IT Management  >   Systems Operations  >  

Security

RSS Feed   
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 

Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Reports
26 - 50 of 2924 Matches Previous Page  |  Next Page
SIEM, SOAR or both? Our security experts weigh in
sponsored by ComputerWeekly.com
EGUIDE: In this E-Guide we turn to the Computer Weekly Security Think Tank, a hand-picked panel of cyber security insiders, experts, analysts, and advocates with over a century's worth of collective experience between them, to explore the topic of Security Information and Event Management (SIEM), and Security Orchestration, Automation and Response, (SOAR).
Posted: 06 Aug 2021 | Published: 06 Aug 2021

ComputerWeekly.com

Security Think Tank Pt.1 - 2020 bought us universal remote working. So what next?...
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide: Each month Computer Weekly poses a question to its Security Think Tank, a panel of cyber security experts comprising industry insiders, technologists, analysts, legal experts and educators, to share their years of collective cyber security wisdom with the security community.
Posted: 06 Aug 2021 | Published: 06 Aug 2021

ComputerWeekly.com

Secure SD-WAN & SASE: Your 2021 Guidebook
sponsored by TechTarget
RESOURCE: Is your organization prepared for the coming paradigm shift in security? Is your threat defense as strong as it needs to be? Take our short survey to become a member of SearchSecurity's Content Program, where you'll have access to a litany of professional resources to help you bolster security now and into the future.
Posted: 30 Jul 2021 | Published: 28 Aug 2021

TechTarget

CW Benelux - August-October 2021: Netherlands sees increase in the number of women opting for an ICT career
sponsored by ComputerWeekly.com
EZINE: The IT skills gap in the Netherlands could be about to narrow as more women take up jobs in the sector. Figures from last year revealed that the number of female ICT professionals grew by 6.5%, while the number of male ICT professionals increased by only 1.7%. Read more about it in this issue.
Posted: 29 Jul 2021 | Published: 12 Aug 2021

ComputerWeekly.com

A Computer Weekly e-guide to SASE
sponsored by ComputerWeekly.com
EGUIDE: Covid has changed everything. Yet while it has truly as introduced many new things to many spheres of activity, in terms of networking it has actually acted as an accelerant to phenomena that were just gaining momentum before the first lockdowns and stay at home orders were being made. secure access service edge (SASE) is one such case.
Posted: 29 Jul 2021 | Published: 28 Jul 2021

ComputerWeekly.com

Risk-Based Authentication A Critical Element To Any Zero-Trust Deployment
sponsored by WatchGuard Technologies, Inc.
EBOOK: MSPs looking to enhance multi-cloud security would do well to consider risk-based authentication, which can help you fuse flexibility and higher protection into one coherent, customized setup. Download this e-book to discover how risk policies and multi-factor authentication can be applied in a manner that promotes secure, flexible architectures.
Posted: 15 Jul 2021 | Published: 15 Jul 2021

WatchGuard Technologies, Inc.

Cyber Defense Center
sponsored by Capgemini
RESOURCE: The arms race against cybersecurity attacks never ends. New threats, attackers and targets emerge daily, and cyber criminals are constantly evolving to breach defenses. Open up this resource to take a look at some of the most common cybersecurity challenges, and learn how to prevent, detect, and respond to security incidents in your organization.
Posted: 07 Jul 2021 | Published: 07 Jul 2021

TOPICS:  Security
Capgemini

Manchester United praised for swift response to cyber attack
sponsored by ComputerWeekly.com
EGUIDE: The Theatre of Dreams briefly turned into The Theatre of Nightmares last week as Manchester United Football Club suffered a cyber-attack on their systems. This e-Guide dives into more depth about how the attack happened and what Manchester United's cyber security team did, in order to prevent a loss of data and keep a clean sheet.
Posted: 01 Jul 2021 | Published: 01 Jul 2021

ComputerWeekly.com

Malwarebytes Will Help you Stop Chasing False Positives
sponsored by Malwarebytes
: Malwarebytes can help MSPs filter out false positives with multi-vector protection that accurately targets true malware and improve security quality. Check out this resource to learn how you can cut the time costs of false positives, reduce their associated security risks, and cultivate trust and loyalty in your customers.
Posted: 28 Jun 2021 | Published: 28 Jun 2021

Malwarebytes

Malwarebytes Integration with Connect Wise Manage
sponsored by Malwarebytes
DATA SHEET: Open up this data sheet to take a look at one of Malwarebytes’ newest PSA tools – ConnectWise Manage – and uncover key capabilities, integration benefits, features, and more.
Posted: 24 Jun 2021 | Published: 24 Jun 2021

TOPICS:  Security
Malwarebytes

SIEM Integrations to Enrich MSP Threat Intelligence
sponsored by Malwarebytes
PRODUCT OVERVIEW: This paper offers up use cases for how to support your security team with SIEM integration, including correlating security data, magnifying visualization, and more. Open now to take a look.
Posted: 24 Jun 2021 | Published: 24 Jun 2021

TOPICS:  Security
Malwarebytes

The CISOs Guide to Extending Zero Trust to the Endpoint
sponsored by Hysolate
WHITE PAPER: Zero trust is a holistic approach to network security, requiring the verification of each person and device whenever it attempts to access resources on a private network, regardless of whether they are already inside the perimeter. Open up this paper to explore everything you need to know about zero trust for your organization.
Posted: 23 Jun 2021 | Published: 23 Jun 2021

TOPICS:  Security
Hysolate

SIEM Integrations to Help MSPs Accelerate Threat Response
sponsored by Malwarebytes
DATA SHEET: Access this solution brief to learn about Malwarebytes business products which drive further automation of MSP active threat response processes and protect and respond to attacks as they occur.
Posted: 23 Jun 2021 | Published: 23 Jun 2021

TOPICS:  Security
Malwarebytes

MSPs: How to Stop Chasing False Positives and Grow Your Business
sponsored by Malwarebytes
DATA SHEET: Check out this solution brief to learn how Malwarebytes mitigates false positives for MSPs through a multi-layered protection strategy while also providing informed telemetry, and threat intelligence.
Posted: 23 Jun 2021 | Published: 23 Jun 2021

TOPICS:  Security
Malwarebytes

Computer Weekly - 22 June 2021: A new three-year plan for digital government
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, the new CEO of the Gov-ernment Digital Service, Tom Read, explains his three-year strategy for improving online public services. EU attempts to regulate AI are under fire – we examine the issues. And we find out how Bupa is turning to the cloud to deliver per-sonalised healthcare. Read the issue now.
Posted: 21 Jun 2021 | Published: 22 Jun 2021

ComputerWeekly.com

Nordics Security Insights Report
sponsored by DWA UK - VMware (Carbon Black)
RESEARCH CONTENT: Discover how senior cybersecurity professionals at Nordic businesses plan to adapt to the security challenges of the distributed workplace and evolve defenses to make security intrinsic to infrastructure and operations.
Posted: 14 Jun 2021 | Published: 14 Jun 2021

TOPICS:  Security
DWA UK - VMware (Carbon Black)

How Citrix Workspace Enables Secure Access to All the Apps Remote Workers Need
sponsored by Citrix
VIDEO: In this quick video, Calvin Hsu, VP of Product Management at Citrix, shows how Citrix Workspace can help give secure access to all the apps remote workers need. Jump in now to hear about key security platforms, capabilities, features, and more.
Posted: 10 Jun 2021 | Premiered: 10 Jun 2021

TOPICS:  Security
Citrix

Cyber Security: 2021 Worst in Show
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide: Throughout 2021, there has been a strong focus worldwide on how to combat cyber security attacks for most businesses. In this e-guide we take a look at the best of the worst of those attacks to happen throughout January to June this year and how businesses can learn/adapt from these attacks.
Posted: 09 Jun 2021 | Published: 09 Jun 2021

ComputerWeekly.com

The Forrester Wave™_ Security Analytics Platforms, Q4 2020
sponsored by IBM
ANALYST REPORT: As SIEM technology becomes outdated and less effective, cloud-delivered security analytics platforms that provide custom detections, MITRE ATT&CK mapping, and SaaS will dictate which providers will lead the pack. Get the full Forrester Wave to uncover how 11 providers stack up.
Posted: 03 Jun 2021 | Published: 03 Jun 2021

TOPICS:  Security
IBM

How A Platform Approach To Security Monitoring Initiatives Adds Value: Integration, Orchestration, Analytics, Automation And The Need For Speed
sponsored by IBM
RESEARCH CONTENT: As security monitoring initiatives mature, a platform approach can reduce the time to detect, investigate, respond to, and recover from security related incidents. Check out this Aberdeen research paper to learn about the ROI and business outcomes a platform approach to security can have on your organization.
Posted: 01 Jun 2021 | Published: 01 Jun 2021

TOPICS:  Security
IBM

AWS Certified Security Specialty Exam Study Guide.
sponsored by TechTarget
RESOURCE: We're giving you FREE access to our e-book that covers the AWS Certified Security - Specialty Exam, where author Stuart Scott shares insights on how to prepare for the exam and reap the professional benefits of the certification. Be sure to complete our quick survey to access the e-book.
Posted: 29 May 2021 | Published: 28 Aug 2021

TechTarget

How do you solve a problem like security training?
sponsored by ComputerWeekly.com
EGUIDE: In this E-Guide, we will the tricky topic of security awareness training. Firstly, we try to answer the burning question of how to get employees to pay attention to training and take it seriously. Then, we take a look at some security awareness best practices that you can use to craft training your users will actually benefit from.
Posted: 17 May 2021 | Published: 17 May 2021

ComputerWeekly.com

Ransomware and the Cost of Downtime
sponsored by Datto, Inc.
WHITE PAPER: According to a recent study, in the first half of 2020 ransomware attacks grew by 715% as cybercriminals began exploiting the pandemic. Take a deep dive into this infographic to learn more about ransomware attacks, the true cost of downtime, and how a business continuity and disaster recovery (BCDR) platform can help protect your clients.
Posted: 13 May 2021 | Published: 13 May 2021

TOPICS:  Security
Datto, Inc.

The Essential Cybersecurity Toolkit For Smbs
sponsored by Datto, Inc.
EBOOK: This eBook offers up tips for training employees on cybersecurity best practices through real world examples. Plus, some essential solutions aimed to help SMBs defend against, and recover from, cyberattacks.
Posted: 06 May 2021 | Published: 06 May 2021

TOPICS:  Security
Datto, Inc.

Preventing identity theft in a data breach
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, we will explore the links between ransomware attacks, data breaches and identity theft. First, Nicholas Fearn investigates the phenomenon of the double extortion attack, and shares some insider advice on how to stop them, while we'll explore the top five ways data backups can protect against ransomware in the first place.
Posted: 06 May 2021 | Published: 06 May 2021

ComputerWeekly.com
26 - 50 of 2924 Matches Previous Page    1 2 3 4 5    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences