Standards  >  

Security Standards

RSS Feed   
ALSO CALLED: P3P, Security Protocols, Information Security Standards
DEFINITION: P3P (Platform for Privacy Preferences) is a protocol that specifies a way to determine if a Web site's security policies meet a user's privacy requirements. P3P includes a machine-readable vocabulary and syntax that can be used to describe Web site security policies and consumers' self-identified privacy preferences. When a user requests a Web page, that Web site's P3P policy files are sent to the  … 

Security Standards definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Standards Reports
1 - 25 of 711 Matches Previous Page  |  Next Page
SolarWinds and the Supply Chain, the Threat We’ve Ignored for Too Long
sponsored by Interos
WEBCAST: The SolarWinds attacks caught the entire country off its guard. What can security teams learn from them? Access this webcast to hear from Robert Brese, a VP and Executive Partner at Gartner, as he joins cybersecurity leaders to discuss fundamental changes that must be implemented to address the SolarWinds nation-state supply chain attacks.
Posted: 23 Feb 2021 | Premiered: Dec 22, 2020

Interos

The Golden Tax Department and Emergence of GoldenSpy Malware
sponsored by Trustwave
ANALYST REPORT: To defend your organization against the GoldenSpy threat, download this Trustwave report. Inside, you’ll find details on the attack methodology, suspected entities behind the activity, and protective measures to mitigate risk of being impacted.
Posted: 23 Feb 2021 | Published: 31 Dec 2020

Trustwave

The Threat Hunt That Uncovered Novel Malware
sponsored by Trustwave
CASE STUDY: What do you do when a required software program comes inadvertently bundled with sophisticated malware? Read the full case study here for a breakdown of how one technology vendor identified and remediated the hidden threat with help from the Trustwave SpiderLabs team.
Posted: 23 Feb 2021 | Published: 23 Feb 2021

Trustwave

Cloud Security: A Buyer's Guide
sponsored by Forcepoint
BROCHURE: The cloud security market boasts an overwhelming array of features, vendors and offerings. To help break up the noise, this Cloud Security: Buyer's Guide offers 15 points to keep top-of-mind while evaluating solutions and determining the best fit for your organization – read on to get started.
Posted: 22 Feb 2021 | Published: 06 Nov 2020

Forcepoint

Security Think Tank Pt.1 - 2020 bought us universal remote working. So what next?...
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide: Each month Computer Weekly poses a question to its Security Think Tank, a panel of cyber security experts comprising industry insiders, technologists, analysts, legal experts and educators, to share their years of collective cyber security wisdom with the security community.
Posted: 19 Feb 2021 | Published: 19 Feb 2021

ComputerWeekly.com

Managing Cybersecurity Risk in the Supply Chain
sponsored by Clearswift
EGUIDE: Supply chains have become a prime target for cybercriminals – which is illustrated by the rise in third-party vulnerabilities and breaches across 2020. Read this e-guide to discover the emerging supply chain threats, their implications for each industry, and 5 ways organizations can better protect themselves.
Posted: 18 Feb 2021 | Published: 18 Feb 2021

Clearswift

API Security & the OWASP API Top 10
sponsored by Traceable
VIDEO: The OWASP API Top 10 project set out with a clear goal – to identify and provide insight into the most detrimental API vulnerabilities that exist across today’s organizations. Watch this episode of The API Security & the OWASP API Top 10 webinar series for a deep dive into 4 of the 10 critical API threats.
Posted: 17 Feb 2021 | Premiered: 03 Jan 2021

Traceable

Tips And Tricks On Safeguarding Your Data In The Cloud
sponsored by Atlassian
VIDEO: This webinar, Tips And Tricks On Safeguarding Your Data In The Cloud, highlights the top cyberthreats, compliance challenges, and industry best practices as they related to protecting your cloud-native data – watch now to get started.
Posted: 17 Feb 2021 | Premiered: 17 Feb 2021

Atlassian

How to address Phishing, Business Email Compromise, Account Takeovers & More
sponsored by Trustwave
RESEARCH CONTENT: The traditional notion of a perimeter is almost non-existent. Instead, today’s cybercriminals are targeting organizations where the people, and data, exist. Read this Osterman Research paper to discover today’s most demanding cyberthreats and the best practices required to defend against them.
Posted: 17 Feb 2021 | Published: 31 Aug 2019

Trustwave

Trend Micro Cloud One for Workload Security
sponsored by Trend Micro
DATA SHEET: Optimizing and securing workloads has become a more complex task as server workloads move towards cloud environments, virtual servers and even containers. Read this data sheet to see how Trend Micro’s Cloud One can help organizations meet these 4 key business imperatives and ensure security for physical, virtual, cloud and container workloads.
Posted: 17 Feb 2021 | Published: 17 Feb 2021

Trend Micro

Trend Micro Cloud One: Application Security
sponsored by Trend Micro
DATA SHEET: As reliance on business applications grows, it becomes increasingly critical to ensure each app and API is adequately protected and accounted for. Read this data sheet to see how Trend Micro’s Cloud One offering thwarts today’s application-specific cyberthreats.
Posted: 17 Feb 2021 | Published: 17 Feb 2021

Trend Micro

Security White Paper: Data Security is Serious Business.
sponsored by Alchemer
WHITE PAPER: The digital landscape is constantly evolving – which necessitates changes and improvements to security tactics and controls. This white paper highlights the key tenets and capabilities of Alchemer’s information security program – read on to enhance your understanding.
Posted: 17 Feb 2021 | Published: 17 Feb 2021

Alchemer

Enhanced Security Solutions for Remote Teams
sponsored by Dropbox
RESOURCE: Today’s remote workforce relies on collaboration software more than ever before, so providing teams with secure, scalable and effective communication methods is a top priority for organizations. Read this resource to learn about Dropbox’s initiative to provide comprehensive collaboration capabilities to everyone, everywhere.
Posted: 17 Feb 2021 | Published: 17 Feb 2021

Dropbox

Integrated Cybersecurity Model for Your Work-From-Anywhere Environment
sponsored by NWN Corporation
WHITE PAPER: Cybercrime was lucrative across 2020 – the pandemic exposed several security gaps that hackers were eager to exploit. This white paper highlights how the Integrated Cybersecurity Model can help protect remote workforces from today’s evolving cyberthreats – read on to learn more.
Posted: 17 Feb 2021 | Published: 17 Feb 2021

NWN Corporation

Top 5 Considerations for Deciding Whether to Outsource or Create Incident Response
sponsored by Fortinet, Inc.
RESOURCE: Incident response (IR) is a strategic imperative, but some organizations may not have the resources to build an in-house IR team. This checklist provides 5 considerations to keep in mind when deciding between outsourcing and building an in-house IR program – read on to get started.
Posted: 16 Feb 2021 | Published: 16 Feb 2021

Fortinet, Inc.

2020 Enterprise Cloud Incident Response Survey
sponsored by Infoblox
RESEARCH CONTENT: In this year’s SANS Enterprise Cloud Incident Response (IR) Survey, discover the key challenges that today’s IT and security leaders are facing as it relates to addressing cloud-related threats – which range from external risks like data theft to internal dangers like staffing shortages. Download the report now to get started.
Posted: 16 Feb 2021 | Published: 30 Sep 2020

Infoblox

Eighth Annual Fraud Report
sponsored by IDology
RESEARCH CONTENT: Like changes in the market, cyberthreats evolve and change each year – especially with threats like fraud. This research report from IDology highlights how fraud evolved in 2020 and provides key insight into how events like COVID impacted fraud. Read on to unlock the full report.
Posted: 16 Feb 2021 | Published: 16 Feb 2021

IDology

Randori Recon How To Prioritize Like An Attacker
sponsored by Randori
EBOOK: With the rise of cloud computing, containerization, and serverless computing, maintaining a perfect inventory of your external assets and ensuring they are patched has become an overwhelming challenge. Read this e-book to discover Randori’s best practices for analyzing your attack surface in the most effective way.
Posted: 16 Feb 2021 | Published: 16 Feb 2021

Randori

The Complete Guide to Evaluating Attack Surface Management
sponsored by Randori
RESEARCH CONTENT: Attack surface management (ASM) is an emerging category of solutions which aims to help organizations understand and address risks related to the stark rise in remote devices connected to the internet – read this SANS report to learn more about the ASM market.
Posted: 16 Feb 2021 | Published: 31 Oct 2020

Randori

The Radicati Group, Inc. Endpoint Security - Market Quadrant 2020
sponsored by Bitdefender
RESEARCH CONTENT: Endpoint security has become a top priority in 2020 – but threats are always evolving, so it’s critical to ensure endpoints are protected with the best-in-class defenses. Read this research report from The Radicati Group for an overview of the key trends, risks and top offerings as they relate to the endpoint security market.
Posted: 16 Feb 2021 | Published: 30 Nov 2020

Bitdefender

Data Sheet Trustwave Proactive Threat Hunting
sponsored by Trustwave
DATA SHEET: Blocking an attacker at the perimeter may not always work – today’s threats continue to bypass preventative security controls. This data sheet highlights how Trustwave Proactive Threat Hunting helps fortify defenses by identifying hidden attackers in your environment and open threat vectors that can lead to a breach – read on to learn more.
Posted: 16 Feb 2021 | Published: 16 Feb 2021

Trustwave

How To Choose an Effective Managed Detection and Response (MDR) Provider
sponsored by Alert Logic
EGUIDE: For organizations interested in enhancing their ability enhance visibility and more effectively identify and mitigate threats, this buyer’s guide provides a comprehensive overview of the managed detection and response (MDR) market, highlighting key vendors and offerings. Read on to get started.
Posted: 16 Feb 2021 | Published: 16 Feb 2021

Alert Logic

Key Steps in Defining a Shared Responsibility Model for Public Cloud Services
sponsored by Alert Logic
WHITE PAPER: As public cloud has become more widely adopted, cybercriminals have altered their tactics to exploit cloud environments. Read this e-guide to discover how (and why) to implement the Shared Responsibility Model for public cloud services.
Posted: 16 Feb 2021 | Published: 16 Feb 2021

Alert Logic

Ensure Visibility & Compliance in AWS with CloudGuard Posture Management
sponsored by AWS Checkpoint
DATA SHEET: Organizations who have fully embraced cloud capabilities are likely aware of the difficulties in managing a large cloud sprawl. This datasheet highlights how Check Point’s CloudGuard Posture Management tool can help you ensure visibility and compliance in AWS environments – read on to learn more
Posted: 16 Feb 2021 | Published: 16 Feb 2021

AWS Checkpoint

Market Guide for Managed Detection and Response Services
sponsored by eSentire
ANALYST REPORT: Organizations are turning to managed detection and response (MDR) services for turnkey threat detection and response via modern, remotely delivered 24/7 security operations center capabilities and technology. Use this Gartner research report to determine whether MDR is a good fit with your operational security requirements.
Posted: 16 Feb 2021 | Published: 26 Aug 2020

eSentire
1 - 25 of 711 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info