Standards  >  

Security Standards

RSS Feed   
ALSO CALLED: P3P, Security Protocols, Information Security Standards
DEFINITION: P3P (Platform for Privacy Preferences) is a protocol that specifies a way to determine if a Web site's security policies meet a user's privacy requirements. P3P includes a machine-readable vocabulary and syntax that can be used to describe Web site security policies and consumers' self-identified privacy preferences. When a user requests a Web page, that Web site's P3P policy files are sent to the  … 

Security Standards definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Standards Reports
1 - 25 of 785 Matches Previous Page  |  Next Page
Securing Azure Environments: Insights from PetSmart, Microsoft & Barracuda
sponsored by Barracuda
VIDEO: Microsoft Azure plays an important role in many organizations’ digital transformation initiatives. As such, it becomes critical to understand the capabilities, limitations and potential benefits of Azure. Watch this webinar to gain insights into Azure from experts at PetSmart, Microsoft and Barracuda.
Posted: 23 Nov 2020 | Premiered: 23 Nov 2020

Barracuda

Addressing Complexity and Expertise in Application Security Testing
sponsored by WhiteHat Security
RESEARCH CONTENT: The Verizon’s 2020 DBIR indicated that 43% of data breaches begin by targeting a web application. This discovery has begun to shift the cybersecurity paradigm from focusing on on-premise infrastructures to protecting their web apps with application security testing (AST). Read this 451 Research brief to learn more about AST.
Posted: 23 Nov 2020 | Published: 23 Nov 2020

WhiteHat Security

Endpoint Protection Best Practices to Block Ransomware
sponsored by Sophos
WHITE PAPER: Ransomware attacks are becoming increasingly costly – in fact, the average global cost to remediate an attack is over $700,000. One of the best ways to protect against ransomware attacks is with properly configured endpoint protection. Read on to discover best practices for configuring your endpoint protection against ransomware.
Posted: 20 Nov 2020 | Published: 20 Nov 2020

Sophos

Firewall Best Practices to Block Ransomware
sponsored by Sophos
WHITE PAPER: Modern firewalls are highly effective at defending against ransomware attacks, but they need to be given the chance to do their job. In this whitepaper, discover how these attacks work, how they can be stopped, and best practices for configuring your firewall and network to give you the best protection possible.
Posted: 20 Nov 2020 | Published: 31 Aug 2020

Sophos

Foundstone Targeted Malware Threat Assessment 360
sponsored by McAfee
DATA SHEET: Reactionary approaches to cybersecurity are no longer viable, security teams need to actively hunt out threats and stop them before they strike. The following data sheet provides an overview of the Foundstone Targeted Malware Threat Assessment 360, designed to equip security pros with threat hunting capabilities – read on to learn more.
Posted: 20 Nov 2020 | Published: 20 Nov 2020

McAfee

Stopping BEC and EAC: Email Security in 2020
sponsored by Proofpoint
EBOOK: Email continues to be the leading vector in successful cyberattacks, leaving CISOs with the increasingly difficult responsibilities of protecting employee inboxes and stopping potential threats. Read this eBook for a comprehensive guide to stopping Business email compromise (BEC) and email account compromise (EAC) attacks.
Posted: 19 Nov 2020 | Published: 19 Nov 2020

Proofpoint

A Security Engineer’s Nightmare
sponsored by Cribl.io
WHITE PAPER: For security pros, preventing breaches and ensuring data privacy is hectic enough – having an incompetent system on top of these challenges can introduce new levels of stress. Read this white paper to learn how Crible is helping security engineers log information and incidents so they can focus their efforts on more important tasks.
Posted: 19 Nov 2020 | Published: 19 Nov 2020

Cribl.io

NWN Security
sponsored by NWN Corporation
VIDEO: For NWN, security is about risk, control and measurement – they took these pillars into consideration when crafting their security offering. Watch this short video for an overview of NWN’s cybersecurity vision and capabilities.
Posted: 18 Nov 2020 | Premiered: 18 Nov 2020

NWN Corporation

Top Security Orchestration Use Cases
sponsored by Palo Alto Networks
WHITE PAPER: As security alert volumes reach an all-time high, analysts are often left feeling overworked or fatigued. To help with the SecOps workload, organizations have begun adopting security orchestration as a way of unifying disparate security tools and teams. But what is security orchestration and how does it help? Read on to find out.
Posted: 18 Nov 2020 | Published: 18 Nov 2020

Palo Alto Networks

Leveraging Ivanti to Accelerate Time to Value at a Lower Cost
sponsored by Ivanti
CASE STUDY: When considering an operational upgrade, banks must take deliberate precautions to ensure they’re adhering to regulatory requirements. This case study overviews Woodforest National Bank’s journey towards an improved IAM program, highlighting their key challenges and how they partnered with Ivanti to overcome them.
Posted: 18 Nov 2020 | Published: 18 Nov 2020

Ivanti

Plenty of Phish: Why We Need a New Approach to Email Security
sponsored by Darktrace
VIDEO: The shift towards remote workforces has introduced a series of new phishing and other email security threats. Unfortunately, inbox gateways and other traditional email security methods no longer cut it. Watch this webinar for a closer look at these new challenges and discover Darktrace’s Immune System Approach to email security.
Posted: 18 Nov 2020 | Premiered: 18 Nov 2020

Darktrace

How to Level Up Your Vendor Management
sponsored by Aptible
WHITE PAPER: Every company needs vendors, yet vendors increase your vulnerability to security threats. Many of the largest data breaches in the past decade or so have happened because of vulnerabilities from 3rd party vendors. Therefore, you must establish robust processes on both sides of vendor management. View this guide to learn more.
Posted: 17 Nov 2020 | Published: 17 Nov 2020

Aptible

Security Orchestration for Dummies
sponsored by Palo Alto Networks
EBOOK: Security orchestration emerged as a way of supporting the tireless efforts of understaffed and overworked security teams. The following eBook, Security Orchestration for Dummies, explains security orchestration in 6 short chapters – read on to unlock your copy.
Posted: 17 Nov 2020 | Published: 17 Nov 2020

Palo Alto Networks

The 2020 State of Security Operations
sponsored by Palo Alto Networks
RESEARCH CONTENT: As a result of siloed and overly-complicated security operations, analysts are left to process a massive volume of alerts – leading to fatigue and subpar security outcomes. To better understand the state of SecOps, Palo Alto Networks commissioned Forrester to conduct a study. Read on to unlock your copy.
Posted: 17 Nov 2020 | Published: 17 Nov 2020

Palo Alto Networks

At A Glance: CrowdStrike® Falcon Discover™ For AWS
sponsored by AWS & CrowdStrike
PRODUCT OVERVIEW: As organisations opt to host more of their data in the cloud, securing their cloud environments has never been more important. This solution brief offers 5 considerations for choosing a cloud security solution and highlights how CrowdStrike’s Falcon Defense CrowdStrike Falcon Discover can address common AWS challenges – read on to get started.
Posted: 16 Nov 2020 | Published: 16 Nov 2020

AWS & CrowdStrike

Success from the Start: Top Tips For Beginning An ID Badge Or Card Program
sponsored by HID Global
EBOOK: For organizations embarking on an ID badge/card program there are a number of key implementation steps and often overlooked – but vital – considerations to make to ensure success from the start. This eBook provides insight into these planning considerations, and more – read on to unlock your copy.
Posted: 16 Nov 2020 | Published: 16 Nov 2020

HID Global

IT Priorities 2020: After Covid-19, security goes back to basics
sponsored by ComputerWeekly.com
EGUIDE: This year's transition to remote working highlighted big gaps in the fundamentals of security, as updated TechTarget/Computer Weekly data reveals.
Posted: 16 Nov 2020 | Published: 16 Nov 2020

ComputerWeekly.com

Fargo® Ink1000
sponsored by HID Global
DATA SHEET: Classrooms, offices and stores are beginning to open their doors again, and employees need an effective, secure and reliable card printer for their return to business as usual. Introducing the HID FARGO® INK1000desktop-based card printer. Read this data sheet to learn more about the Fargo Ink1000 Inkjet card printer from HID.
Posted: 16 Nov 2020 | Published: 16 Nov 2020

HID Global

BlackBerry Cylance 2020 Threat Report
sponsored by BlackBerry
RESEARCH CONTENT: The comprehensive findings from the BlackBerry Cylance 2020 Threat Report provide a holistic summary of the trends and vulnerabilities of this year’s most common and prominent cyberthreats. Read on to learn more about 2020’s threat landscape and prepare your organization for 2021’s cyberthreats.
Posted: 16 Nov 2020 | Published: 16 Nov 2020

BlackBerry

The 7 Secrets Of Top Performing Analysts
sponsored by Sixgill
EBOOK: For security analysts (and other cybersecurity pros), the ever-growing skills gap means more work for each team member – in most cases, the high-stress nature of the job has shown to lead to fatigue and burnout. This eBook provides 7 pieces of advice from top analysts, to help you with your data-to-day performance – read on to get started.
Posted: 13 Nov 2020 | Published: 13 Nov 2020

Sixgill

The Key To Successful Digital Transformation In Banking
sponsored by Onegini
WHITE PAPER: In order to compete with FinTechs, banks need to rethink their digital presence to ensure a secure and user-friendly experience. But digital transformations are far from simple. This helpful guide explores some of the challenges of going digital, as well as an overview of their Onegini’s Identity Cloud offering – read on to get started.
Posted: 13 Nov 2020 | Published: 13 Nov 2020

Onegini

Sixgill Report: Remote Desktop Protocol (RDP)
sponsored by Sixgill
PRODUCT OVERVIEW: Compromised remote desktop protocols (RDPs) are a goldmine for ransomware actors looking to make a quick buck during the pandemic. This report provides a closer look at the threat facing RDPs and how organizations can protect their remote workers – read on to get started.
Posted: 12 Nov 2020 | Published: 12 Nov 2020

Sixgill

Sixgill And Threat Intelligence Program Modernization
sponsored by Sixgill
PRODUCT OVERVIEW: Threat intelligence plays a vital role in not only addressing current challenges, but also proactively protecting the organization against potential or future threats. This ESG Showcase research report provides an overview of Sixgill’s threat intelligence offering, designed to help organizations address their cybersecurity imperatives.
Posted: 12 Nov 2020 | Published: 31 Oct 2020

Sixgill

Business Continuity Management: Planning, Disaster Recovery & Crisis Response
sponsored by ServiceNow
PRODUCT OVERVIEW: Business continuity management (BCM) tools are an effective way for organizations to ensure crisis preparation and disaster recover plans are in place prior to an unforeseen disruption. This solution brief highlights the key features and capabilities of ServiceNow’s BCM tool – read on for more information.
Posted: 12 Nov 2020 | Published: 12 Nov 2020

ServiceNow

Turn a Mobile App Into a Major Win
sponsored by Onegini
CASE STUDY: For organizations in the healthcare industry, mobile applications and telemedicine are becoming the norm. Read this case study to see how VGZ, one of the largest health insurers in the Netherlands, was able to build an application that was secure, complaint and faster than their website – without sacrificing user experience.
Posted: 12 Nov 2020 | Published: 12 Nov 2020

Onegini
1 - 25 of 785 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info