IT Management  >   Systems Operations  >  

Security

RSS Feed   
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 

Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Reports
176 - 200 of 3593 Matches Previous Page  |  Next Page
A Computer Weekly buyer's guide to artificial intelligence in IT security
sponsored by ComputerWeekly.com
EGUIDE: Artificial intelligence is keeping businesses ahead when it comes to fighting cyber crime. In this 14-page buyer's guide, Computer Weekly looks at how IT security is automating its systems, the tools letting firms achieve more with less and the advantages of predictive security.
Posted: 19 Aug 2020 | Published: 19 Aug 2020

ComputerWeekly.com

X-Force Threat Intelligence Index
sponsored by IBM
WHITE PAPER: The X-Force team at IBM releases an annual report, known as the X-Force Threat Intelligence Index, which summarizes the key cybersecurity threats and trends observed over the past year. Read on to unlock the key findings and takeaways from this year’s comprehensive report.
Posted: 18 Aug 2020 | Published: 18 Aug 2020

IBM

Future of the SOC Forces shaping modern security operations
sponsored by Chronicle
WHITE PAPER: The age of AI, IoT, cloud computing and other disruptive technologies has driven fundamental change in security operations approaches and objectives. This white paper explores 3 fundamental forces that are shaping the need to change threat management and SOCs – read on to learn more.
Posted: 18 Aug 2020 | Published: 18 Aug 2020

Chronicle

Continuously Trust Zero
sponsored by IBM
WEBCAST: Data centers are no longer the control points they used to be, and therefore the traditional ‘perimeter’ defense is no longer as effective. As businesses shift to the cloud, DCs become increasingly distributed, and so more appointed security is required. Watch this webinar for a look at how a large company introduces a zero trust approach.
Posted: 18 Aug 2020 | Premiered: Jun 11, 2020

IBM

Plan and prepare for DoD’s CMMC compliance in a cloud-based environment
sponsored by Coalfire
WEBCAST: The goal of the DoD’s Cybersecurity Maturity Model Certification (CMMC) program is to standardize cybersecurity practices across all their contractors. For a complete overview of the CMMC, as well as it’s impacts on cloud-based environments, watch this webinar.
Posted: 18 Aug 2020 | Premiered: Aug 18, 2020

Coalfire

National Telecom Company
sponsored by Dtex
CASE STUDY: As news of insider threats became increasingly prevalent, this national telecom company’s board members and executives realized they needed to build a dedicated inside threat program. Read on to uncover why this company chose Dtex.
Posted: 18 Aug 2020 | Published: 18 Aug 2020

Dtex

DTEX and Phishing
sponsored by Dtex
CASE STUDY: Phishing shows no signs of slowing down. It’s responsible for more than 90% of incidents and data breaches driven by social engineering, with 66% of malware reportedly installed via malicious email attachments. Vigilance is key. View this case study to find out how DTEX was able to help an energy company locate the origin of a phishing attack.
Posted: 18 Aug 2020 | Published: 18 Aug 2020

Dtex

The State of Vulnerability Response in Retail: Patch Work Demands Attention
sponsored by ServiceNow
RESOURCE: Download this infographic for a look at the state of vulnerability response in retail and learn how organizations in the industry can avoid breaches.
Posted: 18 Aug 2020 | Published: 18 Aug 2020

ServiceNow

Data Leakage: Today’s Whitelisted Applications Are Tomorrow’s Security Breaches
sponsored by Tala Security
RESOURCE: Recently, the research team at PerimeterX disclosed what appeared to be a CSP issue at Google. While CSP may have played a part, the incident revealed a fundamental security flaw with global implications. To learn more about this discovery, read on.
Posted: 18 Aug 2020 | Published: 18 Aug 2020

Tala Security

Catching malicious emails with Antigena Email: Demo Video
sponsored by Darktrace
VIDEO: Antigena Email understands the 'patterns of life' of email users to detect the subtle signs of an attack that other tools miss. Watch this demo video to discover how AI caught three malicious emails targeting an organization, revealing the indicators of attack and actioning a proportionate response.
Posted: 18 Aug 2020 | Premiered: 18 Aug 2020

Darktrace

How IT Security is Adapting to the Changing Environment in 2020
sponsored by Cisco Umbrella
WEBCAST: With COVID-19 upon the world, IT security professionals are asking: What are the main challenges organizations are facing? What are some of the trends in the security market today? How can businesses adapt to stay secure now that employees and customers are working from home? Watch this webcast for a look at answers to these questions.
Posted: 18 Aug 2020 | Premiered: Apr 21, 2020

Cisco Umbrella

New report: The recognized privileged access management vendors
sponsored by CyberArk Software, Inc
RESOURCE: CyberArk is proud to announce it has been named a Leader in the Gartner 2020 Magic Quadrant for Privileged Access Management. The CyberArk Privileged Access Security Solution is used by the majority of Fortune 500 companies, and by government organizations around the globe. Download your complimentary report today to learn why.
Posted: 18 Aug 2020 | Published: 18 Aug 2020

CyberArk Software, Inc

Building Immunity for your Inbox
sponsored by Darktrace
DATA SHEET: In this product brief, learn about Antigena Email, a Cyber AI solution for the inbox. By learning the normal ‘pattern of life’, the technology builds an evolving understanding of the ‘human’ within email communications.
Posted: 18 Aug 2020 | Published: 18 Aug 2020

Darktrace

Keeping Up with the Performance Demands of Encrypted Web Traffic
sponsored by Fortinet, Inc.
RESOURCE: Encryption has become a key element in the security of sensitive and confidential data in motion. However, it’s recently been discovered that cybercriminals are using encryption to deliver malware or exfiltrate stolen data. The following article overviews this growing risk and offers insight into how to identify and isolate malicious activity.
Posted: 18 Aug 2020 | Published: 04 Aug 2020

Fortinet, Inc.

Which security platform works best for you?
sponsored by IBM
WHITE PAPER: In cybersecurity, the term “platform” has become overused, making it difficult to cut through the noise and understand which factors matter in choosing the best option for your business. Download this buyer’s guide to find out what you should look for in a security platform.
Posted: 18 Aug 2020 | Published: 18 Aug 2020

IBM

TOP 5 REASONS TO PRIORITIZE PRIVILEGED ACCESS MANAGEMENT
sponsored by CyberArk Software, Inc
WHITE PAPER: Privileged access is the gateway to an organization’s most valuable assets and is at the core of nearly every major security breach today. However, ensuring that privileged access is secure is easier said than done. In this white paper, learn about the top 5 reasons your organization should prioritize PAM-as-a-Service.
Posted: 18 Aug 2020 | Published: 20 Jun 2020

CyberArk Software, Inc

Securing Web Operations for a Fortune 500 Financial Institution
sponsored by Tala Security
CASE STUDY: In this case study, Tala partners with a Fortune 500 financial institution to address key cybersecurity and operational challenges related to the growing volume and usage of web applications. Read on for an in-depth look at the financial institution’s specific challenges, required capabilities, and the results of their partnership with Tala.
Posted: 18 Aug 2020 | Published: 18 Aug 2020

Tala Security

Product Video: Enterprise Threat Protector
sponsored by Akamai Technologies
VIDEO: Many businesses plan to move security to the cloud as legacy systems cannot keep up with modern threats and traffic volume. As a result, they will need threat protection and detection that is proven, accurate and adaptable, even against zero-day threats – and latency must be zero. View this brief video to learn about Enterprise Threat Protector.
Posted: 18 Aug 2020 | Premiered: 18 Aug 2020

Akamai Technologies

Product Video: Web Application Protector
sponsored by Akamai Technologies
VIDEO: Ensuring the security of web applications is becoming increasingly difficult as the usage of these apps continues to expand. Watch this brief video for a closer look at Akamai’s Web Application Protector, designed to provide automated, scalable protection for your web apps against today’s sophisticated threats.
Posted: 18 Aug 2020 | Premiered: 18 Aug 2020

Akamai Technologies

The State of Vulnerability Response in Retail
sponsored by ServiceNow
WHITE PAPER: The best way to counteract cyberattacks is to stay informed. Download this State of Vulnerability Response in Retail report to learn how to reduce data breaches, break down siloes, and create structured workflows for vulnerability management.
Posted: 18 Aug 2020 | Published: 18 Aug 2020

ServiceNow

Product Video: Enterprise Application Access
sponsored by Akamai Technologies
VIDEO: With remote work at an all-time high, it’s critical that only the correct users get access to the right applications at the right time. Now, this can be done without granting a user full access to a network. How? By integrating tools such as MFA, SSO and identity onto one secure access platform. Watch this video to get a closer look.
Posted: 18 Aug 2020 | Premiered: 18 Aug 2020

Akamai Technologies

Highlighting the Role of Response in Network Detection & Response
sponsored by Fidelis
PODCAST: Network Detection and Response (NDR) is the latest trend in network-based cybersecurity. NDR provides holistic visibility of the cyber terrain, produces high confidence detections and automates response in a cyber relevant time. In this podcast, listen as Fidelis’ COO, Craig Harber, discusses the role of response in NDR.
Posted: 18 Aug 2020 | Premiered: Aug 18, 2020

Fidelis

Security Without Compromise
sponsored by Remediant
CASE STUDY: As a result of a mandate, a major U.S. government contractor was in search of a highly-scalable solution that could couple multi-factor authentication and dynamic privileged access – and it had to be efficient and compliant. As it turned out, they were able to get what they needed and more. Take a look at this case study to learn the specifics.
Posted: 17 Aug 2020 | Published: 17 Aug 2020

Remediant

A Step-by-Step Guide: Achieving Zero Standing Privilege
sponsored by Remediant
WHITE PAPER: Privileged access management has changed how organizations keep users in check, but as it turns out, it is not enough. 74% of breached organizations admitted that the breach was made through a privileged account. The issue is standing access. Learn about the benefits of zero standing privilege in this step-by-step guide.
Posted: 17 Aug 2020 | Published: 17 Aug 2020

Remediant

Web Scammers Are Using The Coronavirus Crisis To Attack Your Customers With Magecart And Other Client-side Exploits
sponsored by Tala Security
WHITE PAPER: Cybercriminals have seen the increase in online shopping as an opportunity to ramp-up their activities to skim credit cards, credentials and PII. That’s why it’s never been more important to defend your websites. Download this white paper to learn how you can secure your site today.
Posted: 17 Aug 2020 | Published: 17 Aug 2020

Tala Security
176 - 200 of 3593 Matches Previous Page    6 7 8 9 10 11    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info