IT Management  >   Systems Operations  >  

Security

RSS Feed   
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 

Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Reports
26 - 50 of 3405 Matches Previous Page  |  Next Page
CW Europe - March-May 2021: Nordic tech startups create blueprint for post-Covid working environment
sponsored by ComputerWeekly.com
EZINE: Business can learn lessons from Nordic tech startups to prepare employees to return to the office after Covid restrictions end.
Posted: 26 Feb 2021 | Published: 11 Mar 2021

ComputerWeekly.com

Defending Network Access with Risk Profiling Driven by Mist AI
sponsored by Ampito
DATA SHEET: A common cause of security breaches is inadequate network visibility. It’s impossible to mitigate or respond to a breach if you don’t know what’s happening on your network. But Juniper Risk Profiling powered by Mist AI aims to provide deep visibility and policy enforcement at every point of connection. This data sheet tells all.
Posted: 25 Feb 2021 | Published: 30 Nov 2020

Ampito

SASE & Zero Trust for Dummies
sponsored by VMware
EBOOK: Already, SASE is playing a big role in conversations about how to improve remote security and increase network efficiency. Now, zero-trust network access (ZTNA) can provide a user’s contextual identity to all the different SASE security services, making for a smarter, more secure edge. Download SASE & ZTNA For Dummies to learn more.
Posted: 25 Feb 2021 | Published: 25 Feb 2021

VMware

Best Practices DNS: The First Principle of Enterprise Security
sponsored by Infoblox
WHITE PAPER: For today’s WFH and soon-to-be-hybrid workforces, security teams must exploit DNS. As the foundation of enterprise networks, DNS can provide a layer of security intelligence otherwise not seen by security operations centers. Leverage this report to learn 5 critical questions organizations must ask of DNS security vendors.
Posted: 25 Feb 2021 | Published: 25 Feb 2021

Infoblox

Secure SD-Wan for the Cloud-First Enterprise without Compromise
sponsored by Aruba Networks
WHITE PAPER: As enterprises move to the cloud, security challenges multiply. Examine this white paper to learn how Zscaler and Silver Peak are combining their respective Cloud Security and Unity EdgeConnect SD-WAN platforms to address these challenges. And, see how they’re collaborating to deliver security orchestration for consistent security policies.
Posted: 25 Feb 2021 | Published: 31 May 2019

Aruba Networks

Leveraging AI to Automate Vulnerability Management
sponsored by Dell SecureWorks
DATA SHEET: Today’s organizations need vulnerability management (VM) solutions that are built to maximize risk reduction. With the power of ML, these same organizations can minimize the manual burden on InfoSec and IT operations teams. Download this data sheet to explore how Secureworks’ VM solution strives to do all this and more.
Posted: 23 Feb 2021 | Published: 23 Feb 2021


Enabling The Next-Generation Security Operation Model
sponsored by Cisco Systems, Inc.
ANALYST REPORT: IDC believes that a new security operation model is needed to address the challenges stemming from the evolving threat landscape. Download the report to learn about a net-gen security operations model.
Posted: 23 Feb 2021 | Published: 23 Feb 2021

TOPICS:  Security
Cisco Systems, Inc.

Bringing Enterprise Security To Your Small Business
sponsored by Cisco Umbrella
RESOURCE: Look at this infographic to learn how your small business can get DNS-layer security to protect against enterprise-level threats.
Posted: 23 Feb 2021 | Published: 23 Feb 2021

TOPICS:  Security
Cisco Umbrella

Operational Risk Management Accelerator Powered by ServiceNow
sponsored by ServiceNow
DATA SHEET: Deloitte and ServiceNow have partnered to create an Operational Risk Accelerator tool to assist organizations in managing their risks. Open this PDF to learn about the Operational Risk Accelerator.
Posted: 23 Feb 2021 | Published: 23 Feb 2021

TOPICS:  Security
ServiceNow

Protecting the Human Side of Cybersecurity
sponsored by Forcepoint
WHITE PAPER: Download this report to get educated on behavioral analytics cybersecurity and Forcepoint’s BA offering.
Posted: 23 Feb 2021 | Published: 23 Feb 2021

TOPICS:  Security
Forcepoint

AT&T Managed Threat Detection and Response
sponsored by AT&T Cybersecurity
DATA SHEET: Threat detection is fast-growing, but talent is in short supply, leaving organizations to do more with less. As cybercriminals become cleverer, this burden of countering threats falls on the business. Plan your next move - examine this data sheet to explore Managed Threat Detection and Response from AT&T.
Posted: 23 Feb 2021 | Published: 23 Feb 2021

AT&T Cybersecurity

The Impact of XDR in the Modern SOC
sponsored by Dell SecureWorks
ANALYST REPORT: Extended detection and response (XDR) is gaining momentum in the security arena. ESG recently surveyed IT/InfoSec professionals across multiple industry verticals to better understand the market perception of XDR, as well as value points and challenges that come with it. Access the full ESG report to see the impact of XDR in the modern SOC.
Posted: 23 Feb 2021 | Published: 30 Nov 2020


The Definitive Buyer's Guide for Managed Threat Detection and Response Services
sponsored by Trustwave
RESOURCE: In this buyer's guide, Trustwave talks about the Managed Detection and Response (MDR) marketplace, compares provider types, and walks through the requirements for effective MDR. Access it here to learn what you should be looking for as you consider the best provider for your specific needs.
Posted: 23 Feb 2021 | Published: 23 Feb 2021

Trustwave

3 Threat Vectors Addressed by Zero Trust App Sec
sponsored by Traceable
WHITE PAPER: Zero trust has been around for some time, but implementations of a zero-trust model for network and application security are few and far between. Now, you can explore how a zero-trust approach can help protect applications from 3 dangerous threat vectors. Read the full blog post to learn what they are and what you can do.
Posted: 23 Feb 2021 | Published: 23 Feb 2021

Traceable

Rethinking Cyber Risk in a Re-globalized World with Andrea Little Limbago, VP Research and Analysis
sponsored by Interos
WEBCAST: The global pandemic has created seismic shifts in technology trends, particularly as they pertain to the global economy. Organizations are being driven to rethink their policies on security and risk. Engage this webinar, the Global Resilience Federation Virtual Summit on Security & Third-Party Risk, to explore emerging cyber risk considerations.
Posted: 23 Feb 2021 | Premiered: Nov 5, 2020

Interos

SolarWinds and the Supply Chain, the Threat We’ve Ignored for Too Long
sponsored by Interos
WEBCAST: The SolarWinds attacks caught the entire country off its guard. What can security teams learn from them? Access this webcast to hear from Robert Brese, a VP and Executive Partner at Gartner, as he joins cybersecurity leaders to discuss fundamental changes that must be implemented to address the SolarWinds nation-state supply chain attacks.
Posted: 23 Feb 2021 | Premiered: Dec 22, 2020

Interos

The Golden Tax Department and Emergence of GoldenSpy Malware
sponsored by Trustwave
ANALYST REPORT: To defend your organization against the GoldenSpy threat, download this Trustwave report. Inside, you’ll find details on the attack methodology, suspected entities behind the activity, and protective measures to mitigate risk of being impacted.
Posted: 23 Feb 2021 | Published: 31 Dec 2020

Trustwave

State of Malware Report 2021
sponsored by Malwarebytes
ANALYST REPORT: As the world was dealing with a global pandemic, cybercriminals ditched some old tactics and focused more on gathering intelligence. Simultaneously, ransomware gangs continued to learn from each other, with successful tactics spreading quickly between them. Download this report to learn more about how cybercrime and cybersecurity changed in 2020.
Posted: 23 Feb 2021 | Published: 23 Feb 2021

Malwarebytes

Text Message and Social Media Compliance Best Practices for Law Enforcement Agencies
sponsored by Smarsh
WHITE PAPER: The popularity of workplace SMS/text messaging and social media has exploded in recent years. Because of this, law enforcement needs to be aware of certain guidelines and considerations when allowing officers and agency employees to use these communication tools. Use this guide to learn how to stay SMS and social media compliant.
Posted: 23 Feb 2021 | Published: 23 Feb 2021

Smarsh

The Threat Hunt That Uncovered Novel Malware
sponsored by Trustwave
CASE STUDY: What do you do when a required software program comes inadvertently bundled with sophisticated malware? Read the full case study here for a breakdown of how one technology vendor identified and remediated the hidden threat with help from the Trustwave SpiderLabs team.
Posted: 23 Feb 2021 | Published: 23 Feb 2021

Trustwave

The State of Enterprise Unified Communications & Contact Center Security
sponsored by Oracle
ANALYST REPORT: Real-time communications cyber risks are on the rise. 25% of companies say the threats hitting their communications infrastructure create more than 20 incidents per year. Not only do enterprises need stronger security, users want a better experience as well. Access this Dark Reading research report to learn more about the state of UC security.
Posted: 22 Feb 2021 | Published: 31 Jul 2020

Oracle

Oracle Communications and Zoom Strategic Partnership
sponsored by Oracle
WHITE PAPER: As remote working has now become the new norm, enterprises are implementing Zoom for their UC needs to promote enhanced productivity. As such, security and seamless migration are top of mind for enterprise IT administrators. Leverage this white paper to see how Oracle’s Session Border Controller (SBC) is playing a major role in this effort.
Posted: 22 Feb 2021 | Published: 22 Feb 2021

Oracle

The 10 Things Your MDR Service Must Do
sponsored by Rapid7
WHITE PAPER: Before assessing managed detection and response (MDR) vendors, it is crucial for an organization to evaluate each vendor based on 10 things they should be able to offer. Open up this white paper to uncover what to look for, including deep observation, threat validation and more.
Posted: 22 Feb 2021 | Published: 22 Feb 2021

TOPICS:  Security
Rapid7

The Rise of Cloud-Based Security Analytics and Operations Technologies
sponsored by Rapid7
RESEARCH CONTENT: Organizations continue to find it difficult managing cyber risk or detecting and responding to cyber incidents. In order to get more insight into this issue, ESG took a deep dive into the impact of using public cloud resources to process and store data, current strategies and more. Open now to uncover key findings from this study.
Posted: 22 Feb 2021 | Published: 22 Feb 2021

TOPICS:  Security
Rapid7

Protecting Against the Hidden Threats of New Technologies
sponsored by Traceable
RESOURCE: Software development is being revolutionized by tools like GraphQL, but these new technologies also bring unknown security risks with them. Read this Traceable post to learn some of the biggest challenges facing modern application security, the shortcomings of legacy security, and strategies and solutions tackling this new wave of problems.
Posted: 22 Feb 2021 | Published: 22 Feb 2021

Traceable
26 - 50 of 3405 Matches Previous Page    1 2 3 4 5    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info