IT Management  >   Systems Operations  >  

Security

RSS Feed   
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 

Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Reports
126 - 150 of 3441 Matches Previous Page  |  Next Page
The Impact of Malicious Extensions for Chrome and Other Browsers
sponsored by ThreatLocker
RESOURCE: By relying on a web browser provider to improve privacy and security protections, organizations put themselves at risk of a zero-day attack. Read this blog post for specific examples of the impacts of malicious Google Chrome extensions and what your organization can do to better prevent them.
Posted: 15 Jul 2020 | Published: 25 Jun 2020

ThreatLocker

100 Days of Coronavirus (COVID-19)
sponsored by Mimecast
WHITE PAPER: To better understand how the coronavirus pandemic has been (and will be) exploited by malicious users, Mimecast created this analyst report, 100 Days of Coronavirus (COVID-19), which analyzes activity across the first 100 days. Download the report to unlock the key trends and recommendations.
Posted: 15 Jul 2020 | Published: 31 May 2020

Mimecast

Aligning Cyber Risk Management with Business Performance
sponsored by Coalfire
WHITE PAPER: Traditionally, the realm of cybersecurity was considered a technical issue to be solved by technical people. The mindset has changed, and organizations are looking to align cybersecurity objectives with business imperatives. Download this white paper to explore how CISOs can develop a plan to mitigate risks while optimizing resources.
Posted: 15 Jul 2020 | Published: 10 Jul 2020

Coalfire

Less Hackable
sponsored by ThreatLocker
WHITE PAPER: The problem that many businesses face when trying to secure their cyber environments is that they do not understand the risks involved. In this white paper, gain a better understanding of common cyber risks and learn how those risks can be reduced to an acceptable level.
Posted: 15 Jul 2020 | Published: 15 Jul 2020

ThreatLocker

2020 Data Breach Investigations Report
sponsored by Verizon
WHITE PAPER: Each year, Verizon conducts a Data Breach Investigations Report (DBIR) to observe and analyze data breaches and provide industry professionals with key takeaways, industry highlights, relevant best practices, and more. Read on to unlock the complete 119-page report overviewing this year’s findings.
Posted: 15 Jul 2020 | Published: 15 Jul 2020

Verizon

Securing Big Data
sponsored by Thales
WHITE PAPER: In this white paper, explore the results of the various performance benchmarks run by the Vormetric Product Development team on a reference Hadoop configuration secured with Vormetric Transparent Encryption.
Posted: 15 Jul 2020 | Published: 15 Jul 2020

Thales

Quantum Computing and Quantum-Safe Security
sponsored by Thales
WHITE PAPER: Although quantum computer will have many benefits, it will also have the ability to do harm. The very same computing power that allows complex problems to be solved can, in turn, be applied to undermine cybersecurity. In this white paper, learn more about quantum computing and the implications it will have on the cybersecurity landscape.
Posted: 15 Jul 2020 | Published: 15 Jul 2020

Thales

Defense in Depth: Closing the Gaps in Microsoft 365 Security
sponsored by Mimecast
WHITE PAPER: While email platforms like Microsoft 365 offer native security features, their ability to address today’s email-based cyberattacks is often called into question. So, how prepared is your organization to stop these threats? Download this white paper to discover security challenges and recommendations for organizations using Microsoft 365.
Posted: 14 Jul 2020 | Published: 14 Jul 2020

Mimecast

Royal Holloway: Purple team playbook – threat modeling for security testing
sponsored by ComputerWeekly.com
RESEARCH CONTENT: The reality of information security is that it is impossible to completely ensure that an attacker cannot get into the corporate network. Instead, companies should look at how they prepare and react to security attacks by gaining an understanding of how cyber criminals work by combining the talents of red teams and blue teams
Posted: 14 Jul 2020 | Published: 15 Jul 2020

ComputerWeekly.com

Reece Group Protects Endpoints and Automates Threat Management
sponsored by BlackBerry
CASE STUDY: In this case study, follow the Reece Group, a plumbing equipment supplier with a rapidly expanding number of endpoints, as they partner with Blackberry to address their endpoint security and threat management concerns.
Posted: 14 Jul 2020 | Published: 14 Jul 2020

BlackBerry

Vormetric Transparent Encryption for the SAP HANA® Data Management Suite
sponsored by Thales
PRODUCT OVERVIEW: While SAP HANA users realize unmatched operational efficiency, enhanced capabilities are often accompanied by increased risk. In this white paper, take a closer look at Thales’ Vormetric Transparent Encryption (VTE), designed to help organizations control the risks of sensitive data-at-rest within SAP HANA environments.
Posted: 14 Jul 2020 | Published: 31 Jul 2019

Thales

Is Your Front Door Open and Unlocked for Cyber Criminals?
sponsored by Verizon
RESOURCE: When it comes to cyber security, small businesses represent 43% of all data breaches because their false sense of security leads them to not put proper defenses in place. In this blog, learn why cyber criminals often target SMBs before going after larger organizations.
Posted: 14 Jul 2020 | Published: 14 Jul 2020

Verizon

Avoiding Data Leaks with Scalable Encryption and Access Controls
sponsored by Thales
PRODUCT OVERVIEW: Many organizations use Amazon S3 to store their sensitive data. However, in order to secure data in a cloud environment like S3, you need complete control of your data. In this white paper, discover how organizations are ensuring the data stored in their Amazon S3 is safe and complies with the strictest security regulations.
Posted: 14 Jul 2020 | Published: 14 Jul 2020

Thales

Royal Holloway: Secure connected and autonomous vehicles - the long road ahead
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Advances in technology have led to  safety and comfort features being added to vehicles, with ambitious plans for driverless cars and other connected and autonomous vehicle (CAV) systems being developed. This article looks at some of the requirements, constraints and challenges, including two areas of uncertainty: data and software updates.
Posted: 14 Jul 2020 | Published: 14 Jul 2020

ComputerWeekly.com

Brother Secures Access and Reduces Costs with Cloud-based Authentication
sponsored by Thales
CASE STUDY: In order to address the remote access security issues needs of their rapidly expanding support team, Brother Industries began exploring their security options for a partner who would be cost-effective, agile and secure. Download this case study to see how & why Brother partnered with Thales to implement SafeNet Trusted Access (STA).
Posted: 13 Jul 2020 | Published: 13 Jul 2020

Thales

Secure Access to Virtual Environments and Private Clouds
sponsored by Thales
PRODUCT OVERVIEW: As business environments become more distributed, securing and managing the growing population of endpoints presents an increasingly difficult security strategy. In this white paper, take a closer look at the SafeNet Access Management and Authentication offering, designed to deliver secure access to modern environments.
Posted: 13 Jul 2020 | Published: 30 Jun 2020

Thales

Using Network Segmentation and Microsegmentation to Improve Enterprise Defense
sponsored by Guardicore
WEBCAST: Security architects have historically taken an absolute approach to defense. Namely, if they build an impenetrable wall, then no one can get in. The problem is that if a mistake is made and the wall breached, everything behind it is at risk. This webcast covers microsegmentation, which builds many secure compartments rather than one wall.
Posted: 13 Jul 2020 | Premiered: Aug 22, 2019

Guardicore

The Changing Face of Data Security: 2020 Thales Data Threat Report
sponsored by Thales
WHITE PAPER: Thales, in conjunction with IDC, provides a comprehensive Data Threat Report each year designed to analyze the key trends and challenges as they relate to data breaches and securing critical data. Download this year’s Data Threat Report to learn more about the effects of digital transformations, cloud environments, and more.
Posted: 13 Jul 2020 | Published: 31 Mar 2020

Thales

Analyst Report: Governance, Risk, And Compliance Platforms, Q1 2020
sponsored by ServiceNow
WHITE PAPER: In this most recent edition of The Forrester Wave: Governance, Risk and Compliance Platforms, industry experts at Forrester identify and evaluate 12 key GRC platform providers, how they compare to each other, and offers key insights into emerging market trends. Download this report to leverage Forrester’s GRC expertise.
Posted: 13 Jul 2020 | Published: 13 Jul 2020

ServiceNow

Cyberattacks on Mobile Devices are on the Rise
sponsored by Verizon
WHITE PAPER: 5G networks promise increased security, but as it stands now, many organizations need to implement their own mobile security measures. Greater functionality means greater vulnerability, and your network must be ready. This article describes the new threat landscape that arrives with 5G and tells you how your organization can prepare.
Posted: 13 Jul 2020 | Published: 13 Jul 2020

Verizon

DataVisor Scales Multicloud Security & Compliance for Customers
sponsored by Lacework
CASE STUDY: In this case study, discover how DataVisor, a rapidly growing organization that offers AI-based fraud detection and risk management, was able to ensure security, productivity and compliance across their expanding multicloud environment.
Posted: 13 Jul 2020 | Published: 13 Jul 2020

Lacework

The Business of Data Security: 4 Often Overlooked Security Considerations for SMBs
sponsored by Citrix
EBOOK: As SMBs continue to rely on digital channels for the management and storage of critical information, it’s imperative that a data security strategy is implemented to meet increasingly strict security and compliance requirements. With than in mind, download this e-book to uncover 4 often-overlooked data security considerations for SMBs.
Posted: 10 Jul 2020 | Published: 10 Jul 2020

Citrix

Continuous Authentication as the Zero Trust Multiplier
sponsored by BlackBerry
RESOURCE: The spike in remote work as a result of COVID-19 has all but eliminated the existence of organizational perimeters. Luckily, widely embraced approaches like zero trust serve as a powerful foundation for a robust security strategy. In this article, discover why continuous authentication is the logical next step in zero trust approaches.
Posted: 10 Jul 2020 | Published: 14 May 2020

BlackBerry

Using Secure Email Gateway to enhance data security in Microsoft Office 365
sponsored by Clearswift
PRODUCT OVERVIEW: This solution brief examines the common areas of concern when it comes to securing Office 365 and explores how Clearswift’s SEG may be able to help organizations address these concern areas and ensure protection and visibility across their platform.
Posted: 10 Jul 2020 | Published: 10 Jul 2020

Clearswift

Cazena Secures Massive Cloud Data Lakes with Lacework
sponsored by Lacework
CASE STUDY: Learn how Lacework helped Cazena, a SaaS company that provides cloud-based data lakes as a software service, reduce noise generated by their security stack, identify anomalies in customer environments, increase operational efficiency and more.
Posted: 10 Jul 2020 | Published: 10 Jul 2020

Lacework
126 - 150 of 3441 Matches Previous Page    4 5 6 7 8 9    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info