IT Management  >   Systems Operations  >  

Security

RSS Feed   
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 

Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Reports
126 - 150 of 3317 Matches Previous Page  |  Next Page
Midstream Oil and Gas Industry: Improving ICS Visibility Boosts Operations & Cyber Security
sponsored by Nozomi Networks
WHITE PAPER: Read this white paper to learn how to gain operational visibility, reliability and cybersecurity using a real-time ICS monitoring and threat detection solution.
Posted: 24 Sep 2019 | Published: 24 Sep 2019

Nozomi Networks

Exploring Coordinated Disclosure
sponsored by Veracode, Inc.
RESEARCH CONTENT: Veracode commissioned 451 Research to gain a deeper understanding of the motivations of security researchers, actions when a vulnerability is identified, timing for disclosure, desired outcomes, how organizations structure disclosure policies, and the effectiveness of bug bounties. Read on to learn more.
Posted: 24 Sep 2019 | Published: 24 Sep 2019

Veracode, Inc.

Threat Intelligence: Far-Fetched Idea or Must-Have Security Tactic? How Every Ciso Can Make It a Priority
sponsored by Mimecast
WHITE PAPER: If threat intelligence isn't part of your cyber resilience strategy in some capacity, you have a massive gap on your hands. And you may be blindsided by a phishing attack, malware incident or worse. In this white paper, learn how CISOs can make threat intelligence a priority in their cyber resilience planning.
Posted: 24 Sep 2019 | Published: 24 Sep 2019

Mimecast

Why Should I Care About SSL/TLS Decryption?
sponsored by Gigamon
WEBCAST: On the heels of the Equifax breach, we are reminded of the importance of efficient decryption for effective threat detection. In this webcast, Druce McFarlane, Director of Product Management at Gigamon, discusses how TLS/SSL encryption has become a threat vector, and how to make sure your detection tools are working at their greatest capacity.
Posted: 24 Sep 2019 | Premiered: Sep 24, 2019

Gigamon

The State of Detection Report 2019
sponsored by Fidelis
ANALYST REPORT: Cybersecurity hasn't gotten any easier. That should hardly be a revelation to security professionals in the field, who every year are seeing their cyber terrain grow larger and larger. In The State of Threat Detection Report 2019, explore Fidelis' findings from a survey of 300 cybersecurity professional on key cybersecurity challenges.
Posted: 24 Sep 2019 | Published: 24 Sep 2019

Fidelis

The Global Risks Report 2019 14th Edition
sponsored by Nozomi Networks
ANALYST REPORT: Technology continues to play a profound role in shaping the global risks landscape. A top technological concern is cyberattacks which pose risks to critical infrastructure. In The Global Risk Report 2019, learn why the vulnerability of critical technological infrastructure is a growing national security concern.
Posted: 24 Sep 2019 | Published: 24 Sep 2019

Nozomi Networks

The Future of Security Operations
sponsored by IBM
WHITE PAPER: Download the "The Future of Security Operations" for an explanation of how security orchestration and automation can help security teams address the skills shortage, alert overload, and increasingly sophisticated cyberattacks.
Posted: 24 Sep 2019 | Published: 24 Sep 2019

IBM

Automated Threat Detection, Threat Hunting, and Response Platform
sponsored by Fidelis
WEBCAST: In this on-demand demo, see how Fidelis Elevate can help your organization shift from a prevention-focused approach to one that prioritizes detection and response.
Posted: 23 Sep 2019 | Premiered: Sep 23, 2019

Fidelis

Cybercrime Report 2019
sponsored by LexisNexis Risk Solutions
RESEARCH CONTENT: Get information (January - June 2019) on cybercrime trends worldwide and the multi-layered prevention strategies needed to protect your business.
Posted: 23 Sep 2019 | Published: 30 Jun 2019

LexisNexis Risk Solutions

Solving the Cyber Skills Crunch: A New Model for Cybersecurity
sponsored by Cyberfort
WHITE PAPER: Organizations are continuing to struggle to attract cybersecurity staff with the right level of experience and knowledge at the right price. An external cyber partner can help organizations to bypass this ongoing cyber skills shortage. In this white paper, learn how partnering with experienced cybersecurity experts can help your businesses.
Posted: 23 Sep 2019 | Published: 23 Sep 2019

Cyberfort

Fidelis Deception Demo
sponsored by Fidelis
WEBCAST: Download this video for an overview of Fidelis Deception. In the video, you'll learn how to use Fidelis to map your network and understand your terrain, how to deploy deception and more.
Posted: 23 Sep 2019 | Premiered: Sep 23, 2019

Fidelis

Security Podcast: Is Fax the Achilles Heel of Your Compliance and Cybersecurity Plan
sponsored by J2 Cloud Services
PODCAST: Today, many organizations have little to no security and compliance strategies for fax machines, printers or services. This represents a very real vulnerability. In this podcast, Aaron Goldberg, CEO of Content 4 IT and Brad Spannbauer, Senior Director of Product Management at J2 Cloud Services, discuss 5 fax security disasters in the making.
Posted: 23 Sep 2019 | Premiered: Sep 23, 2019

J2 Cloud Services

Is Fax the Achilles Heel of Your Compliance and Cybersecurity Plan
sponsored by J2 Cloud Services
WEBCAST: Today, many organizations have little to no security and compliance strategies for fax machines, printers or services. This represents a very real vulnerability. In this webcast, Aaron Goldberg, CEO of Content 4 IT and Brad Spannbauer, Senior Director of Product Management at J2 Cloud Services, discuss 5 fax security disasters in the making.
Posted: 23 Sep 2019 | Premiered: Sep 23, 2019

J2 Cloud Services

Webinar: Pages from the Playbook – Building the MITRE ATT&CK™ Framework into your Incident Response
sponsored by IBM
WEBCAST: In this session, Craig Roberts, Solutions Architect at IBM Security, will explain Resilient's approach to ATT&CK and demonstrate how it can be used to investigate and remediate a security incident in coordination with QRadar, the Hybrid Analysis sandbox from CrowdStrike and the MISP threat intelligence platform.
Posted: 23 Sep 2019 | Premiered: Sep 23, 2019

IBM

MicroScope – October 2019: What's next for the channel?
sponsored by MicroScope
EZINE: The fourth quarter is the busiest in the channel, and we get an idea of which technologies should be selling strongly
Posted: 23 Sep 2019 | Published: 04 Sep 2019

MicroScope

The First 72-Hours: How to Approach the Initial Hours of a Security Incident
sponsored by Fidelis
WHITE PAPER: Over the course of responding to thousands of critical security incidents, Fidelis Security has seen organizations approach the initial hours of an incident in every conceivable way. In this white paper, discover the 1st steps security teams should take when responding to an incident.
Posted: 20 Sep 2019 | Published: 20 Sep 2019

Fidelis

Case Study: Electronic Manufacturing
sponsored by enSilo
CASE STUDY: A manufacturing enterprise's pre-existing AV was getting bypassed by malicious activity. As a result, the enterprise was seeking an endpoint security solution to protect their data from external cyberattacks. In this case study, learn how the manufacturing enterprise was able to provide the necessary protection when deploying enSilo.
Posted: 20 Sep 2019 | Published: 20 Sep 2019


Risk-Based Vulnerability Orchestration Across the Software Lifecycle
sponsored by ZeroNorth
EBOOK: This e-book explains the difference between automation and orchestration, why this matters and cost-effective steps you can take to begin mitigating risk. Read on to learn more.
Posted: 20 Sep 2019 | Published: 20 Sep 2019

ZeroNorth

Manufacturing Solution Brief
sponsored by enSilo
PRODUCT OVERVIEW: The manufacturing industry has been heavily targeted by cyberattacks in recent years. Download this solution brief to learn how enSilo delivers a complete endpoint protection platform that is able to uniquely meet the security and operational needs of the manufacturing industry.
Posted: 20 Sep 2019 | Published: 20 Sep 2019


Small Organizations Still Need Big Security
sponsored by Blackberry Cylance
WHITE PAPER: Damage to a company's reputation is a major concern, so all companies, large and small, seek brand protection in every medium. Where small and large enterprises diverge is in resources to combat these threats. In this white paper, learn about cybersecurity strategies that small business can implement to help secure their organization.
Posted: 20 Sep 2019 | Published: 31 Jul 2019

Blackberry Cylance

Artificial Intelligence: The Smarter Approach To Information Security
sponsored by Blackberry Cylance
WHITE PAPER: The news headlines are replete with stories of devastating data breaches, compromising the data of millions. Traditional AV solutions are ineffective at preventing breaches. In this white paper, learn how an AI-driven security solution can help your organization combat cyber attacks.
Posted: 20 Sep 2019 | Published: 20 Sep 2019

Blackberry Cylance

Fidelis Endpoint : A Technical Deep Dive
sponsored by Fidelis
PRODUCT OVERVIEW: In this solution overview, learn how Fidelis Endpoint unifies endpoint detection and response (EDR) and endpoint protection platform (EPP) capabilities to meet the needs of IT endpoint management and mature security operations.
Posted: 20 Sep 2019 | Published: 20 Sep 2019

Fidelis

A Field Guide to Understanding the Tactics, Techniques and Attack Vectors Used by Cybercriminals
sponsored by Radware
WHITE PAPER: The threat landscape is as diverse as it is sophisticated, thanks largely to the fact that the skills and tools behind launching cyberattacks have become commoditized. In Radware's Hacker's Almanac, gain an understanding the threat landscape and current tactics, techniques and procedures used by today's cybercriminals.
Posted: 20 Sep 2019 | Published: 20 Sep 2019

Radware

Leaders & Laggards: The Latest Findings from the Ponemon Institute's Study on the Cyber Resilient Organization
sponsored by IBM
WEBCAST: In this webinar, Dr. Larry Ponemon will take you through the barriers of becoming cyber resilient and dive into report topics such as implementing automation, aligning privacy and cyber security, and what it takes to become a cyber resilient "High Performer" in 2019.
Posted: 20 Sep 2019 | Premiered: Sep 20, 2019

IBM

On the Radar: IBM Resilient Applies Incident Response Orchestration to GDPR Data Breaches
sponsored by IBM
ANALYST REPORT: Download Ovum's On the Radar Report to learn how the IBM Resilient SOAR Platform simplifies breach notification by using built-in guidance and templates to track breach management and reporting tasks, privacy-focused assessment to help determine who to notify, and regularly updated breach notification requirements.
Posted: 20 Sep 2019 | Published: 24 Oct 2018

IBM
126 - 150 of 3317 Matches Previous Page    4 5 6 7 8 9    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement