IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Policies

RSS Feed   
ALSO CALLED: Device Security Policies, Information Security Policies, Remote Access Policies, Policy Management
DEFINITION: In business, a security policy is a document that states in writing how a company plans to protect the company's physical andinformation technology (IT) assets. A security policy is often considered to be a "living document", meaning that the document is never finished, but is continuously updated as technology and employee requirements change. A company's security policy may include an acceptable  … 

Security Policies definition sponsored by, powered by an online computer dictionary
Security Policies Reports
1 - 25 of 1075 Matches Previous Page  |  Next Page
GDPR: What it Means and How to Get Compliant
sponsored by SAS
RESOURCE: GDPR will require an ongoing, organization-wide focus to ensure you protect your customers' personal data. Work through this 5-step checklist that can help you stay GDPR-compliant.
Posted: 19 Mar 2018 | Published: 31 Dec 2017


The General Data Protection Regulation (GDPR) is Here
sponsored by BackOffice Associates
WEBCAST: In this webcast hear from Enza Iannopollo, Security & Risk analyst at Forrester Research, as she demonstrates how to get started on building a risk management policy that will best suit the needs of your company.
Posted: 16 Mar 2018 | Premiered: Mar 16, 2018

BackOffice Associates

The Second Annual Study on the Cyber Resilient Organization
sponsored by IBM Resilient
RESEARCH CONTENT: In this Ponemon Institute report, take a look at organizations that believe they have achieved a very high level of cyber resilience and compare them to organizations that believe they have achieved only an average level of cyber resilience.
Posted: 09 Mar 2018 | Published: 31 Jan 2017

IBM Resilient

CW ASEAN - March 2018: Time to dial up defences
sponsored by
EZINE: In this month's issue of CW ASEAN, we take a closer look at ASEAN's patchy cyber security landscape, including varying levels of cyber resilience across the region, cyber security strategies adopted by different countries, as well as efforts to improve cyber capabilities and foster greater collaboration in the common fight against cyber threats.
Posted: 08 Mar 2018 | Published: 08 Mar 2018

CW ANZ - March 2018: Report data break-ins - it's the law
sponsored by
EZINE: Cyber security is an increasingly global endeavour with threat actors who know no boundaries unleashing attacks from nearly anywhere in the world. In this month's issue of CW ANZ, we look at how Australia's mandatory data breach notification law underscores recent efforts to lift its cyber security game.
Posted: 08 Mar 2018 | Published: 08 Mar 2018

Create Trusted IoT, Become the King of Sweden?
sponsored by Radware
RESOURCE: Click inside to learn about the opportunities providers have to secure vulnerabilities in IoT devices that may have been overlooked by manufacturers.
Posted: 08 Mar 2018 | Published: 25 Jan 2018


Is My Smart Home Telling People What I Do Every Day?
sponsored by Radware
RESOURCE: Click inside to learn about the current state of smart home security, as well as some steps providers should take in the near future to protect their customers.
Posted: 07 Mar 2018 | Published: 13 Feb 2018


Orchestrating SDN Flows for Cybersecurity
sponsored by Radware
RESOURCE: Click inside to learn how the orchestration capabilities of SDN could be use to fight, and even prevent DDos attacks in the future.
Posted: 07 Mar 2018 | Published: 24 Jan 2018


The Five Essential Capabilities Of An Analytics-Driven SOC
sponsored by Splunk
WHITE PAPER: This white paper outlines how you can gain visibility into potential vulnerabilities by adopting an analytics-driven SOC. Read on to find 5 capabilities that are "must-haves" in this type of system.
Posted: 02 Mar 2018 | Published: 02 Mar 2018


The Enterprise Cybersecurity and Compliance Challenge
sponsored by Mimecast
RESOURCE: Click inside to learn the 3 trends Australian IT leaders have identified as the most critical to cybersecurity, as well as what new security measures organizations are considering.
Posted: 01 Mar 2018 | Published: 31 Oct 2017


Identifying and Protecting Critical Value Data
sponsored by Nuix
WHITE PAPER: Find out how you can improve your protection of sensitive data and prevent data losses by learning how to identify what your critical value data is, where it exists, and who can access it.
Posted: 27 Feb 2018 | Published: 31 Dec 2015


CW Nordics ezine February 2018
sponsored by
EZINE: In the first CW Nordics ezine of 2018, we take a look at some of the priorities of the region’s CIOs.
Posted: 19 Feb 2018 | Published: 22 Feb 2018

Crafting a Cybersecurity Incident Response Plan, Step by Step
sponsored by
EBOOK: Is your cybersecurity incident response plan the best it can be? Inside this expert handbook, Johna Till Johnson, Rob Shapland and Mike Villegas uncover step by step instructions to crafting an effective incident response plan and cloud incident response plan for your organization.
Posted: 13 Feb 2018 | Published: 13 Feb 2018

Achieve Effective PCI Compliance by Automating Required Controls and Processes
sponsored by Skybox Security
WHITE PAPER: Find out how to improve PCI DSS compliance by incorporating a platform into your network and information security workflows that provides a holistic understanding of your attack surface.
Posted: 08 Feb 2018 | Published: 31 Dec 2016

Skybox Security

What is Attribute-Based Access Control?
sponsored by Axiomatics
WHITE PAPER: Learn about the evolution of traditional role-based access control and how the shift towards attribute-based access control is impacting cybersecurity.
Posted: 08 Feb 2018 | Published: 31 Dec 2016


Bell Helicopter Enables Attribute-Based Access Control and Authorization
sponsored by Axiomatics
CASE STUDY: In this case study, find out how Bell Helicopter used a scalable attribute-based access control (ABAC) platform to prevent unauthorized access and handle their sensitive and regulated data throughout the enterprise.
Posted: 07 Feb 2018 | Published: 31 Dec 2015


CW Benelux February 2018
sponsored by
EZINE: In this issue, read about how and why one public sector IT professional in the Netherlands, Victor Gevers, took a whole year out to hack ethically and, in the process, unearthed about 1,000 vulnerabilities.
Posted: 01 Feb 2018 | Published: 01 Feb 2018

Deploying and Managing Security in the Cloud
sponsored by Forcepoint
RESEARCH CONTENT: As more organizations continue to store sensitive data in the cloud, traditional perimeter based security approaches are no longer viable. But what should replace them? Read this Osterman Research white paper to find out what new security issues the cloud creates, some best practices for protecting sensitive data, and more.
Posted: 31 Jan 2018 | Published: 31 May 2017


Rethinking Data Security
sponsored by Forcepoint
WHITE PAPER: Read this white paper to find out what new security concerns are driving the need for risk adaptive protection. Then learn about a data protection method that focuses on people for visibility into the data they create and the applications they use.
Posted: 29 Jan 2018 | Published: 29 Jan 2018


Computer Weekly – 30 January 2018: Davos debates global tech risks
sponsored by
EBOOK: In this week's Computer Weekly, world leaders at Davos discussed the growing reliance on technology and how to tackle the political and economic threats of the digital age. Our latest buyer's guide examines mobile app development. And we look at the biggest challenges facing CIOs in 2018. Read the issue now.
Posted: 26 Jan 2018 | Published: 25 Jan 2018

Software as a SIEM: Improve Your Security Posture by Using Splunk as your SIEM
sponsored by Splunk
WHITE PAPER: Businesses now require tools that can be used for rapid response detection, incident investigation and coordination of CSIRT breach scenarios. A tool, like Splunk software. Read this white paper and explore what this innovative SIEM has to offer.
Posted: 23 Jan 2018 | Published: 23 Jan 2018


Four CISO Tribes and Where to Find Them
sponsored by Synopsys
WHITE PAPER: In this research content, gathered based on interviews with 25 CISOs, discover 4 distinct approaches to the role of CISO. Learn what makes each one distinct, how you can use this information to push your own career forward, and more.
Posted: 18 Jan 2018 | Published: 29 Dec 2017


Your Chance to Get It Right: Five Keys to Building AppSec into DevOps
sponsored by Veracode, Inc.
WHITE PAPER: Watch this webcast to learn how to get app security pros involved in the collaborative DevOps culture by helping developers speak their language. You'll find 5 steps your company can take to achieving secure DevOps inside.
Posted: 17 Jan 2018 | Published: 17 Jan 2018

Veracode, Inc.

The Building Security in Maturity Model Examined
sponsored by Synopsys
RESEARCH CONTENT: In this white paper, you'll find the Building Security in Maturity Model (BSIMM) which compiles the information given by 109 security professionals. Read on to learn the important roles found in a successful security initiative, as well as how you contemporaries are managing their compliance policies, testing protocols, analytics, and more.
Posted: 12 Jan 2018 | Published: 12 Jan 2018


How to Create a Scalable Threat Model
sponsored by Synopsys
WHITE PAPER: Find out how to make threat modeling more efficient and cost-effective with an automated, scalable, template-based approach.
Posted: 12 Jan 2018 | Published: 21 Sep 2017

1 - 25 of 1075 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement