IT Management  >   Systems Operations  >  

Security

RSS Feed   
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 

Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Reports
51 - 75 of 2948 Matches Previous Page  |  Next Page
F-Secure Countercept
sponsored by F-Secure
DATA SHEET: Gartner estimates that 50% of companies will adopt Managed Detection and Response (MDR) services by 2025. In this data sheet, learn about F-Secure Countercept, an MDR service built by attackers for defenders.
Posted: 27 Apr 2021 | Published: 27 Apr 2021

TOPICS:  Security
F-Secure

Security Think Tank: Critical National Infrastructure
sponsored by ComputerWeekly.com
EGUIDE: We asked our regular panel of cyber experts, the Computer Weekly Security Think Tank, to consider and highlight the risks posed to industrial control systems (ICS) and other elements of operational technology (OT), and advise on what steps CNI operators should be taking to address them.
Posted: 27 Apr 2021 | Published: 27 Apr 2021

ComputerWeekly.com

Accelerate Cloud Migration through Secure, Automated Access into AWS Resources
sponsored by AWS Okta
WHITE PAPER: Learn how you can accelerate your cloud migration with Okta and AWS in this white paper.
Posted: 23 Apr 2021 | Published: 23 Apr 2021

TOPICS:  Security

5 Tips for Evaluating AI-Driven Security Solutions
sponsored by BlackBerry
WHITE PAPER: In this new era of cybersecurity, vendors like to boast about their supposed AI capabilities. The problem is that AI has become a favorite term of marketers and has been watered down to buzzword status. Read this evaluation guide to learn how to cut through the noise and evaluate AI solutions.
Posted: 22 Apr 2021 | Published: 22 Apr 2021

TOPICS:  Security
BlackBerry

Security Think Tank: Biden's Cyber Security Plan
sponsored by ComputerWeekly.com
EGUIDE: As Biden sets out his agenda for the next four years, the Computer Weekly Security Think Tank considers the opportunities for renewed international collaboration on cyber security, what aspects of cyber policy Biden would be best advised to focus on, and asks how the industry can better make its voice heard.
Posted: 22 Apr 2021 | Published: 22 Apr 2021

ComputerWeekly.com

Why It’s Time for a Next-Gen Approach to BYOD Security, Privacy, and Productivity
sponsored by BlackBerry
DATA SHEET: As more remote employees use their own desktops, laptops and tablets, BYOD is gaining momentum. A next-generation approach to security can maximize user productivity and satisfaction, while cutting costs and allowing for better business continuity. Read the business brief to learn more.
Posted: 21 Apr 2021 | Published: 21 Apr 2021

TOPICS:  Security
BlackBerry

Critical Event Management Capabilities Drive Organizational Resiliency Amidst Uncertainty
sponsored by BlackBerry
ANALYST REPORT: Recent critical events have shown enterprises that the ability to keep personnel safe and informed with secure and instant communication is essential. IDC concludes that a business continuity IT platform like BlackBerry Alert can help, while reducing organizational costs. Read more in this brief.
Posted: 21 Apr 2021 | Published: 21 Apr 2021

TOPICS:  Security
BlackBerry

Ultimate guide to cybersecurity incident response
sponsored by Fujifilm Recording Media USA, Inc.
EGUIDE: Learn actionable incident response strategies that your IT and enterprise security teams can use to meet today's security threats and vulnerabilities more effectively.
Posted: 20 Apr 2021 | Published: 16 Apr 2021

TOPICS:  Security
Fujifilm Recording Media USA, Inc.

The Future of Software Delivery Needs DevSecOps
sponsored by VMware Tanzu
WEBCAST: According to Forrester research, application security is a major priority for most organizations. However, any given team’s approach to security may have some major oversights. Here, find answers for all your security questions, including who owns security in a DevOps world, where DevSecOps is implemented, and what container security must focus on.
Posted: 19 Apr 2021 | Premiered: Apr 19, 2021

TOPICS:  Security
VMware Tanzu

Incident Response Solution Brief
sponsored by BlackBerry
DATA SHEET: Many organizations today are unprepared to respond effectively to a serious security incident. This is often due to chronic resource issues and inadequate planning. Read this solution brief to learn how BlackBerry Security Services and their AI-powered tools can help your team be ready.
Posted: 16 Apr 2021 | Published: 16 Apr 2021

TOPICS:  Security
BlackBerry

2021 State of Open-Source Security Report
sponsored by Contrast Security
WHITE PAPER: Open-source libraries are growing in complexity, increasing risk while making it more difficult to secure modern applications. The 2021 State of Open-source Security Report uses telemetry from actual applications protected by Contrast OSS and Contrast Assess to reveal trends about library usage, vulnerabilities, and best practices. Read it here.
Posted: 15 Apr 2021 | Published: 15 Apr 2021

TOPICS:  Security
Contrast Security

Incident Response In The New Work From Home Economy
sponsored by Tanium
WHITE PAPER: This paper discusses the challenges for incident handlers to respond to breaches in the new work-from-home economy and what tactics, techniques, and tools can be used to respond to incidents, including those affecting workloads in the cloud.
Posted: 12 Apr 2021 | Published: 12 Apr 2021

TOPICS:  Security
Tanium

IDC Marketscape: Worldwide Managed Security Services 2020 Vendor Assessment
sponsored by AT&T Cybersecurity
ANALYST REPORT: Download the report today to see what the IDC MarketScape had to say in their worldwide managed security services 2020 vendor assessment.
Posted: 08 Apr 2021 | Published: 08 Apr 2021

TOPICS:  Security
AT&T Cybersecurity

Protecting Cloud Workloads from 2021’s Top Cloud Threat
sponsored by Radware
WHITE PAPER: Get an overview of the security challenges brought about by migrating computing workloads to public cloud environments and learn how Radware addresses those challenges and assists organizations in protecting themselves.
Posted: 07 Apr 2021 | Published: 07 Apr 2021

TOPICS:  Security
Radware

10 Essential Capabilities of aModern SOC
sponsored by Splunk
WHITE PAPER: To build a modern SOC, organizations need a security operations platform that supports 10 key capabilities. Tap into this e-book to find out what they are.
Posted: 07 Apr 2021 | Published: 07 Apr 2021

TOPICS:  Security
Splunk

TOP 50 Security Threats
sponsored by Splunk
EBOOK: Download this e-book for the top 50 security threats from A-Z. All 106 pages will tell you what you need to know about each threat, how the attack happens, and where it comes from.
Posted: 06 Apr 2021 | Published: 06 Apr 2021

TOPICS:  Security
Splunk

Royal Holloway: The Computer Misuse Act and the characteristics of convicted hackers
sponsored by ComputerWeekly.com
RESEARCH CONTENT: In this Royal Holloway article, the authors go beyond the perpetuated stereotypes often found in media surrounding hackers by analysing the characteristics of real-life convicted hackers in the UK, who were charged under the Computer Misuse Act
Posted: 01 Apr 2021 | Published: 07 Apr 2021

ComputerWeekly.com

CW Middle East - April-June 2021: Qatari financial services regulator launches platform to help combat money laundering
sponsored by ComputerWeekly.com
EZINE: The Qatar Financial Markets Authority is using a digital platform to enable financial services professionals to assess their knowledge of anti-money laundering and combating the financing of terrorism.
Posted: 31 Mar 2021 | Published: 15 Apr 2021

ComputerWeekly.com

Boosting Expertise in Clinical Engineering atTRIMEDX
sponsored by CyberVista
CASE STUDY: TRIMEDX, a global leader in clinical asset management in healthcare, needed a cybersecurity training program for a clinical engineering workforce of more than 3,100 team members. Download this case study to learn how their partnership with CyberVista helped them prepare employees for the worst that threat actors have to offer.
Posted: 30 Mar 2021 | Published: 30 Mar 2021

CyberVista

The Total Economic Impact™ Of Secureworks ® Taegis™ Managed X Dr
sponsored by Dell SecureWorks
ANALYST REPORT: To better understand the benefits, costs, and risks associated with this investment, Forrester interviewed four customers with experience using Secureworks ManagedXDR. Download the report to see what they said.
Posted: 26 Mar 2021 | Published: 26 Mar 2021

TOPICS:  Security
Dell SecureWorks

Tanium's Star Set To Rise On The European Market
sponsored by Tanium
ANALYST REPORT: This Vendor Profile, written by IDC, looks at the development of Tanium with a specific focus on its expanding presence in Europe, as well as the development of its solutions portfolio. Download this report to learn more.
Posted: 26 Mar 2021 | Published: 26 Mar 2021

TOPICS:  Security
Tanium

CW Europe - September-November 2020: IT expertise in banks' boardrooms reduces risk, says European regulator
sponsored by ComputerWeekly.com
EGUIDE: The European Central Bank has found that banks with the most IT expertise in the boardroom have better control in several IT risk categories, including fewer successful cyber attacks and less downtime of critical IT systems.
Posted: 26 Mar 2021 | Published: 26 Mar 2021

ComputerWeekly.com

From The Node Up: The Complete Guide To Kubernetes Security
sponsored by Palo Alto Networks
EBOOK: Download this e-book to learn how to design a security strategy that reinforces, rather than hinders, the rest of your Kubernetes-based processes.
Posted: 25 Mar 2021 | Published: 25 Mar 2021

TOPICS:  Security
Palo Alto Networks

Royal Holloway: Testing antivirus efficacy in Linux
sponsored by ComputerWeekly.com
EZINE: Antivirus software plays an important part in protecting users and networks from malware, so installing and keeping it up-to-date is essential in securing computing devices. Yet Linux users believe this OS can only be marginally affected by malicious software. In this Royal Holloway article, we evaluate the effectiveness of some antivirus products.
Posted: 25 Mar 2021 | Published: 25 Mar 2021

ComputerWeekly.com

How to Become a Threat Hunter
sponsored by Cisco Systems Inc.
EGUIDE: Much of hunting is instinct, and when it comes to hunting cyberthreats, it’s no different. Threat hunters are good at what do because they aren’t as ‘by-the-book’ as other professionals. But they do have a set of learnable skills that make them successful. Download this e-guide featuring Gartner analyst John Collins to know what these skills are.
Posted: 14 Apr 2021 | Published: 07 Apr 2021

Cisco Systems Inc.
51 - 75 of 2948 Matches Previous Page    1 2 3 4 5 6    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences