IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 

Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Reports
1 - 25 of 3291 Matches Previous Page  |  Next Page
Key Benefits of Taking Your SIEM To The Cloud
sponsored by Splunk
WHITE PAPER: Explore 5 benefits of taking your SIEM platform to the cloud. As a bonus, uncover two case studies to see how organizations have gained key advantages, like lowering operational costs, increasing focus on strategic initiatives, and more.
Posted: 23 Jan 2018 | Published: 03 Aug 2017

Splunk

Software as a SIEM: Improve Your Security Posture by Using Splunk as your SIEM
sponsored by Splunk
WHITE PAPER: Businesses now require tools that can be used for rapid response detection, incident investigation and coordination of CSIRT breach scenarios. A tool, like Splunk software. Read this white paper and explore what this innovative SIEM has to offer.
Posted: 23 Jan 2018 | Published: 23 Jan 2018

Splunk

The Truth about Cloud Security
sponsored by Citrix
EBOOK: The first impression that cloud computing left on people was that the technology was filled with security flaws. While the risks are real, the cloud is more secure now than most people think. Access this e-book to learn about using the cloud to protect your most sensitive data.
Posted: 23 Jan 2018 | Published: 21 Dec 2017

Citrix

Lessons Learned from a Decade of Data Breaches
sponsored by F5 Networks
RESEARCH CONTENT: As cybercrime grows, how can you better protect your business? The answer is to start by better understanding how these criminals target their victims, and how they get in. In this research report find out what aspect of your IT environment is being targeted by criminals, how criminals choose their victims, and more.
Posted: 23 Jan 2018 | Published: 30 Nov 2017

F5 Networks

Cross-Site Scripting Attacks: Identify and Defend against Malicious Code
sponsored by Whitehat Securities
VIDEO: Learn about a proactive security and code testing platform that enables you to monitor large amounts of code across 5 common programming languages so that you can identify and resolve incidents of malicious code across web and mobile apps faster.
Posted: 22 Jan 2018 | Premiered: 16 Jan 2018

Whitehat Securities

5 Security Tips to Work on a Personal Device
sponsored by Citrix
WHITE PAPER: Mobility and personal devices are defining factors of the future workforce. Read this report for five tips to help you secure your personal device at work and minimize risk for yourself and your business. You will also see how employees act differently when using personal versus work devices, the importance of updating devices, and more.
Posted: 22 Jan 2018 | Published: 16 Nov 2017

Citrix

Secure Coding Practices: Avoid OS Command Injection Attacks
sponsored by Whitehat Securities
VIDEO: Watch this webcast to learn what an OS Command Injection does, where you can find it, and what damage it can do. Then, explore some best practices for avoiding, or mitigating the damage of these attacks.
Posted: 19 Jan 2018 | Premiered: 16 Jan 2018

Whitehat Securities

A WhiteHat Sentinel Product Family Overview
sponsored by Whitehat Securities
WHITE PAPER: In this white paper learn how WhiteHat Sentinel, a SaaS product suite combines application scanning with one of the world's largest threat research team to provide you with 3 different types of analysis to ensure your apps are safe, no matter where they live.
Posted: 19 Jan 2018 | Published: 30 Dec 2016

Whitehat Securities

Computer Weekly – 23 January 2018: Will banking regulations create a new Big Bang?
sponsored by ComputerWeekly.com
EBOOK: In this week's Computer Weekly, we look at two new financial services regulations, PSD2 and open banking, which promise to revolutionise the industry by opening up customer data. We ask security researchers to explain the Spectre and Meltdown processor flaws. And we examine the NVMe protocol and its likely benefits for storage. Read the issue now.
Posted: 19 Jan 2018 | Published: 19 Jan 2018

ComputerWeekly.com

The DevSecOps Global Skills Survey
sponsored by Veracode, Inc.
RESEARCH CONTENT: This DevSecOps Global Skills Survey looks at the responses from 400 DevOps professionals on the state of DevOps workforces and education. Gain insight into how developers, IT ops, QA professionals, and even security view current DevOps and DevSecOps practices.
Posted: 18 Jan 2018 | Published: 18 Jan 2018

Veracode, Inc.

Why Mobile Device Event Correlation Matters
sponsored by SyncDog
WHITE PAPER: A recent study by Gartner reveals 3 key challenges enterprises will deal with as more personal phones and tablets invade the workplace: governance and compliance, mobile device management, and security. Learn how to deal with these challenges head-first inside this white paper.
Posted: 18 Jan 2018 | Published: 18 Jan 2018

SyncDog

Getting the Board on Board with Application Security
sponsored by Whitehat Securities
WHITE PAPER: CISOs need to make sure their business considers AppSec from the highest levels. Review these 4 recommendations to improve your business' AppSec and get the support you need.
Posted: 18 Jan 2018 | Published: 31 Dec 2017

Whitehat Securities

Innovation Insight for Security Orchestration, Automation and Response
sponsored by ServiceNow
RESEARCH CONTENT: This Gartner report analyzes security orchestration, automation, and response (SOAR) tools and explores how they can help you improve security operations efficiency, quality and efficacy for your organization.
Posted: 18 Jan 2018 | Published: 30 Nov 2017

ServiceNow

Financial Institution Security
sponsored by enSilo
RESOURCE: Reviewing and selecting endpoint products to protect a financial institution's servers and ATM's is an extensive process.This resource offers strategies for improving security and downtime within financial institutions.
Posted: 18 Jan 2018 | Published: 18 Jan 2018


Two-Factor Authentication Evaluation Guide
sponsored by Duo Security
EBOOK: This e-book details a comprehensive set of criteria to customize your evaluation to your organization's security needs and how to determine your ROI when deploying your two-factor authentication tools.
Posted: 18 Jan 2018 | Published: 18 Jan 2018

Duo Security

Four CISO Tribes and Where to Find Them
sponsored by Synopsys
WHITE PAPER: In this research content, gathered based on interviews with 25 CISOs, discover 4 distinct approaches to the role of CISO. Learn what makes each one distinct, how you can use this information to push your own career forward, and more.
Posted: 18 Jan 2018 | Published: 29 Dec 2017

Synopsys

Getting Started with Secure DevOps
sponsored by Veracode, Inc.
WEBCAST: Find out how to extend the collaborative efforts between developers and IT operations to your security pros as well so that you can shift towards a DevSecOps culture and incorporate app security as early and often into the development lifecycle as you can.
Posted: 17 Jan 2018 | Premiered: May 25, 2017

Veracode, Inc.

Your Chance to Get It Right: Five Keys to Building AppSec into DevOps
sponsored by Veracode, Inc.
WHITE PAPER: Watch this webcast to learn how to get app security pros involved in the collaborative DevOps culture by helping developers speak their language. You'll find 5 steps your company can take to achieving secure DevOps inside.
Posted: 17 Jan 2018 | Published: 17 Jan 2018

Veracode, Inc.

Webinar: What Machine Learning Can (and Can't) do to Help Solve Today's Mobile Security Problems
sponsored by Lookout
WEBCAST: Watch this webinar to discover what machine learning can and can't do to help solve today's top mobile security concerns.
Posted: 17 Jan 2018 | Premiered: Jan 17, 2018

Lookout

Unified MTD + MARS is the Best Practice for Mobile Security
sponsored by Lookout
WEBCAST: Download this webcast to understand the full mobile risk matrix and discover how mobile threat defense (MTD) combined with mobile app reputation services (MARS) can protect your organization from mobile threats to apps, devices, networks and more.
Posted: 17 Jan 2018 | Premiered: Jan 17, 2018

Lookout

Case Study: Container Monitoring and Security
sponsored by Sysdig
EBOOK: Moving Docker into production is still equal parts art and science. Once your applications are in production you need to secure them. This case study shows how adopting Kubernetes and Docker will have a significant impact on your monitoring and security approach.
Posted: 16 Jan 2018 | Published: 16 Jan 2018

Sysdig

The Essential Guide to Securing Remote Access
sponsored by Duo Security
WHITE PAPER: New threats center on gaining remote access to your apps and data – whether it's with stolen passwords or exploited known vulnerabilities targeting out-of-date devices. Access this resource to uncover the different threats, using real-world examples, and uncover security best practices to help your organization maintain secure remote access.
Posted: 16 Jan 2018 | Published: 16 Jan 2018

Duo Security

The ROI of AppSec: Getting your Money's Worth from your AppSec Program
sponsored by Veracode, Inc.
WEBCAST: Access this webcast to gain a better understanding of the impact of application security on the end-to-end software development value chain. Then, discover how much it really cost to fix security vulnerabilities in relation to application development.
Posted: 16 Jan 2018 | Premiered: Jan 16, 2018

Veracode, Inc.

Updates: The next evolution of operating systems
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide we take a look at how operating systems are evolving with the help of continuous updates. Learn about how the Spectre and Meltdown microprocessor flaws have led to improved, more secure processors being released and how Microsoft is evolving its Windows desktop operating system.
Posted: 16 Jan 2018 | Published: 16 Jan 2018

ComputerWeekly.com

Market Guide for Mobile Threat Defense Solutions
sponsored by Lookout
WHITE PAPER: Download this market guide for mobile threat defense solutions to discover how they can protect your organization at the device, network and application level and compare vendors in the space.
Posted: 16 Jan 2018 | Published: 22 Aug 2017

Lookout
1 - 25 of 3291 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement