Standards  >  

Security Standards

RSS Feed   
ALSO CALLED: P3P, Security Protocols, Information Security Standards
DEFINITION: P3P (Platform for Privacy Preferences) is a protocol that specifies a way to determine if a Web site's security policies meet a user's privacy requirements. P3P includes a machine-readable vocabulary and syntax that can be used to describe Web site security policies and consumers' self-identified privacy preferences. When a user requests a Web page, that Web site's P3P policy files are sent to the  … 

Security Standards definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Standards Reports
1 - 25 of 249 Matches Previous Page  |  Next Page
How to Capitalize on the Multi-billion Dollar Market for Managed Security Services
sponsored by IBM
WEBCAST: Tune into this webcast to discover the advantages of partnering with IBM Security to capitalize on the managed security services market opportunities and multi-billion dollar revenue therein.
Posted: 13 Jun 2019 | Premiered: Jun 13, 2019

IBM

MSSP Buyer's Guide: Grow Your Managed SOC Business with IBM Security
sponsored by IBM
PRODUCT OVERVIEW: This eBook outlines the benefits of IBM Security's MSSP Partner Program and explains how their threat detection and response solutions can help you capitalize on this unique market opportunity. Download now to learn how this program can help you scale your growth and increase your revenue potential.
Posted: 07 Jun 2019 | Published: 28 Feb 2019

IBM

2019 Cyberthreat Defense Report
sponsored by Gigamon
ANALYST REPORT: In this 2019 Cyberthreat Defense Report, learn about the latest trends for the frequency & impact of cyberattacks, the adequacy of organizational security postures, the greatest barriers to establishing strong defenses, and more.
Posted: 04 Jun 2019 | Published: 04 Jun 2019

Gigamon

Proactive Security: Software vulnerability management and beyond
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide we discover why modern security professionals are moving to a more pro-active approach to cyber defence, and how managing vulnerabilities is a key element of that.
Posted: 24 May 2019 | Published: 17 May 2019

ComputerWeekly.com

Open Source Network Security Tools for Beginners
sponsored by AT&T Cybersecurity
RESOURCE: In this white paper, get an overview of some of the leading open source tools as well as tips on how to use them for network security.
Posted: 10 May 2019 | Published: 10 May 2019

AT&T Cybersecurity

Proper Backup: The Last Line of Defense Against Ransomware and Cybercrime
sponsored by Unitrends
WHITE PAPER: This paper examines how different backup approaches cope, or fail to cope, with recovering from ransomware. Download it now to examine them for yourself and to ensure your customers' data is fully protected.
Posted: 01 May 2019 | Published: 01 May 2019

Unitrends

Barracuda Cloud Security Guardian
sponsored by Barracuda
PRODUCT OVERVIEW: Barracuda's Cloud Security Guardian automatically optimizes and remediates security controls to ensure continuous compliance for workloads and apps hosted in the public cloud. To learn how your enterprise can benefit from automated cloud security measures, access it here.
Posted: 24 Apr 2019 | Published: 24 Apr 2019

Barracuda

Infographic: 2019 Europe IT Priorities - Security
sponsored by ComputerWeekly.com
EGUIDE: In this infographic, we take a look at which elements of IT security are being improved by enterprises across Europe. Survey results taken from the 2019 IT Priorities survey carried out by ComputerWeekly.com, ComputerWeekly.de and LeMagIT.fr.
Posted: 23 Apr 2019 | Published: 23 Apr 2019

ComputerWeekly.com

How long does it take to get owned?
sponsored by ComputerWeekly.com
RESEARCH CONTENT: A study to investigatethe amount of time that it takes for stolen credentials to be used by a hacker.
Posted: 23 Apr 2019 | Published: 23 Apr 2019

ComputerWeekly.com

Break the Link Between Users and Cyber Threats
sponsored by Avast Business
WHITE PAPER: Because SMBs rarely have the resources to build intricate anti-malware solutions, your organization is uniquely positioned to step in and offer those necessary security layers. This white paper highlights a secure web gateway (SWG) that can help you do so. Read on for 5 main benefits and how it delivers added value for service providers.
Posted: 22 Apr 2019 | Published: 22 Apr 2019

Avast Business

Verizon Risk Report
sponsored by Verizon
RESOURCE: Find out how you can measure your risk and security posture with comprehensive visibility and daily updates that address gaps and maximize ROI through actionable data.
Posted: 18 Apr 2019 | Published: 18 Apr 2019

Verizon

The exploitation of flaws in the HTTPS protocol
sponsored by ComputerWeekly.com
RESEARCH CONTENT: For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.
Posted: 16 Apr 2019 | Published: 16 Apr 2019

ComputerWeekly.com

Next-Generation Device Security is Essential for Healthcare Providers
sponsored by Lenovo and Intel
RESOURCE: This custom article takes a look at recent cyberattacks: breaking down where they originate, who they target, and how they operate. Find out how you can bolster your security posture by strengthening your device protection and authentication tools.
Posted: 29 Mar 2019 | Published: 29 Mar 2019

Lenovo and Intel

The Transparent Managed Security Handbook
sponsored by Expel
EBOOK: Find out how CISOs and cybersecurity teams can spend more time making critical decisions and managing risk than chasing down countless security alerts.
Posted: 28 Mar 2019 | Published: 28 Mar 2019

Expel

Where to Invest Next to Mature Cybersecurity
sponsored by CrowdStrike
WHITE PAPER: To help your organization answer questions like, "Where should we invest next?" this white paper identifies the critical decision points that companies arrive at as they mature their cybersecurity strategy – related to people, processes, and technologies – and provides guidance to face the challenges these decisions present.
Posted: 27 Mar 2019 | Published: 27 Mar 2019

CrowdStrike

2018-2019 Global Application & Network Security Report
sponsored by Radware
RESEARCH CONTENT: This 2018-2019 global application & network security report highlights the major themes shaping cybersecurity of late. Explore the report to help your organization keep its finger on the pulse of the rapidly evolving and increasingly dangerous cybersecurity landscape.
Posted: 12 Mar 2019 | Published: 12 Mar 2019

Radware

Network Security that's Built Right In
sponsored by 128 Technology
WHITE PAPER: Learn about a zero trust security model that's designed to help businesses mitigate the risk of cyberattacks by enabling granular network segmentation, policy-based inter-router traffic encryption, fully distributed firewall protection, and more.
Posted: 11 Feb 2019 | Published: 11 Feb 2019

128 Technology

How to Reduce Security Risks through Better DNS Visibility & Analysis
sponsored by Corelight
WEBCAST: In this webcast, find out how you can drive visibility into DNS traffic so that you can create a strong security analytics strategy that enables you to reduce risks for your network.
Posted: 04 Feb 2019 | Premiered: Jan 9, 2019

Corelight

Top 10 IT security stories of 2018
sponsored by ComputerWeekly.com
EGUIDE: The discovery of the Meltdown and Spectre microprocessor vulnerabilities, and several similar vulnerabilities in the months that followed, were probably the single most challenging developments for enterprise IT security teams in 2018. Here's a look back over Computer Weekly's top 10 IT Security stories of 2018.
Posted: 09 Jan 2019 | Published: 09 Jan 2019

ComputerWeekly.com

Data Breach: Security Investigation, Detection and Rapid Response
sponsored by Splunk
WHITE PAPER: Discover the specific items to investigate when there is a security incident alert, what your analysts need to determine during a breach to mitigate further damage, the 6 most common steps in determining the impact of the breach, and the most appropriate course of action.
Posted: 17 Dec 2018 | Published: 01 May 2017

Splunk

Sports-Centric Streaming Service fuboTV Sees 50% ROI - Just from Auth0's Security
sponsored by Auth0
CASE STUDY: Read this case study to find out how fuboTV partnered with Auth0 in order to improve and scale their authentication and authorization workflows.
Posted: 28 Nov 2018 | Published: 28 Nov 2018

Auth0

Closing the Cybersecurity Gap
sponsored by Splunk
: Discover 3 steps to help you move towards a more intelligence-driven cybersecurity strategy that takes full advantage of your available resources and skills.
Posted: 21 Nov 2018 | Published: 21 Nov 2018

Splunk

Securing your Workforce across Cloud and Mobile
sponsored by Forcepoint
EBOOK: In this e-book, get tips on how to evaluate your CASB and overcome the leading cybersecurity challenges in cloud and mobile-first environments.
Posted: 26 Oct 2018 | Published: 31 Dec 2017

Forcepoint

Solving the Financial Services Security Talent Shortage with Managed Detection
sponsored by Arctic Wolf
WEBCAST: This webcast explores how banks and other financial institutions can protect their critical assets with managed detection and response. Find out how you can overcome the security skills shortage with threat detection services.
Posted: 11 Sep 2018 | Premiered: Sep 11, 2018

Arctic Wolf

Build Identity Verification Processes with the Power of AI
sponsored by Jumio
EGUIDE: This expert e-guide explores recent developments in AI-powered identity verification technology. Get tips on how to outsmart potential fraudsters by finding out how you can improve your identity verification practices by building machine learning and other AI-based technologies into your security strategy.
Posted: 19 Nov 2018 | Published: 15 Nov 2018

Jumio
1 - 25 of 249 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement