IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Policies

RSS Feed   
ALSO CALLED: Device Security Policies, Information Security Policies, Remote Access Policies, Policy Management
DEFINITION: In business, a security policy is a document that states in writing how a company plans to protect the company's physical andinformation technology (IT) assets. A security policy is often considered to be a "living document", meaning that the document is never finished, but is continuously updated as technology and employee requirements change. A company's security policy may include an acceptable  … 

Security Policies definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Policies Reports
76 - 100 of 1535 Matches Previous Page  |  Next Page
Preventing Insider Threats with UEBA
sponsored by Exabeam
WHITE PAPER: Protecting against insider threats is a tough task for organizations, mainly because harm can be caused maliciously or unintentionally. Tracking user behavior is the key to success in mitigating insider threats, and by reading this white paper, you can learn about User and Entity Behavior Analytics (UEBA) a platform that may be up to the task.
Posted: 24 Nov 2020 | Published: 08 Sep 2020

Exabeam

How to Identify Threats Faster and Increase Productivity
sponsored by DomainTools
WEBCAST: With the rapid-fire speed of alerts and multitasking required in infosecurity, security operation center (SOC) professionals often must determine the potential outcomes of events with limited context. How can your teams reduce operational risk and be more productive? Watch this webinar to learn how to address this challenge and others.
Posted: 24 Nov 2020 | Premiered: Nov 24, 2020

DomainTools

Success Patterns for Supply Chain Security
sponsored by Panorays
WHITE PAPER: Threats targeting supply chains are on the rise, impacting businesses across all 3 elements of the confidentiality, integrity and availability (CIA) triad. The following SANS whitepaper further explores these challenges and highlights the key components of an effective supply chain security program – read on to get started.
Posted: 24 Nov 2020 | Published: 24 Nov 2020

Panorays

How to Build a Robust Cyber Threat Intelligence Program
sponsored by DomainTools
WEBCAST: Organizations looking to implement cyber threat intelligence (CTI) grapple with two challenges: lack of trained staff or lack of skills needed to fully utilize CTI, and lack of time to implement new processes. Watch this SANS webinar to see how to develop an effective CTI program despite these challenges.
Posted: 24 Nov 2020 | Premiered: Aug 18, 2020

DomainTools

Spotting a Denial-of-Service (DoS) Attack
sponsored by Farsight Security
RESOURCE: DoS attacks are an increasingly serious threat to today’s businesses, capable of rendering organizations virtually invisible online and cutting off interaction with customers. They can last for hours, days or even longer and cost organizations significant time, money and resources. View this infographic to see how to mitigate these attacks.
Posted: 24 Nov 2020 | Published: 24 Nov 2020

Farsight Security

NWN SecureX Online Workshop
sponsored by NWN Corporation
VIDEO: Today’s cybersecurity paradigm has completely changed – security programs are now in the spotlight of the board of directors and security teams are faced with mounting pressure on numerous fronts. Watch this webinar to learn more about today’s challenges and how NWN is helping organizations address them.
Posted: 24 Nov 2020 | Premiered: 24 Nov 2020

NWN Corporation

IDC Technology Spotlight: Threat Visibility and Management are Critical in Managed Security Services
sponsored by Comcast Business
RESOURCE: As cyberattackers become better, faster and more sophisticated, security teams are forced to upgrade their ability to detect and respond to intrusions. These professionals face a growing number of security alerts that may or may not reveal a true threat. Read this article to see how managed service providers may be able to help.
Posted: 24 Nov 2020 | Published: 05 Oct 2020

Comcast Business

3 Steps to Building Business-Centered Data Protection
sponsored by InteliSecure
EGUIDE: Even though research suggests that security focused on protecting the perimeter is obsolete, organizations continue to invest resources towards this effort. Modern threats require a shift in cybersecurity mindset – an approach focused on protecting the people. Read on to learn more about this approach and how to implement it.
Posted: 24 Nov 2020 | Published: 24 Nov 2020

InteliSecure

Cyber Resilience as a Competitive Advantage
sponsored by Comcast Business
RESOURCE: Now more than ever, customers are attuned to the impact of security threats to their own data. As a result, having strong cyber resilience may grant your organization an unexpected competitive advantage. Read this article to learn 6 cybersecurity best practices that will build your resilience in a way that can help you stand out from the crowd.
Posted: 24 Nov 2020 | Published: 08 Oct 2020

Comcast Business

Understanding the Shared Security Model for Cloud Data Protection
sponsored by InteliSecure
EGUIDE: The new normal has organizations continuing to enable a largely remote workforce – leading to mass cloud migrations. Contrary to a popular misconception about cloud, these migrations could actually strengthen your security posture. Read this InteliSecure guide to find out how.
Posted: 24 Nov 2020 | Published: 24 Nov 2020

InteliSecure

5 Ways a CISO Can Tackle the Cybersecurity Skills Shortage Now
sponsored by Claranet
WHITE PAPER: Every CISO knows that finding skilled security staff these days is not only hard but getting harder. In this white paper, uncover 5 practical steps you can take to help you tackle the cybersecurity skills shortage now.
Posted: 24 Nov 2020 | Published: 24 Nov 2020

Claranet

DDoS Response Guide
sponsored by Radware
WHITE PAPER: DDoS attacks can flood your network with malicious traffic, bringing applications down and preventing legitimate users from accessing your services. The good news, however, is that there is plenty to be done about it. In this white paper, explore 3 steps that will allow you to minimize the impact of a DDoS attack.
Posted: 24 Nov 2020 | Published: 24 Nov 2020

Radware

Compliance for Today’s Complex Audit
sponsored by Ivanti
EGUIDE: The stress and worry surrounding compliance audits are avoidable – so long as your organization adopts a people-centric, policy-automated approach to IT operations that’s inherently audit-ready. But how should you go about this? Read this following e-guide, Compliance for Today’s Complex Audit, which offers a blueprint for this approach.
Posted: 24 Nov 2020 | Published: 24 Nov 2020

Ivanti

Protect Against Evolving Data Security Threats
sponsored by Fasoo
EGUIDE: Today’s cyberthreats pose significant risk to an organization’s sensitive or confidential data. The following e-guide explores the most dangerous threat types and tactics facing organizations today and the steps you can take to protect your data – read on to unlock the full guide.
Posted: 24 Nov 2020 | Published: 23 Nov 2020

Fasoo

4 Data Privacy & Governance Risks Amid COVID-19
sponsored by Fasoo
EGUIDE: COVID-19 has caused several complications and challenges for security professionals – especially when it comes to data privacy and governance. Read this e-guide for an overview of the 4 most prominent data privacy risks in the era of COVID-19.
Posted: 24 Nov 2020 | Published: 20 Nov 2020

Fasoo

Minimizing Risk From Cyber-Threats: Focus On Reducing Time To Containment
sponsored by Claranet
WHITE PAPER: In order to minimize the growing risks from cyberthreats, CISOs and other security leaders are turning towards next-generation endpoint detection and response (EDR) tools – but how does the current iteration of EDR capabilities differ from the previous generation? Read on to find out.
Posted: 24 Nov 2020 | Published: 24 Nov 2020

Claranet

Access & Protect your Data – Anywhere, Anytime
sponsored by HelpSystems
DATA SHEET: In this brief, learn how Titus and Dataguise can help bring together the most comprehensive approach to data protection to enable you to intelligently detect and secure your most valuable and vulnerable data wherever it resides.
Posted: 24 Nov 2020 | Published: 24 Nov 2020

HelpSystems

Cybersecurity: The Human Challenge
sponsored by Sophos
ANALYST REPORT: If your organization is looking for a direction to turn regarding cybersecurity, then it may help to see what others have been prioritizing. View this Sophos report to learn perspectives from 5,000 IT managers across 26 countries. It will provide brand new insights into the state of cybersecurity skills and resources across the globe.
Posted: 23 Nov 2020 | Published: 30 Oct 2020

Sophos

Upgrade the Hunt with Splunk and DomainTools
sponsored by DomainTools
WEBCAST: Splunk has just released an update for its prominent app DomainTools that offers enhanced detection, monitoring and diagnostic capabilities as well as more customization, self-service capabilities and deeper contexts within enterprise security. Watch this webcast to learn how you may be able to take your threat hunt to the next level.
Posted: 23 Nov 2020 | Premiered: Nov 23, 2020

DomainTools

How Financial Services Can Achieve and Manage Continuous Security and Compliance in a Public Cloud
sponsored by IBM
WHITE PAPER: The financial services industry is perhaps the most highly regulated in the world. In the U.S., banks must comply with at least 10 major regulations at the federal level alone. So how, then, are financial services firms to migrate to the cloud in a secure and compliant manner? Read this IBM white paper to see some suggestions.
Posted: 23 Nov 2020 | Published: 23 Nov 2020

IBM

Managed Detection and Response (MDR) Services Buyers Guide
sponsored by Sophos
EGUIDE: Managed detection and response (MDR) tools are growing in popularity among security leaders as workloads grow in volume. The following buyers guide highlights the potential benefits and required capabilities of an ideal MDR tool and evaluates current offerings against these features – read on to get started.
Posted: 23 Nov 2020 | Published: 23 Nov 2020

Sophos

Case Study: Protecting Trusted Insiders
sponsored by Dtex
CASE STUDY: Recently, a slew of invoice-themed malicious phishing emails were found to have penetrated a customer’s network at a large energy company. What was worse? They had very limited visibility into the attack. Read this case study to learn how this organization was able to identify, understand and mitigate future targeted phishing attacks.
Posted: 23 Nov 2020 | Published: 23 Nov 2020

Dtex

IT Risk Management: Comparing Top Vendors & Offerings
sponsored by ServiceNow
RESEARCH CONTENT: Gartner predicts that by 2025, 50% of global midmarket and large enterprises will depend on risk management tools to address risks in their organizations. This Magic Quadrant report highlights and evaluates the most prominent risk management vendors and offerings in today’s market – read on to unlock the full report.
Posted: 23 Nov 2020 | Published: 11 Aug 2020

ServiceNow

Finding the Disconnect: Security Perceptions and Behaviors of Today’s Enterprise Employees
sponsored by Dtex
EBOOK: As the modern enterprise acknowledges cyber risks as critical business risks, the nature of enterprise security discussions is quickly moving from the technical and operational to the strategic. This has created a new reality in which security decisions can turn a user into a trusted ally... or a liability. Read this guide to learn more.
Posted: 23 Nov 2020 | Published: 23 Nov 2020

Dtex

To Pay Or Not To Pay: It’s About The Provider
sponsored by Radware
RESOURCE: Should a ransomware attack strike, would your organization pay the ransom fee or not? How do you calculate if it’s worth it to pay the fee or not? This Radware article breaks down the most critical factors that go into answering these questions – read on to see if you should pay.
Posted: 23 Nov 2020 | Published: 29 Oct 2020

Radware
76 - 100 of 1535 Matches Previous Page    2 3 4 5 6 7    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info