IT Management  >   Systems Operations  >  

Security

RSS Feed   
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 

Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Reports
51 - 75 of 2749 Matches Previous Page  |  Next Page
Malwarebytes Will Help you Stop Chasing False Positives
sponsored by Malwarebytes
: Malwarebytes can help MSPs filter out false positives with multi-vector protection that accurately targets true malware and improve security quality. Check out this resource to learn how you can cut the time costs of false positives, reduce their associated security risks, and cultivate trust and loyalty in your customers.
Posted: 28 Jun 2021 | Published: 28 Jun 2021

Malwarebytes

Malwarebytes Integration with Connect Wise Manage
sponsored by Malwarebytes
DATA SHEET: Open up this data sheet to take a look at one of Malwarebytes’ newest PSA tools – ConnectWise Manage – and uncover key capabilities, integration benefits, features, and more.
Posted: 24 Jun 2021 | Published: 24 Jun 2021

TOPICS:  Security
Malwarebytes

SIEM Integrations to Enrich MSP Threat Intelligence
sponsored by Malwarebytes
PRODUCT OVERVIEW: This paper offers up use cases for how to support your security team with SIEM integration, including correlating security data, magnifying visualization, and more. Open now to take a look.
Posted: 24 Jun 2021 | Published: 24 Jun 2021

TOPICS:  Security
Malwarebytes

The CISOs Guide to Extending Zero Trust to the Endpoint
sponsored by Hysolate
WHITE PAPER: Zero trust is a holistic approach to network security, requiring the verification of each person and device whenever it attempts to access resources on a private network, regardless of whether they are already inside the perimeter. Open up this paper to explore everything you need to know about zero trust for your organization.
Posted: 23 Jun 2021 | Published: 23 Jun 2021

TOPICS:  Security
Hysolate

SIEM Integrations to Help MSPs Accelerate Threat Response
sponsored by Malwarebytes
DATA SHEET: Access this solution brief to learn about Malwarebytes business products which drive further automation of MSP active threat response processes and protect and respond to attacks as they occur.
Posted: 23 Jun 2021 | Published: 23 Jun 2021

TOPICS:  Security
Malwarebytes

MSPs: How to Stop Chasing False Positives and Grow Your Business
sponsored by Malwarebytes
DATA SHEET: Check out this solution brief to learn how Malwarebytes mitigates false positives for MSPs through a multi-layered protection strategy while also providing informed telemetry, and threat intelligence.
Posted: 23 Jun 2021 | Published: 23 Jun 2021

TOPICS:  Security
Malwarebytes

Computer Weekly - 22 June 2021: A new three-year plan for digital government
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, the new CEO of the Gov-ernment Digital Service, Tom Read, explains his three-year strategy for improving online public services. EU attempts to regulate AI are under fire – we examine the issues. And we find out how Bupa is turning to the cloud to deliver per-sonalised healthcare. Read the issue now.
Posted: 21 Jun 2021 | Published: 22 Jun 2021

ComputerWeekly.com

Cyber Security: 2021 Worst in Show
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide: Throughout 2021, there has been a strong focus worldwide on how to combat cyber security attacks for most businesses. In this e-guide we take a look at the best of the worst of those attacks to happen throughout January to June this year and how businesses can learn/adapt from these attacks.
Posted: 09 Jun 2021 | Published: 09 Jun 2021

ComputerWeekly.com

AWS Certified Security Specialty Exam Study Guide.
sponsored by TechTarget
RESOURCE: We're giving you FREE access to our e-book that covers the AWS Certified Security - Specialty Exam, where author Stuart Scott shares insights on how to prepare for the exam and reap the professional benefits of the certification. Be sure to complete our quick survey to access the e-book.
Posted: 29 May 2021 | Published: 28 Aug 2021

TechTarget

How do you solve a problem like security training?
sponsored by ComputerWeekly.com
EGUIDE: In this E-Guide, we will the tricky topic of security awareness training. Firstly, we try to answer the burning question of how to get employees to pay attention to training and take it seriously. Then, we take a look at some security awareness best practices that you can use to craft training your users will actually benefit from.
Posted: 17 May 2021 | Published: 17 May 2021

ComputerWeekly.com

Ransomware and the Cost of Downtime
sponsored by Datto, Inc.
WHITE PAPER: According to a recent study, in the first half of 2020 ransomware attacks grew by 715% as cybercriminals began exploiting the pandemic. Take a deep dive into this infographic to learn more about ransomware attacks, the true cost of downtime, and how a business continuity and disaster recovery (BCDR) platform can help protect your clients.
Posted: 13 May 2021 | Published: 13 May 2021

TOPICS:  Security
Datto, Inc.

The Essential Cybersecurity Toolkit For Smbs
sponsored by Datto, Inc.
EBOOK: This eBook offers up tips for training employees on cybersecurity best practices through real world examples. Plus, some essential solutions aimed to help SMBs defend against, and recover from, cyberattacks.
Posted: 06 May 2021 | Published: 06 May 2021

TOPICS:  Security
Datto, Inc.

Preventing identity theft in a data breach
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, we will explore the links between ransomware attacks, data breaches and identity theft. First, Nicholas Fearn investigates the phenomenon of the double extortion attack, and shares some insider advice on how to stop them, while we'll explore the top five ways data backups can protect against ransomware in the first place.
Posted: 06 May 2021 | Published: 06 May 2021

ComputerWeekly.com

IT Priorites 2020 - After Covid 19 security goes back to basics
sponsored by ComputerWeekly.com
EGUIDE: This year's transition to remote working highlighted big gaps in the fundamentals of security, as updated TechTarget/Computer Weekly data reveals.
Posted: 06 May 2021 | Published: 06 May 2021

ComputerWeekly.com

How to Stop Firefighting Webinar
sponsored by BROADCOM, Inc
VIDEO: Discover how you can re-evaluate your security firefighting approach and reduce risk with a comprehensive strategy built on best practices.
Posted: 04 May 2021 | Premiered: 04 May 2021

TOPICS:  Security
BROADCOM, Inc

Verticalization and Cybersecurity: The Benefits of Specializing for Security
sponsored by ConnectWise
WEBCAST: Jump into this webinar and Q&A to join Jay Ryer and David Powell from ConnectWise as they cover how industry-specific knowledge can put MSPs in different positions with their clients, as well as why cybersecurity is evolving from an IT issue to a business one.
Posted: 04 May 2021 | Premiered: May 4, 2021

TOPICS:  Security
ConnectWise

2021 Perch MSP Threat Report
sponsored by ConnectWise
WEBCAST: In this webinar, industry experts focus in on the 2021 Perch MSP Threat Report, evaluating MSP-related security events and trends. Tune in now to learn more details around why MSPs are vulnerable targets, predictions for 2021 and more.
Posted: 03 May 2021 | Premiered: May 3, 2021

TOPICS:  Security
ConnectWise

Security Think Tank: Critical National Infrastructure
sponsored by ComputerWeekly.com
EGUIDE: We asked our regular panel of cyber experts, the Computer Weekly Security Think Tank, to consider and highlight the risks posed to industrial control systems (ICS) and other elements of operational technology (OT), and advise on what steps CNI operators should be taking to address them.
Posted: 27 Apr 2021 | Published: 27 Apr 2021

ComputerWeekly.com

5 Tips for Evaluating AI-Driven Security Solutions
sponsored by BlackBerry
WHITE PAPER: In this new era of cybersecurity, vendors like to boast about their supposed AI capabilities. The problem is that AI has become a favorite term of marketers and has been watered down to buzzword status. Read this evaluation guide to learn how to cut through the noise and evaluate AI solutions.
Posted: 22 Apr 2021 | Published: 22 Apr 2021

TOPICS:  Security
BlackBerry

Security Think Tank: Biden's Cyber Security Plan
sponsored by ComputerWeekly.com
EGUIDE: As Biden sets out his agenda for the next four years, the Computer Weekly Security Think Tank considers the opportunities for renewed international collaboration on cyber security, what aspects of cyber policy Biden would be best advised to focus on, and asks how the industry can better make its voice heard.
Posted: 22 Apr 2021 | Published: 22 Apr 2021

ComputerWeekly.com

Why It’s Time for a Next-Gen Approach to BYOD Security, Privacy, and Productivity
sponsored by BlackBerry
DATA SHEET: As more remote employees use their own desktops, laptops and tablets, BYOD is gaining momentum. A next-generation approach to security can maximize user productivity and satisfaction, while cutting costs and allowing for better business continuity. Read the business brief to learn more.
Posted: 21 Apr 2021 | Published: 21 Apr 2021

TOPICS:  Security
BlackBerry

Critical Event Management Capabilities Drive Organizational Resiliency Amidst Uncertainty
sponsored by BlackBerry
ANALYST REPORT: Recent critical events have shown enterprises that the ability to keep personnel safe and informed with secure and instant communication is essential. IDC concludes that a business continuity IT platform like BlackBerry Alert can help, while reducing organizational costs. Read more in this brief.
Posted: 21 Apr 2021 | Published: 21 Apr 2021

TOPICS:  Security
BlackBerry

Ultimate guide to cybersecurity incident response
sponsored by Fujifilm Recording Media USA, Inc.
EGUIDE: Learn actionable incident response strategies that your IT and enterprise security teams can use to meet today's security threats and vulnerabilities more effectively.
Posted: 20 Apr 2021 | Published: 16 Apr 2021

TOPICS:  Security
Fujifilm Recording Media USA, Inc.

The Future of Software Delivery Needs DevSecOps
sponsored by VMware Tanzu
WEBCAST: According to Forrester research, application security is a major priority for most organizations. However, any given team’s approach to security may have some major oversights. Here, find answers for all your security questions, including who owns security in a DevOps world, where DevSecOps is implemented, and what container security must focus on.
Posted: 19 Apr 2021 | Premiered: Apr 19, 2021

TOPICS:  Security
VMware Tanzu

Incident Response Solution Brief
sponsored by BlackBerry
DATA SHEET: Many organizations today are unprepared to respond effectively to a serious security incident. This is often due to chronic resource issues and inadequate planning. Read this solution brief to learn how BlackBerry Security Services and their AI-powered tools can help your team be ready.
Posted: 16 Apr 2021 | Published: 16 Apr 2021

TOPICS:  Security
BlackBerry
51 - 75 of 2749 Matches Previous Page    1 2 3 4 5 6    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences