IT Systems  >   Business Systems  >  

Security Systems

RSS Feed   
Security Systems Reports
1 - 25 of 1147 Matches Previous Page  |  Next Page
Top 10 IT security stories of 2018
sponsored by ComputerWeekly.com
EGUIDE: The discovery of the Meltdown and Spectre microprocessor vulnerabilities, and several similar vulnerabilities in the months that followed, were probably the single most challenging developments for enterprise IT security teams in 2018. Here's a look back over Computer Weekly's top 10 IT Security stories of 2018.
Posted: 09 Jan 2019 | Published: 09 Jan 2019

ComputerWeekly.com

Top 10 cyber crime stories of 2018
sponsored by ComputerWeekly.com
EGUIDE: This year was marked by several reports on the spiralling cost of cyber crime to businesses as well as to the national and the global economy, as the cyber security industry turned to the bottom line as a motivator for decision makers to prioritise defence against cyber criminal activities. Here are Computer Weekly's top 10 cyber crime stories 2018
Posted: 03 Jan 2019 | Published: 03 Jan 2019

ComputerWeekly.com

A New SIEM for a New World
sponsored by Empow Cyber Security
WEBCAST: With the rise of digital business, attack surfaces have expanded, data has become more abundant and complex and alerts have become a hindrance rather than a help. Traditional SIEMs aren't able to keep up with this new environment. Watch this webinar to learn about the kind of SIEM today's dynamic world requires.
Posted: 27 Dec 2018 | Premiered: Dec 27, 2018

Empow Cyber Security

Cybersecurity Operations: Realities and Strategies
sponsored by Empow Cyber Security
WEBCAST: Traditional cybersecurity technologies were not built for today's dynamic environments. They were designed for a simpler time, but the world has changed and security strategies and technologies must change with it. Listen as Jon Oltsik, Senior Principal Analyst at ESG discusses how to keep your organization safe.
Posted: 27 Dec 2018 | Premiered: Dec 27, 2018

Empow Cyber Security

How Natural Language Processing Can Automate Your SIEM
sponsored by Empow Cyber Security
WEBCAST: IT environments are growing more complex and bloated, but there aren't enough trained and knowledgeable security professionals available to manage and protect environments. In this webcast, Donnelly Financial's CISO Dannie Combs discusses how they tackled the cybersecurity skills shortage using next-gen SIEM.
Posted: 27 Dec 2018 | Premiered: Dec 27, 2018

Empow Cyber Security

IT Security Gap: Ponemon Survey Solution
sponsored by Aruba Networks
RESOURCE: The IT security gap's size and complexity is growing rapidly. With an increasingly mobile user experience, cloud solutions and IoT access to IT networks, building a cyber-defense is more challenging. In this resource, learn about a survey run by Ponemon Institute and Aruba which explores what makes the IT security gap so difficult to close.
Posted: 18 Dec 2018 | Published: 10 Sep 2018

Aruba Networks

Data Breach: Security Investigation, Detection and Rapid Response
sponsored by Splunk
WHITE PAPER: Discover the specific items to investigate when there is a security incident alert, what your analysts need to determine during a breach to mitigate further damage, the 6 most common steps in determining the impact of the breach, and the most appropriate course of action.
Posted: 17 Dec 2018 | Published: 01 May 2017

Splunk

Balancing Digital Experience and Security
sponsored by Akamai Technologies
RESOURCE: As organizations seek to improve customer experiences, they must enable increasingly fast, streamlined, simple and safe digital experiences. This executive summary aims to help readers understand how digital businesses across the globe align user experience and security with their strategic priorities.
Posted: 17 Dec 2018 | Published: 31 Mar 2018

Akamai Technologies

Security Automation Best Practices
sponsored by Rapid7
WHITE PAPER: While processes make it possible to get a job done faster, creating ones that solve practical problems and result in measureable efficiency gains can be a time-consuming task. In this white paper, learn how to make your security team successful with the help of automation.
Posted: 13 Dec 2018 | Published: 13 Dec 2018

Rapid7

State of the Channel Ransomware Report: Canadian Edition
sponsored by Datto, Inc.
EBOOK: More than 200 Canadian MSPs share their ransomware hardships and triumphs, with specifics on how ransomware is targeting customers—in particular, SMBs—and recommendations for recovery and business continuity. Read on for a unique look into the state of ransomware.
Posted: 07 Dec 2018 | Published: 31 Dec 2017

Datto, Inc.

The Values of Both Building Your Own SOC and Buying SOC-as-a-Service
sponsored by Arctic Wolf
VIDEO: SOCs are the latest services you can now outsource rather than build in-house. The question is whether a DIY SOC or a SOC-as-a-Service is a better fit for your company. In this webcast, learn the value propositions of both SOC-as-a-Service and DIY SOC. The speakers also discuss key factors to help you decide which option is best for you.
Posted: 06 Dec 2018 | Premiered: 31 Dec 2018

Arctic Wolf

Definitive Guide to Software-Defined Perimeter Security
sponsored by Cyxtera
WHITE PAPER: Find out how to take an identity-centric approach to the software-defined network perimeter and explore two use cases for how this approach can help secure AWS resources and dramatically reduce the attack surface.
Posted: 03 Dec 2018 | Published: 31 Dec 2017

Cyxtera

Sports-Centric Streaming Service fuboTV Sees 50% ROI - Just from Auth0's Security
sponsored by Auth0
CASE STUDY: Read this case study to find out how fuboTV partnered with Auth0 in order to improve and scale their authentication and authorization workflows.
Posted: 28 Nov 2018 | Published: 28 Nov 2018

Auth0

Closing the Cybersecurity Gap
sponsored by Splunk
RESEARCH CONTENT: Discover 3 steps to help you move towards a more intelligence-driven cybersecurity strategy that takes full advantage of your available resources and skills.
Posted: 21 Nov 2018 | Published: 21 Nov 2018

Splunk

Build Identity Verification Processes with the Power of AI
sponsored by Jumio
EGUIDE: This expert e-guide explores recent developments in AI-powered identity verification technology. Get tips on how to outsmart potential fraudsters by finding out how you can improve your identity verification practices by building machine learning and other AI-based technologies into your security strategy.
Posted: 19 Nov 2018 | Published: 15 Nov 2018

Jumio

Managing the Risk of Post-Breach or "Resident" Attacks
sponsored by Illusive Networks
RESEARCH CONTENT: Find out what Ponemon Institute discovered about organizations' readiness for insider threats when they surveyed 627 IT and IT security practitioners in the United States about their understanding of attackers who operate internally.
Posted: 16 Nov 2018 | Published: 16 Nov 2018

Illusive Networks

The State of Application Security in Today's Application Economy
sponsored by Micro Focus
WHITE PAPER: As companies become active players in the application economy, the implications of security—and the lack thereof—loom over them. Organizations that have never before given thought to security are now concerned about the risk posed by their applications. In this IDG quick poll, uncover considerations for building your application security strategy.
Posted: 16 Nov 2018 | Published: 16 Nov 2018

Micro Focus

Remove the Guesswork from Securing your Business
sponsored by CompuCom Systems, Inc.
WHITE PAPER: Discover a security best practices questionnaire and a cybersecurity protection checklist to see how your business's defensive strategies measure up against modern threats.
Posted: 16 Nov 2018 | Published: 16 Nov 2018

CompuCom Systems, Inc.

Magic Quadrant for Security Awareness Computer-Based Training
sponsored by MediaPRO
WHITE PAPER: End-user-focused security education and training is a rapidly growing market that has experienced a nearly 40% growth from 2016 through 2017. As products within this market mature, each vendor seeks to differentiate its products and services in a variety of ways. This white paper compares the strengths and cautions of many important vendors.
Posted: 05 Dec 2018 | Published: 13 Nov 2018

MediaPRO

4 Critical Features of a Cyber-Resilient Architecture
sponsored by Dell EMC and Microsoft
RESOURCE: To protect your servers against cyber-attacks throughout their lifecycle, industry analysts recommend implementing four practices into your hardware security strategy. Keep reading to learn all 4.
Posted: 04 Dec 2018 | Published: 04 Dec 2018

Dell EMC and Microsoft

Defending against Encrypted Threats
sponsored by F5 Networks
WHITE PAPER: In a world dominated by SSL/TLS encrypted traffic, find out how to overcome various challenges with inbound and outbound traffic inspection so that you can effectively neutralize malware attacks, intelligently route traffic, and more.
Posted: 03 Dec 2018 | Published: 03 Dec 2018

F5 Networks

Encrypted Traffic: Making What's Vulnerable More Visible
sponsored by F5 Networks
WHITE PAPER: This white paper explores how to update your SSL/TLS strategy for the increasing payload of encrypted attacks. Get tips on how to improve your cryptographic posture so that you can make sure your SSL/TLS strategy is able to decrypt and encrypt traffic while routing it intelligently across security inspection devices.
Posted: 03 Dec 2018 | Published: 03 Dec 2018

F5 Networks

Financial Services: Managing Digital Risk and Compliance
sponsored by Proofpoint, Inc.
WHITE PAPER: Open this white paper to uncover the best approaches financial institutions can take to protect against domain risks, mobile app risks, digital compliance and much more.
Posted: 03 Dec 2018 | Published: 03 Dec 2018

Proofpoint, Inc.

Increase Visibility into SSL Encryption to Boost Security
sponsored by F5 Networks
WHITE PAPER: Regaining visibility into encrypted traffic is one of the most important steps you can take to protect your apps, your data, and your business. Find out how SSL/TLS orchestration can help you get that visibility and deliver high-performance decryption and encryption of outbound TLS traffic—without slowing your traffic down.
Posted: 30 Nov 2018 | Published: 30 Nov 2018

F5 Networks

Organizations React to Security Threats More Efficiently and Cost Effectively
sponsored by Recorded Future
WHITE PAPER: While organizations may install security tools that integrate data feeds onto their network, many do not recognize what to do with the information that is coming in. In this IDC white paper, uncover the findings from interviews with 6 organizations regarding the impact of deploying a universal threat intelligence solution.
Posted: 19 Nov 2018 | Published: 19 Nov 2018

Recorded Future
1 - 25 of 1147 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement