IT Management  >   Systems Operations  >  

Security

RSS Feed   
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 

Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Reports
1 - 25 of 3621 Matches Previous Page  |  Next Page
The Future of Website Security
sponsored by DigiCert
WHITE PAPER: In 2016 over 75% of scanned websites had vulnerabilities, 1/5 of which were critical.
Posted: 22 Jun 2018 | Published: 22 Jun 2018

DigiCert

Enforce a Zero Trust Security Model in Today's Hostile Environment
sponsored by Akamai Technologies
WHITE PAPER: Companies are pursuing digital transformation to improve customer value, operate with greater efficiency & agility, & increase innovation. As companies leverage new workflows, security has not kept pace, & cybercriminals are becoming more sophisticated. This white paper describes a security paradigm for today's environment: zero trust.
Posted: 22 Jun 2018 | Published: 22 Jun 2018

Akamai Technologies

8 Steps to Zero Trust
sponsored by Akamai Technologies
RESOURCE: Use this step-by-step guide from Akamai's CTO, Charlie Gero, to build an inclusive & concrete zero trust architecture, to help enable safe application access in a cloud-native world. Easily transition to a perimeter-less environment with this prescriptive process, phasing applications in one at a time & reducing your migration risk profile.
Posted: 22 Jun 2018 | Published: 31 May 2018

Akamai Technologies

The Future of Identity and Access Management Tools
sponsored by Jumio
EGUIDE: Fingerprints, facial recognition, and voice recognition are now on the market as identity management tools, but much more is still needed. Find out how organizations plan to implement a new level of identity management that relies less on user actions and more on known things, places, and experiences.
Posted: 22 Jun 2018 | Published: 20 Jun 2018

Jumio

Cyberthreats and Risks in the Payment Card Industry
sponsored by Jumio
EGUIDE: Find out how you can prevent and protect your enterprise against fraudsters in the payment card industry.
Posted: 22 Jun 2018 | Published: 20 Jun 2018

Jumio

Traditional Code Signing: 5 Critical Vulnerabilities
sponsored by DigiCert
RESOURCE: Casual code-signing can be very risky for an enterprise. Find out how you can manage those risks, without them negatively affecting your organization.
Posted: 22 Jun 2018 | Published: 22 Jun 2018

DigiCert

A Force Multiplier for Third-Party Cyber Risk Management
sponsored by CyberGRX
RESOURCE: Open this resource to learn about CyberGRX Exchange, a third-party management provider that uses advanced analytics, so enterprises and third-parties always have a current view of critical risk.
Posted: 22 Jun 2018 | Published: 22 Jun 2018

CyberGRX

Club Automation Case Study
sponsored by Barracuda
CASE STUDY: Find out how IT teams dealt with their security challenges within their hybrid cloud, as well as the positive outcomes they've had from switching platforms.
Posted: 22 Jun 2018 | Published: 31 Dec 2017

Barracuda

A No Hassle Guide to Effective Third-Party Risk Management
sponsored by CyberGRX
EBOOK: Access this e-book to learn the 4 steps to better understanding your third-parties and successfully move from a reactive threat management model to proactively preventing cyber risk.
Posted: 22 Jun 2018 | Published: 22 Jun 2018

CyberGRX

IBM Watson Regulatory Compliance
sponsored by IBM
WHITE PAPER: Risk and compliance analysis has changed significantly, increasing the regulatory compliance demands placed on organizations and driving the need for a new approach. Dive into this white paper to learn how cognitive computing can help banks streamline operations and reduce regulatory compliance cost.
Posted: 22 Jun 2018 | Published: 22 Jun 2018

IBM

Moving Beyond Perimeter Security: A Comprehensive and Achievable Guide to Less Risk
sponsored by Akamai Technologies
WHITE PAPER: A zero trust security and access model is the solution: Every machine, user, and server should be untrusted until proven otherwise. But how do you achieve zero trust? Read this white paper to learn how to transition to a perimeter-less world in an incredibly easy way.
Posted: 21 Jun 2018 | Published: 30 Mar 2018

Akamai Technologies

FRTB Regulation: Challenges and Opportunities for Banks
sponsored by IBM
WHITE PAPER: Explore the challenges and opportunities facing banks and organizations as they prepare for the Fundamental Review of the Trading Book (FRTB), and how data aggregation and reporting tools can aid compliance.
Posted: 21 Jun 2018 | Published: 21 Jun 2018

IBM

Digital Workplace Study Reveals Tangible Benefits, but Organizations Must Prepare for Data Security Risks
sponsored by Aruba Networks
RESEARCH CONTENT: Learn about data security in the digital workplace and uncover research about how the future of work is changing.
Posted: 21 Jun 2018 | Published: 21 Jun 2018

Aruba Networks

IBM Regulatory Compliance Analytics with Watson
sponsored by IBM
WHITE PAPER: Take a look inside Watson AI for compliance. Find out how cognitive computing is helping to ease the burden of keeping up with complex regulatory demands.
Posted: 21 Jun 2018 | Published: 31 Dec 2016

IBM

SSL Attacks on the Rise
sponsored by Radware
EBOOK: Better arm yourself against SSL threats by learning about the different types of encrypted attacks, leading SSL vulnerabilities, your options for SSL protection, and more.
Posted: 21 Jun 2018 | Published: 21 Jun 2018

Radware

Cloud Security Pros Finding their Voice
sponsored by Cavirin
EGUIDE: Find out how the DevSecOps and the NIST Cybersecurity Framework both put the long-lost co-worker, the security pro, front and center.
Posted: 21 Jun 2018 | Published: 11 Jun 2018

Cavirin

Best Practices: Protect Your Apps from Cyberattckcs
sponsored by F5 Networks
WHITE PAPER: The skyrocketing popularity of websites and web-based applications has come with a corresponding explosion in the numbers, types, magnitudes, and costs of attacks that specifically target app vulnerabilities. Continue reading to reveal who is behind the security breaches, and what you can do to protect your apps.
Posted: 21 Jun 2018 | Published: 21 Jun 2018

F5 Networks

Protecting Your Network from Malware
sponsored by Akamai Technologies
WHITE PAPER: 67% of workers use their own devices at work, according to IDC, and it only takes one compromised device to unleash malware that cripples the network or facilitates data exfiltration. Secure your network from vicious malware and most importantly, your data.
Posted: 21 Jun 2018 | Published: 30 Apr 2018

Akamai Technologies

Third-party Risk Management Use Case
sponsored by CyberGRX
CASE STUDY: Read this brief case study on how Pinnacol, an assurance provider for Colorado employees, was able to find a third-party risk management provider to make faster and smarter business decisions while safeguarding customer data.
Posted: 21 Jun 2018 | Published: 21 Jun 2018

CyberGRX

Evolve Your Website Security
sponsored by DigiCert
WHITE PAPER: The growth of cybercrime is skyrocketing, which means advanced threats are putting website ecosystems at risk. Website security must be evolved in line with these growing challenges. Find out how to protect your organization's reputation against these threats.
Posted: 21 Jun 2018 | Published: 21 Jun 2018

DigiCert

Automating Security Best Practices on AWS
sponsored by Barracuda
RESOURCE: How can you guarantee the security of your applications? Take a glimpse at the resource to learn how incorporating application security directly into the code building process accelerates your development of web applications with confidence.
Posted: 21 Jun 2018 | Published: 21 Jun 2018

Barracuda

How To Succeed in Data Loss Prevention (DLP) Projects
sponsored by Docauthority
WHITE PAPER: Inside, find out how AI and document security, combined with your DLP project, can help you to significantly improve the coverage for the data protected.
Posted: 20 Jun 2018 | Published: 20 Jun 2018

Docauthority

Barracuda CloudGen WAF for AWS
sponsored by Barracuda
RESOURCE: This resource explains how the Barracuda CloudGen WAF blocks application layer DDoS and other attack vectors directed at web-facing applications hosted in AWS while protecting against data loss.
Posted: 20 Jun 2018 | Published: 20 Jun 2018

Barracuda

Cybercrime by the Numbers
sponsored by Akamai Technologies
RESOURCE: It's likely not a matter of if, but when your company will fall prey to a targeted attack involving malware, ransomware, data exfiltration, or phishing. In fact, 70% of organizations reported a security incident that negatively impacted their business in the past year. Learn more about the realities of cybercrime in today's hyperconnected world.
Posted: 20 Jun 2018 | Published: 20 Jun 2018

Akamai Technologies

Going Mobile: The Emerging Threat Landscape
sponsored by Check Point Software Technologies Ltd.
VIDEO: For hackers set on stealing sensitive business data, mobile devices are the new back door to the enterprise network. Listen in on this webcast to learn about the latest modes of attack used by hackers to breach mobile devices and how businesses are staying protected against these 5th generation attacks.
Posted: 20 Jun 2018 | Premiered: 14 Jun 2018

Check Point Software Technologies Ltd.
1 - 25 of 3621 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement