IT Management  >   Systems Operations  >  

Security

RSS Feed   
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 

Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Reports
1 - 25 of 3232 Matches Previous Page  |  Next Page
Security Controls for Effective Micro-Segmentation
sponsored by ShieldX
WHITE PAPER: With cyberattacks becoming increasingly difficult to identify and mitigate, organizations shift towards Forrester’s Zero Trust Model to protect their post-perimeter environments against lateral movements. In this white paper, explore security controls and evaluation criteria for the foundational elements of your zero-trust strategy.
Posted: 23 Jan 2020 | Published: 30 Sep 2017

ShieldX

Lattes, Lunch, and VPNs: Securing Remote Workers the Right Way
sponsored by Malwarebytes
WHITE PAPER: In this short story, following the journey of Olivia and Luciana as they face the cybersecurity threats associated with remote workers, VPNs and cloud platforms to establish the necessary technologies and employee enablement to overcome these challenges and reshape their security strategy.
Posted: 23 Jan 2020 | Published: 23 Jan 2020

Malwarebytes

Interview with Identity Expert
sponsored by Mitek Systems, Inc.
WHITE PAPER: In this Q and A, the head of risk and payments at an American money transfer company sits down with the customer success leader at Mitek to talk about role of identity verification in innovation and how increasing regulations will affect financial institutions. Read on to learn more.
Posted: 23 Jan 2020 | Published: 21 Jan 2020


How to Build a Winning Cybersecurity Team
sponsored by Global Knowledge
WHITE PAPER: Just like a sports team, cybersecurity teams need to be carefully built and managed in order to reach peak performance. Effective cybersecurity teams also require adequate processes and technologies to support their efforts. So, what should you consider when building a winning cybersecurity team? Read on to find out.
Posted: 23 Jan 2020 | Published: 23 Jan 2020

Global Knowledge

Asurion developers choose Snyk for developer-focused approach and for its product vision and innovation
sponsored by Snyk
CASE STUDY: Most companies use a huge amount of open source code in their development process – without the proper security channels set up for managing and protecting their data. Here, a company with microservices-based architecture found an open source-specific security tool that met their data management needs. Read the case study now to learn how.
Posted: 23 Jan 2020 | Published: 23 Jan 2020

Snyk

Securing Open Source Libraries: 2019 Update
sponsored by Snyk
ANALYST REPORT: In this 79-page eBook, find an in-depth analysis on the current state of open source security. The eBook features insights into finding and fixing vulnerable packages, integrating testing to prevent vulnerabilities, and choosing a SCA solution. Access the full guide here.
Posted: 23 Jan 2020 | Published: 23 Jan 2020

Snyk

The State of Kubernetes Adoption and Security: Alcide 2019 Survey Report
sponsored by Alcide
ANALYST REPORT: Download your copy of The State of Kubernetes Adoption and Security to learn about Kubernetes adoption changes year-over-year, evolving practices around Kubernetes use and security, and key challenges faced by those with Kubernetes experience as well as those starting out.
Posted: 23 Jan 2020 | Published: 23 Jan 2020

TOPICS:  Security
Alcide

Mobile Verify
sponsored by Mitek Systems, Inc.
DATA SHEET: Through advanced machine-learning algorithms, identity verification enables businesses to authenticate their digital users’, empowering them to enhance customer experience and data security. Read this data sheet to explore the science behind Mitek’s Mobile Verify digital identity verification tool and how it works.
Posted: 22 Jan 2020 | Published: 22 Jan 2020


The Future of Identity
sponsored by Mitek Systems, Inc.
WHITE PAPER: Identity will be far different in the years ahead than in all the years before. What’s changing? For better? For worse? In this white paper, discover Mitek’s point of view about today’s state of identity and how to steer toward a more advantageous future of identity.
Posted: 22 Jan 2020 | Published: 22 Jan 2020


Leveraging Threat Intelligence for Efficient Threat Hunting
sponsored by ThreatQuotient
WEBCAST: In this webinar, ThreatQuotient displays how threat intelligence can be used to help make the threat hunting process more efficient and prioritize threat hunting activities.
Posted: 22 Jan 2020 | Premiered: Jan 22, 2020

ThreatQuotient

Building Your Kubernetes AppSecStrategy
sponsored by Snyk
WEBCAST: According to Gartner research, by 2023, over 70% of global organizations will be using containers in production services. Kubernetes security, then, is a top priority, especially as third-party components introduce vulnerabilities. Watch this webinar to learn three lessons to improve your organization’s application security strategies.
Posted: 22 Jan 2020 | Premiered: Oct 17, 2019

TOPICS:  Security
Snyk

Shifting Docker security left
sponsored by Snyk
EBOOK: According to Snyk’s data, 57% of developers use containers in their everyday work. But there’s a dark side to the popularity of containers: 50% of the most popular free certified Docker images have known vulnerabilities. What are some quick fixes to improve security? For Docker security recommendations and tips, read the full eBook here.
Posted: 22 Jan 2020 | Published: 22 Jan 2020

TOPICS:  Security
Snyk

Emerging Technology Analysis: SOAR Solutions
sponsored by ThreatQuotient
WHITE PAPER: Although SOAR and SIEM share similar security capabilities, they are distinct markets unlikely to consolidate. However, technology leaders at SOAR providers need to understand this distinction in order to build upon existing SIEM services. This deep dive from Gartner focuses on SOAR and offers recommendations for SOAR providers.
Posted: 22 Jan 2020 | Published: 07 Dec 2018

ThreatQuotient

Threats of Surveillance Tools: Spyware and Stalkerware
sponsored by RSA Conference
PODCAST: Digital monitoring of workers, children and spouses is more commonplace than ever. But what happens when the line between monitoring and spying becomes blurred? Tune in to this RSAC podcast as two security experts share the work they’ve been doing to help protect victims and their personal data from unwanted surveillance.
Posted: 21 Jan 2020 | Premiered: Dec 16, 2019

RSA Conference

Leading Change for CISOs: Embedding a Secure Culture
sponsored by RSA Conference
WEBCAST: There was a time when cybersecurity was strictly a concern for IT departments, but those days are long gone. In today’s far-reaching threat environment, cybersecurity needs to be baked into the very fabric of a company. In this webcast, learn how organizations can leverage organizational change models for an all-inclusive culture of security.
Posted: 21 Jan 2020 | Premiered: Oct 2, 2019

RSA Conference

ThreatQ for Government Agencies
sponsored by ThreatQuotient
DATA SHEET: As government agencies are considered critical infrastructure, they are under constant attack from hackers, political activists and foreign state-sponsored actors. The first step to detecting, responding and recovering from incidents is finding a way to increase situation awareness. Download this brief to learn more.
Posted: 21 Jan 2020 | Published: 21 Jan 2020

ThreatQuotient

The Total Economic Impact™ Of Snyk
sponsored by Snyk
RESEARCH CONTENT: The global security industry is struggling to keep up with rapidly evolving and unpredictable security threats – and many of these threats can be sourced to open source vulnerabilities. In this report, Forrester examines the TEI™ and ROI of an open source security platform. Check out the report here.
Posted: 21 Jan 2020 | Published: 29 Nov 2019

Snyk

PCI Deep Dive Webinar: Software Security Framework to Replace PA-DSS
sponsored by Snyk
WEBCAST: Developing secure payment software can be tricky, especially when dealing with third-party components. PCI secure software frameworks offer clear procedures, tools, and recommendations for compliancy. In this webinar, four experts dive into how to ensure PCI compliance and protect your organization from vulnerabilities. Watch the webinar now.
Posted: 21 Jan 2020 | Premiered: Jan 21, 2020

Snyk

Protecting Intellectual Property: Black, White, and Shades of Gray
sponsored by InteliSecure
WHITE PAPER: Complying with data privacy regulations is important, but rarely is regulated data the only data worth protecting. Losses associated with regulatory fines present far less risk than the potential losses associated with intellectual property theft. In this white paper, learn how a data protection program can help you protect even unstructured IP.
Posted: 21 Jan 2020 | Published: 21 Jan 2020

InteliSecure

Onboarding IT Service Providers Shouldn’t be Complicated, Costly, or Risky
sponsored by Tehama
WHITE PAPER: Enterprises need to secure, accelerate, and simplify how they onboard external third parties and provide access to critical and vulnerable systems while mitigating the cybersecurity risks. This white paper goes in-depth into the associated risks and outlines potential tactics for ensuring security during the onboarding process.
Posted: 20 Jan 2020 | Published: 31 Jan 2019

Tehama

Pervasive Protection: Enabling Secure Work from Anywhere
sponsored by Malwarebytes
RESOURCE: The digitally transformed workplace consists of employees that expect to get their work done anywhere. This mix of onsite and remote workers, as well as the explosion of devices and applications they now use, presents a security challenge. In this infographic, find out what security managers need to know to defend against today’s cyberattacks.
Posted: 20 Jan 2020 | Published: 20 Jan 2020

Malwarebytes

Auth0 Case Study: Developer Security at High-Growth Scale
sponsored by Snyk
CASE STUDY: For an organization that focuses on authentication and authorization processes, security is the number one priority – teams must be able to identify vulnerabilities before attackers do. See how this CIAM platform company made that possible in this open source security case study. Click here to read more.
Posted: 20 Jan 2020 | Published: 20 Jan 2020

Snyk

Buyer’s Guide to Threat Intelligence Platforms
sponsored by ThreatQuotient
WHITE PAPER: As organizations begin to build their threat intelligence operations, they must consider how they will organize their data. Threat intelligence platforms (TIPs) give IT teams the visibility required to make the most of existing resources. Read this white paper to learn more about TIP, and how to go about making an informed buying decision.
Posted: 20 Jan 2020 | Published: 31 Mar 2018

ThreatQuotient

Comprehensive Lifecycle Management
sponsored by Insight
WEBCAST: The expectations of today’s workforce combined with the advancements in technology, means there are more mobile devices than ever before. While this is good for productivity, it creates its own set of security challenges. In this webcast, learn how to better protect your organization with Microsoft’s EM+S Solution and Insight.
Posted: 20 Jan 2020 | Premiered: Jan 20, 2020

Insight

Cisco Umbrella and Meraki MR – Effective protection for corporate and guest Wi-Fi
sponsored by Cisco Umbrella
DATA SHEET: In this solution brief, take a closer look at the integration of Cisco Umbrella and Meraki MR for simple and effective protection for corporate and guest Wi-Fi. Discover how it works and why you should consider deploying this integration.
Posted: 17 Jan 2020 | Published: 17 Jan 2020

Cisco Umbrella
1 - 25 of 3232 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info