IT Management  >   Systems Operations  >  

Security

RSS Feed   
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 

Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Reports
26 - 50 of 3198 Matches Previous Page  |  Next Page
ThreatQ for Government Agencies
sponsored by ThreatQuotient
DATA SHEET: As government agencies are considered critical infrastructure, they are under constant attack from hackers, political activists and foreign state-sponsored actors. The first step to detecting, responding and recovering from incidents is finding a way to increase situation awareness. Download this brief to learn more.
Posted: 21 Jan 2020 | Published: 21 Jan 2020

ThreatQuotient

The Total Economic Impact™ Of Snyk
sponsored by Snyk
RESEARCH CONTENT: The global security industry is struggling to keep up with rapidly evolving and unpredictable security threats – and many of these threats can be sourced to open source vulnerabilities. In this report, Forrester examines the TEI™ and ROI of an open source security platform. Check out the report here.
Posted: 21 Jan 2020 | Published: 29 Nov 2019

Snyk

PCI Deep Dive Webinar: Software Security Framework to Replace PA-DSS
sponsored by Snyk
WEBCAST: Developing secure payment software can be tricky, especially when dealing with third-party components. PCI secure software frameworks offer clear procedures, tools, and recommendations for compliancy. In this webinar, four experts dive into how to ensure PCI compliance and protect your organization from vulnerabilities. Watch the webinar now.
Posted: 21 Jan 2020 | Premiered: Jan 21, 2020

Snyk

Protecting Intellectual Property: Black, White, and Shades of Gray
sponsored by InteliSecure
WHITE PAPER: Complying with data privacy regulations is important, but rarely is regulated data the only data worth protecting. Losses associated with regulatory fines present far less risk than the potential losses associated with intellectual property theft. In this white paper, learn how a data protection program can help you protect even unstructured IP.
Posted: 21 Jan 2020 | Published: 21 Jan 2020

InteliSecure

Onboarding IT Service Providers Shouldn’t be Complicated, Costly, or Risky
sponsored by Tehama
WHITE PAPER: Enterprises need to secure, accelerate, and simplify how they onboard external third parties and provide access to critical and vulnerable systems while mitigating the cybersecurity risks. This white paper goes in-depth into the associated risks and outlines potential tactics for ensuring security during the onboarding process.
Posted: 20 Jan 2020 | Published: 31 Jan 2019

Tehama

Pervasive Protection: Enabling Secure Work from Anywhere
sponsored by Malwarebytes
RESOURCE: The digitally transformed workplace consists of employees that expect to get their work done anywhere. This mix of onsite and remote workers, as well as the explosion of devices and applications they now use, presents a security challenge. In this infographic, find out what security managers need to know to defend against today’s cyberattacks.
Posted: 20 Jan 2020 | Published: 20 Jan 2020

Malwarebytes

Auth0 Case Study: Developer Security at High-Growth Scale
sponsored by Snyk
CASE STUDY: For an organization that focuses on authentication and authorization processes, security is the number one priority – teams must be able to identify vulnerabilities before attackers do. See how this CIAM platform company made that possible in this open source security case study. Click here to read more.
Posted: 20 Jan 2020 | Published: 20 Jan 2020

Snyk

Buyer’s Guide to Threat Intelligence Platforms
sponsored by ThreatQuotient
WHITE PAPER: As organizations begin to build their threat intelligence operations, they must consider how they will organize their data. Threat intelligence platforms (TIPs) give IT teams the visibility required to make the most of existing resources. Read this white paper to learn more about TIP, and how to go about making an informed buying decision.
Posted: 20 Jan 2020 | Published: 31 Mar 2018

ThreatQuotient

Comprehensive Lifecycle Management
sponsored by Insight
WEBCAST: The expectations of today’s workforce combined with the advancements in technology, means there are more mobile devices than ever before. While this is good for productivity, it creates its own set of security challenges. In this webcast, learn how to better protect your organization with Microsoft’s EM+S Solution and Insight.
Posted: 20 Jan 2020 | Premiered: Jan 20, 2020

Insight

Cisco Umbrella and Meraki MR – Effective protection for corporate and guest Wi-Fi
sponsored by Cisco Umbrella
DATA SHEET: In this solution brief, take a closer look at the integration of Cisco Umbrella and Meraki MR for simple and effective protection for corporate and guest Wi-Fi. Discover how it works and why you should consider deploying this integration.
Posted: 17 Jan 2020 | Published: 17 Jan 2020

Cisco Umbrella

QualiFYI
sponsored by QualiSystems
VIDEO: There’s a massive demand for cyber experts to secure networks with efficiency and confidence. With cyber ranges, testing the defenses is easier and more trustworthy. In this brief interview, Quali discusses how cyber range training is a crucial endeavor that organizations must take on. Click inside the hear why.
Posted: 17 Jan 2020 | Premiered: 17 Jan 2020

QualiSystems

How to Safeguard Against Cross-Site Scripting (XSS) Attacks
sponsored by Tala Security
WHITE PAPER: Cross-site scripting (XSS) attacks are a rising concern for all industries and will continue to be a favored strategy for cybercriminals. With a proactive and strategic approach, your organization can ensure web application security. Read on to learn more.
Posted: 17 Jan 2020 | Published: 17 Jan 2020

Tala Security

6 Practical Approaches to Bridge the Cybersecurity Talent Shortage
sponsored by Alert Logic
WHITE PAPER: Many organizations are adopting new and emerging technologies faster than they can address related security issues. The situation is further exacerbated by the industry’s skills and resources gap. In this white paper, discover 6 practical approaches to bridge the cybersecurity skills and resource gap in your organization.
Posted: 17 Jan 2020 | Published: 17 Jan 2020

Alert Logic

2019–2020 Global Application & Network Security Report
sponsored by Radware
ANALYST REPORT: To provide insight into the complex challenges faced by organizations as they seek to balance business agility and security requirements, Radware produced a Global Application & Network Security Report. Download the report to explore real attack data, analyses of developing trends and technologies, and findings from a global industry survey.
Posted: 17 Jan 2020 | Published: 17 Jan 2020

Radware

The state of open source security report
sponsored by Snyk
RESOURCE: The open source software landscape is rooted in rich soil – but someone forgot to lock the garden gate. In this 50-page report, Snyk examines the state of security in open source software through survey results, external research, and internal data. Read the report now to get out of the weeds.
Posted: 17 Jan 2020 | Published: 17 Jan 2020

Snyk

Security with a Fluid Perimeter
sponsored by Somerville
ANALYST REPORT: While it’s true the perimeter has changed, it has not vanished. Instead, the perimeter has become fluid—changing daily to adapt to the needs of users and modern business, as opposed to the old way of locking down the enterprise. In this white paper, learn how your organization can begin to benefit from this fluid perimeter.
Posted: 17 Jan 2020 | Published: 31 Jan 2019

Somerville

Biometrics in the enterprise: An opportunity or an ethical minefield?
sponsored by ComputerWeekly.com
EGUIDE: Is biometric technology ready for use in the enterprise to help improve IT security? IT leaders need to be aware of the concerns. In this e-guide we take a look at some of the potential – as well as the risks.
Posted: 17 Jan 2020 | Published: 17 Jan 2020

ComputerWeekly.com

New Topics on the New Security+ SY0-501 Exam
sponsored by Global Knowledge
WHITE PAPER: In 2017, the revised version of the CompTIA Security+ exam was made available, with more focus on risk management and mitigation. This white paper will guide you in your efforts to prepare for the exam by outlining the new topics included in the objectives list for the current version of the exam.
Posted: 16 Jan 2020 | Published: 16 Jan 2020

Global Knowledge

CIO Trends #10: Middle East
sponsored by ComputerWeekly.com
EGUIDE: If CIOs ever needed a reminder of the predatory cyber criminals that circle their organisations, Travelex's woes are a big one. Also find out how Saudi Arabia could become the Silicon Valley of the Middle East. Read more about it in this issue of our CIO Trends Middle East series.
Posted: 16 Jan 2020 | Published: 16 Jan 2020

ComputerWeekly.com

CIO Trends #10: Nordics
sponsored by ComputerWeekly.com
EGUIDE: Swedish people are pioneering when it comes to adopting the latest technologies. But this malleability to new tech has its limits. Read in this eguide how Swedish consumers are losing confidence in social media, with increasing distrust over personal data use and online privacy.
Posted: 16 Jan 2020 | Published: 16 Jan 2020

ComputerWeekly.com

CIO Trends #10: Benelux
sponsored by ComputerWeekly.com
EGUIDE: If CIOs ever needed a reminder of the predatory cyber criminals that circle their organisations, Travelex's woes is a big one. Also find out how close autonomous ships are to regularly docking in Dutch ports. Read more about it in this issue of our CIO Trends Benelux series.
Posted: 16 Jan 2020 | Published: 16 Jan 2020

ComputerWeekly.com

The Right Way to Combat Customer Journey Hijacking
sponsored by Tala Security
WHITE PAPER: Most IT security teams focus on protecting user data, with little focus on user experience. By implementing a strategy that provides front-end and back-end protection, you can safeguard the interactions customers have with you, prevent the financial and reputational impacts of customer journey hijacking. Read on to get started.
Posted: 15 Jan 2020 | Published: 15 Jan 2020

Tala Security

Closing the Website Security Gap: Why a WAF Is Not Enough
sponsored by Tala Security
WHITE PAPER: Although web application firewalls (WAFs) have a come a long way in recent years, they remain ineffective as a standalone security solution against Magecart cyberattacks. This white paper underlines the shortcomings of WAFs and highlights the importance of protecting the browser-side and the client-side from threats.
Posted: 15 Jan 2020 | Published: 15 Jan 2020

Tala Security

Machine Learning Applications for Banking Fraud Detection
sponsored by Dataiku
EGUIDE: AI-based systems can augment regulatory alert systems and improve analysts’ workflow by reducing noise without discarding results. Access this paper to view the 3 types of anomalies to look out for, understand examples of how banks use fraud and anomaly detection, and learn how to build a basic, machine learning-based fraud detection system.
Posted: 14 Jan 2020 | Published: 14 Jan 2020

Dataiku

Your Email Security is Ineffective, and Getting Worse
sponsored by Ironscales
WHITE PAPER: The impacts of phishing attacks continue to expose the gaps in current email security tactics and highlights why organizations need to adapt their existing approach to meet the requirements of modern threats. Read on to uncover the key data insights from this Aberdeen study into the email security landscape.
Posted: 14 Jan 2020 | Published: 30 Jun 2019

Ironscales
26 - 50 of 3198 Matches Previous Page    1 2 3 4 5    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info