management life cycle, address third-party risk and meet regulatory compliance. This Gartner Magic Quadrant Report provides an overview of the IT VRM market and a comprehensive evaluation of the top offerings – read on to get started.
Posted: 07 Oct 2020 | Published: 24 Aug 2020

ServiceNow

All together now
sponsored by ServiceNow
WHITE PAPER: 2020 has been a disastrous and disruptive year for organizations and their security programs. Upticks in cyberattacks – like malware – have led to significant and costly breaches. Read this white paper to learn more about the effects of 2020 and how IT and security teams can collaborate to drive operational resilience against today’s threats.
Posted: 07 Oct 2020 | Published: 07 Oct 2020

ServiceNow

Top COVID-19 Phishing Scams
sponsored by Inky Technology
RESOURCE: Phishing scammers have taken advantage of the frequent updates regarding COVID-19 information to use it as an entry point for their campaigns. This article, Top COVID-19 Phishing Scams, looks at the emerging threat types and what to look for to identify an attack – read on to get started.
Posted: 06 Oct 2020 | Published: 06 Oct 2020

Inky Technology

Invisible Characters
sponsored by Inky Technology
WHITE PAPER: Similar to hidden text and zero font, invisible characters is a phishing tactic designed to obscure text in order to bypass secure email gateways (SEGs). Read this edition of Understanding Phishing for a full breakdown of invisible text – including real-world examples and best practices for stopping it.
Posted: 06 Oct 2020 | Published: 06 Oct 2020

Inky Technology

Enduring from home
sponsored by Malwarebytes
ANALYST REPORT: 2020 is a test of business continuity. Now-remote workers are connecting to potentially unsecured home networks while accessing company resources from personal devices, and their unique cybersecurity needs must be considered. Read this report to learn perspectives on IT leaders on the sudden shift to remote work and its impact on security.
Posted: 30 Sep 2020 | Published: 30 Sep 2020

Malwarebytes

Understanding Phishing: Text Direction Deception!
sponsored by Inky Technology
WHITE PAPER: Phishing scams continue to evolve, and attackers apply an ever-growing bag of tricks to fool recipients as well as email protection tools. In this edition of Understanding Phishing, the cybersecurity experts at INKY dissect a recently uncovered tactic which uses Cascading Style Sheets (CSS) to bypass security protocols by mixing scripts.
Posted: 30 Sep 2020 | Published: 30 Sep 2020

Inky Technology

5 IAM Trends Shaping the Future of Security
sponsored by Beta Systems
EGUIDE: Modern identity and access management (IAM) tools, capabilities and offerings are a direct result from years of cyberthreats targeting credentials, privileged accounts and passwords. Read this e-guide to discover 5 IAM trends that are shaping the future of the cybersecurity market.
Posted: 02 Nov 2020 | Published: 28 Oct 2020

Beta Systems
51 - 75 of 634 Matches Previous Page    1 2 3 4 5 6    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2022, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences