IT Management  >   Systems Operations  >  

Security

RSS Feed   
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 

Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Reports
1 - 25 of 3022 Matches Previous Page  |  Next Page
Secure SD-WAN & SASE: Your 2021 Guidebook
sponsored by TechTarget
RESOURCE: Gartner describes SASE as the future of network security, with secure SD-WAN as the cornerstone of this development. What do you need to know about these technologies now to plan for the road ahead? Start by downloading our expert guide, Secure SD-WAN & SASE: Your 2021 Guidebook.
Posted: 30 Jul 2021 | Published: 31 Jul 2021

TechTarget

Security in the supply chain: Lessons learned from SolarWinds
sponsored by TechTarget
RESOURCE: Explore some of the key lessons we've learned from SolarWinds, and tips for applying them to your supply chain, in our expert guide—which you can download after a brief survey.
Posted: 30 Jul 2021 | Published: 31 Jul 2021

TechTarget

CW Benelux - August-October 2021: Netherlands sees increase in the number of women opting for an ICT career
sponsored by ComputerWeekly.com
EZINE: The IT skills gap in the Netherlands could be about to narrow as more women take up jobs in the sector. Figures from last year revealed that the number of female ICT professionals grew by 6.5%, while the number of male ICT professionals increased by only 1.7%. Read more about it in this issue.
Posted: 29 Jul 2021 | Published: 12 Aug 2021

ComputerWeekly.com

A Computer Weekly e-guide to SASE
sponsored by ComputerWeekly.com
EGUIDE: Covid has changed everything. Yet while it has truly as introduced many new things to many spheres of activity, in terms of networking it has actually acted as an accelerant to phenomena that were just gaining momentum before the first lockdowns and stay at home orders were being made. secure access service edge (SASE) is one such case.
Posted: 29 Jul 2021 | Published: 28 Jul 2021

ComputerWeekly.com

Risk-Based Authentication A Critical Element To Any Zero-Trust Deployment
sponsored by WatchGuard Technologies, Inc.
EBOOK: MSPs looking to enhance multi-cloud security would do well to consider risk-based authentication, which can help you fuse flexibility and higher protection into one coherent, customized setup. Download this e-book to discover how risk policies and multi-factor authentication can be applied in a manner that promotes secure, flexible architectures.
Posted: 15 Jul 2021 | Published: 15 Jul 2021

WatchGuard Technologies, Inc.

Cyber Defense Center
sponsored by Capgemini
RESOURCE: The arms race against cybersecurity attacks never ends. New threats, attackers and targets emerge daily, and cyber criminals are constantly evolving to breach defenses. Open up this resource to take a look at some of the most common cybersecurity challenges, and learn how to prevent, detect, and respond to security incidents in your organization.
Posted: 07 Jul 2021 | Published: 07 Jul 2021

TOPICS:  Security
Capgemini

Manchester United praised for swift response to cyber attack
sponsored by ComputerWeekly.com
EGUIDE: The Theatre of Dreams briefly turned into The Theatre of Nightmares last week as Manchester United Football Club suffered a cyber-attack on their systems. This e-Guide dives into more depth about how the attack happened and what Manchester United's cyber security team did, in order to prevent a loss of data and keep a clean sheet.
Posted: 01 Jul 2021 | Published: 01 Jul 2021

ComputerWeekly.com

Malwarebytes Will Help you Stop Chasing False Positives
sponsored by Malwarebytes
: Malwarebytes can help MSPs filter out false positives with multi-vector protection that accurately targets true malware and improve security quality. Check out this resource to learn how you can cut the time costs of false positives, reduce their associated security risks, and cultivate trust and loyalty in your customers.
Posted: 28 Jun 2021 | Published: 28 Jun 2021

Malwarebytes

Key Considerations When Building A SOC
sponsored by Dataminr
EBOOK: Download this e-book for key considerations when building a SOC.
Posted: 25 Jun 2021 | Published: 25 Jun 2021

TOPICS:  Security
Dataminr

Malwarebytes Integration with Connect Wise Manage
sponsored by Malwarebytes
DATA SHEET: Open up this data sheet to take a look at one of Malwarebytes’ newest PSA tools – ConnectWise Manage – and uncover key capabilities, integration benefits, features, and more.
Posted: 24 Jun 2021 | Published: 24 Jun 2021

TOPICS:  Security
Malwarebytes

SIEM Integrations to Enrich MSP Threat Intelligence
sponsored by Malwarebytes
PRODUCT OVERVIEW: This paper offers up use cases for how to support your security team with SIEM integration, including correlating security data, magnifying visualization, and more. Open now to take a look.
Posted: 24 Jun 2021 | Published: 24 Jun 2021

TOPICS:  Security
Malwarebytes

The CISOs Guide to Extending Zero Trust to the Endpoint
sponsored by Hysolate
WHITE PAPER: Zero trust is a holistic approach to network security, requiring the verification of each person and device whenever it attempts to access resources on a private network, regardless of whether they are already inside the perimeter. Open up this paper to explore everything you need to know about zero trust for your organization.
Posted: 23 Jun 2021 | Published: 23 Jun 2021

TOPICS:  Security
Hysolate

SIEM Integrations to Help MSPs Accelerate Threat Response
sponsored by Malwarebytes
DATA SHEET: Access this solution brief to learn about Malwarebytes business products which drive further automation of MSP active threat response processes and protect and respond to attacks as they occur.
Posted: 23 Jun 2021 | Published: 23 Jun 2021

TOPICS:  Security
Malwarebytes

MSPs: How to Stop Chasing False Positives and Grow Your Business
sponsored by Malwarebytes
DATA SHEET: Check out this solution brief to learn how Malwarebytes mitigates false positives for MSPs through a multi-layered protection strategy while also providing informed telemetry, and threat intelligence.
Posted: 23 Jun 2021 | Published: 23 Jun 2021

TOPICS:  Security
Malwarebytes

Computer Weekly - 22 June 2021: A new three-year plan for digital government
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, the new CEO of the Gov-ernment Digital Service, Tom Read, explains his three-year strategy for improving online public services. EU attempts to regulate AI are under fire – we examine the issues. And we find out how Bupa is turning to the cloud to deliver per-sonalised healthcare. Read the issue now.
Posted: 21 Jun 2021 | Published: 22 Jun 2021

ComputerWeekly.com

Cyber Security: 2021 Worst in Show
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide: Throughout 2021, there has been a strong focus worldwide on how to combat cyber security attacks for most businesses. In this e-guide we take a look at the best of the worst of those attacks to happen throughout January to June this year and how businesses can learn/adapt from these attacks.
Posted: 09 Jun 2021 | Published: 09 Jun 2021

ComputerWeekly.com

AWS Certified Security Specialty Exam Study Guide
sponsored by TechTarget
RESOURCE: Test your knowledge and find out everything you need to know about the AWS Certified Security Specialty exam in our exclusive new study guide.
Posted: 29 May 2021 | Published: 29 May 2021

TechTarget

6 Key Considerations Before Setting Up A Security Operations Center
sponsored by Dataminr
EBOOK: For many companies, the COVID-19 pandemic exposed physical security and riskmanagement gaps that senior leaders are eager to address in 2021. As a securityprofessional, you might find yourself wondering if it’s time to build a security operations center (SOC). This e-book explores 6 key considerations.
Posted: 28 May 2021 | Published: 28 May 2021

TOPICS:  Security
Dataminr

How To Leverage Customized Data and Document Security Solutions In 4 Steps
sponsored by Ricoh
WEBCAST: PH
Posted: 26 May 2021 | Premiered: May 26, 2021

TOPICS:  Security
Ricoh

How do you solve a problem like security training?
sponsored by ComputerWeekly.com
EGUIDE: In this E-Guide, we will the tricky topic of security awareness training. Firstly, we try to answer the burning question of how to get employees to pay attention to training and take it seriously. Then, we take a look at some security awareness best practices that you can use to craft training your users will actually benefit from.
Posted: 17 May 2021 | Published: 17 May 2021

ComputerWeekly.com

Ways To Protect Your Hospital From Ransomware In 2021
sponsored by Digital Hands
WHITE PAPER: Open up this infographic to find 5 essential cybersecurity strategies that will help your organization protect itself against ransomware in 2021.
Posted: 14 May 2021 | Published: 14 May 2021

TOPICS:  Security
Digital Hands

Ransomware and the Cost of Downtime
sponsored by Datto, Inc.
WHITE PAPER: According to a recent study, in the first half of 2020 ransomware attacks grew by 715% as cybercriminals began exploiting the pandemic. Take a deep dive into this infographic to learn more about ransomware attacks, the true cost of downtime, and how a business continuity and disaster recovery (BCDR) platform can help protect your clients.
Posted: 13 May 2021 | Published: 13 May 2021

TOPICS:  Security
Datto, Inc.

How To Prevent & Respond To Ransomware Attacks: A Cybersecurity Playbook For Hospitals
sponsored by Digital Hands
EBOOK: Cyberattacks are rising as cybercriminals know providers will pay, and quickly, to lessen the disruption on patient care during COVID-19. This is why it’s critical to understand how to prevent, detect, and respond to ransomware incidents. Open up this playbook to find actions you can take to improve cybersecurity in your healthcare organization.
Posted: 13 May 2021 | Published: 13 May 2021

TOPICS:  Security
Digital Hands

The Essential Cybersecurity Toolkit For Smbs
sponsored by Datto, Inc.
EBOOK: This eBook offers up tips for training employees on cybersecurity best practices through real world examples. Plus, some essential solutions aimed to help SMBs defend against, and recover from, cyberattacks.
Posted: 06 May 2021 | Published: 06 May 2021

TOPICS:  Security
Datto, Inc.

Preventing identity theft in a data breach
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, we will explore the links between ransomware attacks, data breaches and identity theft. First, Nicholas Fearn investigates the phenomenon of the double extortion attack, and shares some insider advice on how to stop them, while we'll explore the top five ways data backups can protect against ransomware in the first place.
Posted: 06 May 2021 | Published: 06 May 2021

ComputerWeekly.com
1 - 25 of 3022 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences