IT Management  >   Systems Operations  >  

Security

RSS Feed   
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 

Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Reports
151 - 175 of 3437 Matches Previous Page  |  Next Page
Top 5 Security Trends to Watch
sponsored by CenturyLink
RESOURCE: Cybercrime is continuing to evolve, and cybercriminals are developing new ways to target businesses across the globe. In this infographic, explore current trends that CenturyLink believes organizations should be aware of today to help keep themselves secure.
Posted: 22 Oct 2019 | Published: 22 Oct 2019

CenturyLink

Government insists 'nothing sinister' about web user data gathering
sponsored by ComputerWeekly.com
EGUIDE: Privacy and data protection have never been more important. Cambridge Analytica, Facebook, we can count the recent scandals on two hands. But lately, government officials have insisted there is "nothing sinister" in plans to gather user information through the Gov.uk website to help deliver more personalised digital services to citizens.
Posted: 22 Oct 2019 | Published: 22 Oct 2019

ComputerWeekly.com

Avoid Getting More Than You Bargained for in M&A Deals
sponsored by Avalara
WHITE PAPER: Sales tax is a common challenge during mergers and acquisitions, but rarely gets addressed early on. However, syncing sales tax management early in the process can save you from serious compliance headaches later. In this white paper, learn how to include sales tax compliance in your integration strategy.
Posted: 21 Oct 2019 | Published: 21 Oct 2019

Avalara

Upgrading Your ERP?
sponsored by Avalara
WHITE PAPER: Upgrading an ERP platform and integrating it with a modern tax automation solution becomes more urgent as the definition of nexus expands beyond physical presence. This white paper will address the urgency of tax automation, the limitations of legacy and on-premise solutions, and the advantages of cloud-based platforms.
Posted: 21 Oct 2019 | Published: 21 Oct 2019

Avalara

Network Security for a New Era
sponsored by TechData - HPE
WHITE PAPER: Mobile devices and smart objects are connecting to the same school networks, but they have very different security needs. Read this report for how K-12 leaders can manage the new security challenges of mobile devices and smart objects.
Posted: 21 Oct 2019 | Published: 21 Oct 2019

TechData - HPE

Automation Is a Security Pro’s Best Friend
sponsored by FireMon
RESOURCE: The benefits of automation are universal no matter your industry. In this infographic, learn 7 reasons why automation is a security pro’s best friend including its ability to remove the manual tasks that often result in human error.
Posted: 21 Oct 2019 | Published: 21 Oct 2019

FireMon

One Fish, Two Fish, Three Fish, Fraud Fish
sponsored by Splunk
RESOURCE: In this Dr. Seuss style storybook, discover how numerous types of fraud, such as credit card, phishing, account takeover, and more can affect your organization.
Posted: 21 Oct 2019 | Published: 21 Oct 2019

Splunk

Synthetic Identity - A Rapidly Growing Global Issue
sponsored by RSA
WEBCAST: The RSA Conference eFraud Global Forum brings together anti-fraud leaders from across the world for a candid conversation about e-fraud challenges and solutions. In this webinar, hear from experts in the UK and US as they share the greatest e-fraud challenges they face—including synthetic identity—and how they fight back in this ongoing battle.
Posted: 21 Oct 2019 | Premiered: Oct 21, 2019

RSA

Application security: best practices and risks
sponsored by ComputerWeekly.com
EGUIDE: Security professionals need to anticipate vulnerabilities from all the right perspectives, and that means testing apps for flaws on a regular basis, whether that means monthly, quarterly or following updates. Check out this e-guide, which include application security best practices, threat identification and security testing tips.
Posted: 21 Oct 2019 | Published: 21 Oct 2019

ComputerWeekly.com

Datto’s Global State of the Channel Ransomware Report
sponsored by Datto, Inc.
EBOOK: Datto surveyed more than 1,400 managed service providers (MSPs) around the world about ransomware and published the key takeaways in this report. Download the report today to unlock new year over year trends, statistics, and recommendations for ensuring recoverability in the face of this growing cyberthreat.
Posted: 18 Oct 2019 | Published: 18 Oct 2019

Datto, Inc.

Attack Surface Visibility and Reducing Risk with HackerOne: Verizon Media Webinar
sponsored by HackerOne
WEBCAST: Verizon Media is the media giant that owns a slew of dynamic brands including Yahoo, AOL, Tumblr, that over 1 billion people love and trust. Cybersecurity is paramount in maintaining that trust. In this webinar, learn how their security team worked with HackerOne to run a robust bug bounty program aimed at reducing the risk of a security incident.
Posted: 18 Oct 2019 | Premiered: Oct 18, 2019

HackerOne

Cloud Security Gaps
sponsored by Aporeto
WHITE PAPER: In this white paper, learn about application segmentation that’s based on application identity, where you can effectively segment workloads and securely build and run applications in the Zero Trust landscape of the public cloud.
Posted: 18 Oct 2019 | Published: 18 Oct 2019

Aporeto

Network Security – A Patchwork Quilt Bursting at the Seams
sponsored by PortSys
RESOURCE: In this article, learn about a more efficient way for an organization to manage their network security from top to bottom.
Posted: 18 Oct 2019 | Published: 18 Oct 2019

PortSys

Introduction to DevSecOps
sponsored by Contrast Security
WHITE PAPER: Gartner has named DevSecOps one of their fastest-growing areas of interest and predicts that DevSecOps will be embedded into 80% of rapid development teams by 2021. In this white paper, explore 4 core practices to any DevSecOps initiative.
Posted: 18 Oct 2019 | Published: 18 Oct 2019

Contrast Security

Security for Microservices: Best Practices
sponsored by Aporeto
WHITE PAPER: Moving to a microservices framework and adoption of cloud-native services introduces new security considerations for developers, line-of-business owners, and security teams. In this white paper, explore best practices for security in a microservices environment.
Posted: 18 Oct 2019 | Published: 18 Oct 2019

Aporeto

Defining Security for a Kubernetes Deployment
sponsored by Aporeto
WHITE PAPER: For a DIY Kubernetes deployment, it’s very important to understand basic hygiene and follow best practices for securing the Kubernetes cluster in itself. Read on to learn more about securing workloads deployed in a Kubernetes cluster.
Posted: 18 Oct 2019 | Published: 18 Oct 2019

Aporeto

Attackers are Targeting your Company’s Most Valuable Resource: Your People
sponsored by Proofpoint
EBOOK: Gaining true visibility into the state of cyber-risk requires organizations to address the need to protect people against attacks at 3 different levels. And when we say “people” we’re not just talking about senior execs/the c-suite. Download and discover how to more effectively address 3 major problem areas in today’s enterprise.
Posted: 18 Oct 2019 | Published: 18 Oct 2019

Proofpoint

Critical Watch Report: 2019
sponsored by Alert Logic
ANALYST REPORT: SMBs are under greater pressure than ever to address cyberthreats. The principal challenge for SMBs is that they must face these threats with fewer security resources than large enterprises. In this report, explore 9 takeaways that illustrate SMBs difficulties to keep pace with the changing security landscape.
Posted: 18 Oct 2019 | Published: 18 Oct 2019

Alert Logic

Understanding the Mobile Threat Landscape
sponsored by IBM
ANALYST REPORT: With more web traffic now taking place on mobile than desktop, scammers are taking note by hitting victims with regular device-centric scams that leverage popular apps. In this report, explore the key mobile security trends that emerged last year. Also, uncover predictions for the mobile threat landscape in the years ahead.
Posted: 17 Oct 2019 | Published: 17 Oct 2019

IBM

Secrets to a Stronger Strategy for Container Security
sponsored by Alert Logic
WHITE PAPER: AlertLogic experts have developed, tested, and refined 8 best practices for security in your environment. Read on for more explanation of these practices and some tips for how your Amazon Web Services (AWS) environment can help.
Posted: 17 Oct 2019 | Published: 17 Oct 2019

Alert Logic

6 Steps to Overcoming PCI DSS Compliance Challenges in Multi-Cloud and Hybrid Environments
sponsored by Alert Logic
EBOOK: This e-book examines the challenges inherent in achieving continuous PCI DSS compliance across multi-cloud and hybrid landscapes and what to look for in evaluating solutions and service providers that can address those complexities.
Posted: 17 Oct 2019 | Published: 17 Oct 2019

Alert Logic

Hacker-Powered Data - Security Weaknesses and Embracing Risk with HackerOne
sponsored by HackerOne
WEBCAST: Today, companies, enterprises, & governments are embracing collaboration with hackers to find vulnerabilities before criminals have a chance to exploit them. In this webcast, Miju Han from HackerOne discusses the most common vulnerabilities not found on the OWASP top 10.
Posted: 17 Oct 2019 | Premiered: Oct 17, 2019

HackerOne

Weighing the Risks: The Real Costs of a Data Breach
sponsored by Citrix
RESOURCE: Work has moved beyond office walls, and attackers are adapting. Defending against the attacks of today with yesterday’s tools and techniques can’t keep your systems and data secure. Download this infographic to learn how you can reduce risk and boost productivity with Citrix Workspace.
Posted: 17 Oct 2019 | Published: 17 Oct 2019

Citrix

State of the Internet: Financial Services Attack Economy
sponsored by Akamai Technologies
ANALYST REPORT: The financial services industry is one of the most sought-after targets for attackers. Staying aware of new attack trends is imperative for financial organizations to keep their systems and customers safe. In the 2019 State of the Internet: Security Financial Services Attack Economy Report, learn how to protect against emerging threats.
Posted: 17 Oct 2019 | Published: 31 Jul 2019

Akamai Technologies

GandCrab Ransomware Analysis Report
sponsored by Versa Networks
WHITE PAPER: A recent ransomware which has become viral since January 2018 is named GandCrab. The developers have been continuously updating and releasing improved versions, with approximately 6 variants observed to date. This white paper will take a quick look into these variants and provide insightful into how they are impacting users.
Posted: 16 Oct 2019 | Published: 16 Oct 2019

Versa Networks
151 - 175 of 3437 Matches Previous Page    5 6 7 8 9 10    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement