IT Management  >   Systems Operations  >  

Security

RSS Feed   
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 

Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Reports
101 - 125 of 3206 Matches Previous Page  |  Next Page
SIEM for Beginners
sponsored by AT&T Cybersecurity
RESOURCE: Security information and event management (SIEM) is all about observing your network through a wide lens and acting accordingly to mitigate risks and protect your organization. Read this beginner’s guide to help you understand the basics of SIEM and why it’s a critical step towards protecting your business.
Posted: 02 Jan 2020 | Published: 02 Jan 2020

AT&T Cybersecurity

Overcoming Cybersecurity Barriers in the Healthcare Industry
sponsored by WhiteHat Security
WHITE PAPER: A data breach in the healthcare industry would be devastating — and expensive. The average total cost of a data breach in the industry is $6.45 million. This white paper identifies the biggest cybersecurity barriers in the healthcare industry. Read how to best prepare for the worst.
Posted: 02 Jan 2020 | Published: 02 Jan 2020

TOPICS:  Security
WhiteHat Security

Customer Case Study: Healthcare: Compliance and Confidentiality
sponsored by WhiteHat Security
CASE STUDY: For a large HMO, a scalable scanning solution is vital to the health of the organization – but this solution often entails an enormous team of application security experts on the scene. One major HMO used WhiteHat to adopt an accessible solution that ensured compliance and reduced security risk. Read the case study to learn more.
Posted: 02 Jan 2020 | Published: 02 Jan 2020

TOPICS:  Security
WhiteHat Security

Panda Labs Annual Report: Cybersecurity Predictions
sponsored by Panda Security
RESEARCH CONTENT: Download this report to see how cybersecurity has evolved since 2017 with cybercrime, attacks, and threats. See how future security trends and threat hunting can help your organization reduce the risk of a vicious attack.
Posted: 31 Dec 2019 | Published: 03 Aug 2018

Panda Security

2018 Global Study on Application Security
sponsored by Arxan
RESEARCH CONTENT: Ponemon Institute conducted a survey to understand the risk that unprotected applications pose to businesses when running in unsecured environments and how organizations are addressing this risk in practice. In this research report, learn about key findings from the survey.
Posted: 31 Dec 2019 | Published: 31 May 2018

Arxan

PandaLabs Annual Report 2018
sponsored by Panda Security
RESEARCH CONTENT: As technology continues to advance, cybercriminals are leveraging new capabilities into more sophisticated cyberattacks. PandaLabs, Panda Security's anti-malware laboratory, tracks threat data in real time and has compiled it into a report. Download the report for highlights of 2018's cybersecurity trends, as well as emerging threats for 2019.
Posted: 31 Dec 2019 | Published: 30 Nov 2018

Panda Security

Sonatype Nexus Lifecycle Review From A Customer
sponsored by Sonatype
CASE STUDY: Accuracy matters in security management. As it happens, security management at a reasonable cost matters quite a bit too. Luckily, select security platforms offer both. Sonatype’s Nexus Lifecycle ensures quality open source software security. Read how Sonatype helped one business improve their proactivity in this IT Central Station review.
Posted: 30 Dec 2019 | Published: 30 Dec 2019

Sonatype

WhiteHat Sentinel Mobile: Solution Brief
sponsored by WhiteHat Security
WHITE PAPER: Staying proactive is a vital to the health of your application development. Application security prioritizes automation and continuous scanning so that any vulnerabilities are dealt with before they become full-fledged threats. Read WhiteHat’s solution brief to see how SaaS platforms address security risks in mobile application development.
Posted: 30 Dec 2019 | Published: 30 Dec 2019

TOPICS:  Security
WhiteHat Security

Customer Case Study: Document Logistix Uses WhiteHat SAST and DAST to Ensure Security of Sensitive Customer Data
sponsored by WhiteHat Security
CASE STUDY: The document management business can be a vulnerable operation. Data protection is high-risk, and compliance with security regulations, such as GDPR, is a must. A document management company used WhiteHat Sentinel for application security. Learn how WhiteHat created a more secure product design for the company by reading the case study now.
Posted: 30 Dec 2019 | Published: 30 Dec 2019

TOPICS:  Security
WhiteHat Security

Simplify Your Application Security
sponsored by WhiteHat Security
WHITE PAPER: Application development is slowly but surely becoming a more secure process thanks to DevSecOps. But with added security comes slower productivity and added pressures to already limited resources. WhiteHat Sentinel introduces application security fit for the DevOps cycle. Read the white paper here to find out how.
Posted: 30 Dec 2019 | Published: 30 Dec 2019

WhiteHat Security

Cutting Through the Haze: 3 Steps to Gain Control of Cloud Security
sponsored by FireMon
WHITE PAPER: The cloud is a notable business advantage, but it does bring numerous security concerns. In this e-book, discover 3 steps to help you gain control of cloud security in hybrid enterprises.
Posted: 27 Dec 2019 | Published: 27 Dec 2019

FireMon

State of the Internet: Financial Services Attack Economy
sponsored by Akamai Technologies
WHITE PAPER: The financial service industry faces a wide area of cybersecurity threats, including password problems, phishing, mobile application attacks, and more. Being aware of the most current attack trends can be critical for the security of sensitive data. This research report breaks down the specific challenges and threats within the industry.
Posted: 27 Dec 2019 | Published: 31 Jul 2019

Akamai Technologies

CISO’s Playbook to Cloud Security
sponsored by Lacework
WHITE PAPER: As organizations continue to implement cloud technologies and capabilities, they introduce additional security concerns that the CISO needs to consider. In this playbook, uncover the steps and strategies IT security leaders should consider in order to achieve these positive outcomes.
Posted: 27 Dec 2019 | Published: 27 Dec 2019

Lacework

Beyond SD-WAN: Zero Trust Security and the Internet as Corporate WAN
sponsored by Akamai Technologies
WHITE PAPER: Read this white paper to learn why Internet is the corporate WAN of the near future, and how enabling safe traffic to go straight to the Internet, blocking bad traffic, and only proxying risky traffic, delivers simplified security, lower latency and better performance, fewer broken web pages and applications.
Posted: 27 Dec 2019 | Published: 30 Jun 2019

Akamai Technologies

Top 10 cyber crime stories of 2019
sponsored by ComputerWeekly.com
EGUIDE: Once again, in 2019 the cyber threat landscape proved the old biblical adage correct – there is nothing new under the sun. Data breaches were 10 a penny – indeed, in some cases they can actually be bought for pennies. Here are Computer Weekly's top 10 cyber crime stories of 2019.
Posted: 27 Dec 2019 | Published: 27 Dec 2019

ComputerWeekly.com

Intelligent Security Starts at the Edge
sponsored by Akamai Technologies
DATA SHEET: In Gartner’s most recent Magic Quadrant installment for Web Application Firewalls (WAF), they named Akamai a Leader for the third year in a row. This white paper provides an overview of the benefits of WAF, and highlights Akamai’s approach to WAF. Read on to get started.
Posted: 23 Dec 2019 | Published: 23 Dec 2019

Akamai Technologies

State of the Internet Security: A Year in Review
sponsored by Akamai Technologies
WHITE PAPER: As the end of 2019 draws near, you can look back and examine the research Akamai has done over the last 12 months. Download the State of the Internet Security report to see the impact various attacks had on organizations in 2019 and how you can prep for 2020.
Posted: 23 Dec 2019 | Published: 23 Dec 2019

Akamai Technologies

Software Composition Analysis: Getting to the signal through the noise
sponsored by Sonatype
RESOURCE: Software composition analysis (SCA) is back. But what is it, again? As innovation centers around open source software, security threats need to be assessed, monitored, and quashed. This is where SCA comes in. Read this report to learn what exactly SCA is and how it dismantles major security threats in open source software –with automated ease.
Posted: 23 Dec 2019 | Published: 31 May 2019

Sonatype

Open Source Security Intelligence
sponsored by Sonatype
CASE STUDY: Is open source security a priority for your organization? If not, be sure to add it to your list of resolutions for 2020. This case study compares how two top vendors – Nexus Intelligence with Black Duck – address common security threats for open source components. Read the study now to see who came out on top.
Posted: 23 Dec 2019 | Published: 23 Dec 2019

Sonatype

Software Composition Analysis: An examination of critical SCA concepts
sponsored by Sonatype
WEBCAST: Based on Sonatype’s data, around 313,000 java components are downloaded each year. Of those downloads, 27,704 are components with known vulnerabilities – that’s 8.8%. With software composition analysis (SCA), security integrates seamlessly with open source innovation. Check out Sonatype’s webinar to find out how.
Posted: 23 Dec 2019 | Premiered: Aug 30, 2019

TOPICS:  Java | Security
Sonatype

Top 10 cyber security stories of 2019
sponsored by ComputerWeekly.com
EGUIDE: 2019 was a busy year in the world of cyber security, with big stories around network security, data privacy and protection, and the state of General Data Protection Regulation compliance all hitting the headlines – and that's before we even get started on the issue of cyber crime. Here are Computer Weekly's top 10 cyber security stories of 2019.
Posted: 23 Dec 2019 | Published: 23 Dec 2019

ComputerWeekly.com

Security Starts at the Edge
sponsored by Akamai Technologies
WHITE PAPER: Whether you’re a leader of a large enterprise or a smaller business, part of your ongoing security, risk management, and compliance strategy will be sourcing the most effective security solution for your business. In this guide, for learn how you can find the right solution for your business to scale resilience, build trust, and drive revenue.
Posted: 23 Dec 2019 | Published: 23 Dec 2019

Akamai Technologies

Preventing Unknown, Zero-Day Attacks
sponsored by Checkpoint Software Technologies
WHITE PAPER: An organizations ability to win the cybersecurity battle depends on how well they prevent unknown, zero-day threats. In this white paper, learn how threat prevention technology, and a consolidated security architecture can help to protect your organization’s attack vectors.
Posted: 23 Dec 2019 | Published: 23 Dec 2019

Checkpoint Software Technologies

Sonatype Nexus Lifecycle and WhiteSource: Buyer's Guide and Reviews October 2019
sponsored by Sonatype
RESOURCE: Software composition analysis (SCA) is new to the IT scene – sort of. SCA gives users visibility into security risks in open source components. SCA used to be waterfall-native, but now, with newly automated processes, SCA is back with a DevOps foundation. Check out this report for a comparison of top SCA vendors.
Posted: 23 Dec 2019 | Published: 31 Oct 2019

Sonatype

Putting Cybercrime in Perspective
sponsored by InteliSecure
WHITE PAPER: When it comes to cybercrime, it can difficult to separate hype from the truth. This white paper puts these threats into perspective to help you to understand your organization’s risk appetite, the cost of data loss and the steps your organization needs to take to reduce cybercrime impact.
Posted: 23 Dec 2019 | Published: 23 Dec 2019

InteliSecure
101 - 125 of 3206 Matches Previous Page    3 4 5 6 7 8    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info