IT Management  >   Systems Operations  >  

Security

RSS Feed   
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 

Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Reports
1 - 25 of 3257 Matches Previous Page  |  Next Page
Incident Response Solution Brief
sponsored by BlackBerry
DATA SHEET: Many organizations today are unprepared to respond effectively to a serious security incident. This is often due to chronic resource issues and inadequate planning. Read this solution brief to learn how BlackBerry Security Services and their AI-powered tools can help your team be ready.
Posted: 16 Apr 2021 | Published: 16 Apr 2021

TOPICS:  Security
BlackBerry

The Changing Dynamics of AppSec, and Key Lessons You Can Learn
sponsored by Synopsys
WEBCAST: AppSec is continually evolving as new technologies come to the fore. In this resource, analyse some key recent trends in AppSec as well as the emerging activities that organizations are doing to protect themselves and their data.
Posted: 16 Apr 2021 | Premiered: Apr 16, 2021

TOPICS:  Security
Synopsys

Don’t let security trip you up
sponsored by Synopsys
WEBCAST: It’s time to shift the focus from reactive security to proactive security. Instead of focusing on new ways to find bugs already in the code base, you should address the root cause—by building expertise and providing the information needed to PREVENT bugs from entering the codebase.
Posted: 16 Apr 2021 | Premiered: Apr 16, 2021

TOPICS:  Security
Synopsys

2021 State of Open-Source Security Report
sponsored by Contrast Security
WHITE PAPER: Open-source libraries are growing in complexity, increasing risk while making it more difficult to secure modern applications. The 2021 State of Open-source Security Report uses telemetry from actual applications protected by Contrast OSS and Contrast Assess to reveal trends about library usage, vulnerabilities, and best practices. Read it here.
Posted: 15 Apr 2021 | Published: 15 Apr 2021

TOPICS:  Security
Contrast Security

New Survey Shows Integrating Application Security Testing Gaining Traction In Devops
sponsored by Synopsys
WHITE PAPER: Security professionals are focusing on DevOps to break traditional application security testing processes and tools—and for good reason. In this article, learn why an integrated DevSecOps approach is critical to building better code. Read the article here to see how your team can apply DevSecOps to your strategies.
Posted: 14 Apr 2021 | Published: 14 Apr 2021

TOPICS:  Security
Synopsys

The Forrester Wave™: Static Application Security Testing, Q1 2021
sponsored by Synopsys
ANALYST REPORT: In this exclusive Forrester Wave report, discover the 12 providers leading static application security testing (SAST), as well as what the next generation of SAST tools are focusing on. Get the details now. Save the report here.
Posted: 14 Apr 2021 | Published: 14 Apr 2021

TOPICS:  Security
Synopsys

Magic Quadrant For Application Security Testing
sponsored by Synopsys
ANALYST REPORT: The application security testing (AST) market is evolving—fast. In fact, according to new Gartner research, organizations will speed up their remediation of coding vulnerabilities identified by SAST by 30% by 2025, reducing time spent fixing bugs by 50%. Explore Gartner’s Magic Quadrant for AST here to see what other changes are to come.
Posted: 14 Apr 2021 | Published: 14 Apr 2021

TOPICS:  Security
Synopsys

How to Become a Threat Hunter
sponsored by Cisco Systems Inc.
EGUIDE: Much of hunting is instinct, and when it comes to hunting cyberthreats, it’s no different. Threat hunters are good at what do because they aren’t as ‘by-the-book’ as other professionals. But they do have a set of learnable skills that make them successful. Download this e-guide featuring Gartner analyst John Collins to know what these skills are.
Posted: 14 Apr 2021 | Published: 07 Apr 2021

Cisco Systems Inc.

Modernize DevOps with CyberArk Secrets Management and Red Hat OpenShift
sponsored by Red Hat
WEBCAST: No organization wants to be the next security breach headline in the news. However, many organizations still haven’t prioritized security enough to ensure a breach doesn’t happen. In this resource, explore how your organization can stay secure with the right DevSecOps flow, so that the only headlines about your team are positive ones.
Posted: 13 Apr 2021 | Premiered: Apr 13, 2021

TOPICS:  Security
Red Hat

Modern Application Development Security
sponsored by Synopsys
ANALYST REPORT: DevSecOps has moved security front and center in the world of modern development; however, security and development teams are driven by different metrics, making objective alignment challenging. In this exclusive ESG report, explore the most recent trends defining cybersecurity and development teams right now. Save the report here.
Posted: 13 Apr 2021 | Published: 13 Apr 2021

TOPICS:  Security
Synopsys

Day in the Life of a DevSecOps Professional
sponsored by Red Hat
WEBCAST: This video with Red Hat and Portshift explains how Snyk introduces security very early in the CI/CD pipeline, how OpenShift provides support for the pipeline itself and secures the platform, and ways in which Portshift extends security capabilities. View now to learn more.
Posted: 12 Apr 2021 | Premiered: Apr 12, 2021

TOPICS:  Security
Red Hat

Incident Response In The New Work From Home Economy
sponsored by Tanium
WHITE PAPER: This paper discusses the challenges for incident handlers to respond to breaches in the new work-from-home economy and what tactics, techniques, and tools can be used to respond to incidents, including those affecting workloads in the cloud.
Posted: 12 Apr 2021 | Published: 12 Apr 2021

TOPICS:  Security
Tanium

Can Your Security Keep Pace In A Devops Environment?
sponsored by Synopsys
WHITE PAPER: At the heart of DevSecOps is software assurance, which refers to the level of confidence that software will function as intended, as well as the prioritization that the software stay free of exploitable vulnerabilities. Explore how to ensure software assurance in your team’s DevOps strategy in this article. Read more here.
Posted: 12 Apr 2021 | Published: 12 Apr 2021

TOPICS:  Security
Synopsys

Bsimm11 Digest: The Ciso’s Guide To Modern Appsec
sponsored by Synopsys
WHITE PAPER: Many organizations have struggled to ensure their application security is keeping pace with accelerating development cycles. To succeed, application security must be integrated into every stage of the development pipeline—in other words, DevSecOps. This guide sets out to answer the most pressing DevSecOps questions. Find all the answers here.
Posted: 09 Apr 2021 | Published: 09 Apr 2021

TOPICS:  Security
Synopsys

IDC Marketscape: Worldwide Managed Security Services 2020 Vendor Assessment
sponsored by AT&T Cybersecurity
ANALYST REPORT: Download the report today to see what the IDC MarketScape had to say in their worldwide managed security services 2020 vendor assessment.
Posted: 08 Apr 2021 | Published: 08 Apr 2021

TOPICS:  Security
AT&T Cybersecurity

Protecting Cloud Workloads from 2021’s Top Cloud Threat
sponsored by Radware
WHITE PAPER: Get an overview of the security challenges brought about by migrating computing workloads to public cloud environments and learn how Radware addresses those challenges and assists organizations in protecting themselves.
Posted: 07 Apr 2021 | Published: 07 Apr 2021

TOPICS:  Security
Radware

10 Essential Capabilities of aModern SOC
sponsored by Splunk
WHITE PAPER: To build a modern SOC, organizations need a security operations platform that supports 10 key capabilities. Tap into this e-book to find out what they are.
Posted: 07 Apr 2021 | Published: 07 Apr 2021

TOPICS:  Security
Splunk

TOP 50 Security Threats
sponsored by Splunk
EBOOK: Download this e-book for the top 50 security threats from A-Z. All 106 pages will tell you what you need to know about each threat, how the attack happens, and where it comes from.
Posted: 06 Apr 2021 | Published: 06 Apr 2021

TOPICS:  Security
Splunk

Transforming Security In The World Of Digital Transformation
sponsored by VMware International Unlimited Company
EBOOK: Meet the Boss has partnered up with VMware Carbon Black to host a series of virtual roundtable sessions with security executives to explore how they are approaching security challenges at their respective organizations- read on for their stories.
Posted: 01 Apr 2021 | Published: 01 Apr 2021

VMware International Unlimited Company

Impacts of Cyberattacks on IoT Devices
sponsored by Palo Alto Networks
WHITE PAPER: Attack surfaces, threat vectors and vulnerabilities are 3 widely researched topics when it comes to the internet of things (IoT). However, there isn't nearly enough research on the impact successful cyberattacks have on IoT devices. Unit 42, the global threat intelligence team at Palo Alto Networks, took a closer look at this impact.
Posted: 01 Apr 2021 | Published: 01 Apr 2021

TOPICS:  Security
Palo Alto Networks

Royal Holloway: The Computer Misuse Act and the characteristics of convicted hackers
sponsored by ComputerWeekly.com
RESEARCH CONTENT: In this Royal Holloway article, the authors go beyond the perpetuated stereotypes often found in media surrounding hackers by analysing the characteristics of real-life convicted hackers in the UK, who were charged under the Computer Misuse Act
Posted: 01 Apr 2021 | Published: 07 Apr 2021

ComputerWeekly.com

How Security And It Teams Can Manage The Shift To The New Normal
sponsored by Security Scorecard
EBOOK: Is your organization cyber resilient? Take the test on page 6 of this e-book to find out. And if you’re looking for information on how the pandemic has impacted your industry, jump to page 8 for industry specifics.
Posted: 31 Mar 2021 | Published: 31 Mar 2021

TOPICS:  Security
Security Scorecard

Palo Alto Networks IoT Cybersecurity Report
sponsored by Palo Alto Networks
ANALYST REPORT: Read this 451 Business Impact Brief to learn why an agent-based security approach isn't the answer – and why an agentless approach is – when it comes to IoT security.
Posted: 31 Mar 2021 | Published: 31 Mar 2021

TOPICS:  Security
Palo Alto Networks

A Scalable Security Data Platform
sponsored by ChaosSearch
WHITE PAPER: Read this white paper to learn how log analytics platforms like ChaosSearch can help you process huge amounts of log data, use this data to identify and act on threats, and deal with advanced security issues like advanced persistent threats.
Posted: 31 Mar 2021 | Published: 31 Mar 2021

ChaosSearch

CW Middle East - April-June 2021: Qatari financial services regulator launches platform to help combat money laundering
sponsored by ComputerWeekly.com
EZINE: The Qatar Financial Markets Authority is using a digital platform to enable financial services professionals to assess their knowledge of anti-money laundering and combating the financing of terrorism.
Posted: 31 Mar 2021 | Published: 15 Apr 2021

ComputerWeekly.com
1 - 25 of 3257 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences