IT Management  >   Systems Operations  >  

Security

RSS Feed   
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 

Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Reports
76 - 100 of 3417 Matches Previous Page  |  Next Page
The Cybersecurity Effectiveness Podcast: MacKenzie Brown
sponsored by Verodin
PODCAST: In this podcast, listen as Microsoft Detection and Response Team (DART) consultant MacKenzie Brown describes how her love of theatre led her to her current work with incident response (IR) and becoming co-founder of the Ms. Greyhat Organization.
Posted: 09 Sep 2019 | Premiered: Sep 9, 2019

Verodin

3 Steps to Managing Shadow IT
sponsored by Cisco Umbrella
WHITE PAPER: In today's digital workplace, organizations, departments, and individual users are embracing the cloud and leveraging new apps at rapid speed. This makes it difficult for security leaders to track app use and ensure that proper protections are in place. In this white paper, uncover 3 steps to managing shadow IT.
Posted: 09 Sep 2019 | Published: 09 Sep 2019

Cisco Umbrella

How to Respond to the 2019 Threat Landscape
sponsored by Cymulate
ANALYST REPORT: In this Gartner report, discover key traits of the 2019 cybersecurity landscape, how continuous security risk assessments enable tackling threats, and more.
Posted: 09 Sep 2019 | Published: 09 Sep 2019

Cymulate

Protecting Point-of-Sale Systems
sponsored by Morphisec, Inc.
PRODUCT OVERVIEW: With their highly valuable payment card and personal sensitive information, Point-of-Sale systems present a ripe target for cybercrime. Modern POS environments are complicated systems with multiple entry points for attack. In this brief, learn about the anatomy of a POS attack and what organizations can do to prevent against these attacks.
Posted: 09 Sep 2019 | Published: 09 Sep 2019

Morphisec, Inc.

Getting Started with DevSecOps
sponsored by ZeroNorth
WEBCAST: Collaboration between development and security teams is key to DevSecOps transformation and involves both cultural and technological shifts. In this webcast, Andrei Bezdedeanu, ZeroNorth VP of Engineering, discusses how to get started with DevSecOps and the resulting benefits.
Posted: 09 Sep 2019 | Premiered: Sep 9, 2019

ZeroNorth

Cybersecurity Effectiveness Podcast: Ed Amoroso
sponsored by Verodin
PODCAST: Tune into this episode of the Cybersecurity Effectiveness Podcast to hear Brian Contos chat with Ed Amoroso, former SVP and CSO of AT&T and current CEO of TAG Cyber LLC, about priorities and advice for building a top-notch security team.
Posted: 06 Sep 2019 | Premiered: Sep 6, 2019

Verodin

How a Global Pharmaceutical Leader Boosted Security and Efficiency
sponsored by Cisco Umbrella
CASE STUDY: As Lundbeck, a global pharmaceutical leader expanded, so too did the need to manage its Cisco Cloud Web Security (CWS) solution. Download this case study to see how Lundbeck saw success with Cisco Umbrella.
Posted: 06 Sep 2019 | Published: 06 Sep 2019

Cisco Umbrella

You Need to See It to Protect It: How Real-Time Visibility and IT Hygiene Drive AWS EC2 Security
sponsored by Amazon Web Services
WHITE PAPER: Organizations are increasingly connecting mission-critical apps and data to AWS and taking advantage of its scalable Elastic Compute Cloud (EC2). But, managing and securing your own EC2 environment can become a challenge. In this white paper, learn how real-time visibility and good IT hygiene can drive AWS EC2 security.
Posted: 06 Sep 2019 | Published: 06 Sep 2019

Amazon Web Services

The Cybersecurity Effectiveness Podcast: Richard Seiersen
sponsored by Verodin
PODCAST: Seasoned cybersecurity veteran Richard Seiersen, current SVP & CISO at LendingClub and former VP of Trust and CISCO for Twillio, attributes success in any career to two things: metrics and measurement. In this podcast, he shares his contagious passion for security, the qualities of top engineers, his latest book, and more.
Posted: 06 Sep 2019 | Premiered: Sep 6, 2019

Verodin

End-of-Life Data Security Gap Analysis
sponsored by Iron Mountain
DATA SHEET: Staying up-to-date with new and evolving data security regulations, while also keeping growing amounts of data secure, is a major challenge for most industries. Download this checklist to help you assess and improve your end-of-life data management strategy and execution.
Posted: 06 Sep 2019 | Published: 06 Sep 2019

Iron Mountain

Threat Protection for VDI
sponsored by Morphisec, Inc.
DATA SHEET: Learn how to protect your Virtual Desktop Infrastructure (VDI) from zero-days and sophisticated advanced attacks with Moving Target Defense technology.
Posted: 06 Sep 2019 | Published: 06 Sep 2019

Morphisec, Inc.

Trend Report: Employees Like to Use Unsanctioned Apps — and Don't Plan to Stop
sponsored by Cisco Umbrella
WHITE PAPER: Employees are downloading apps to do their work faster, but this is causing risk to the business. IT can't secure what it can't see, which means threats can creep in. In this white paper, learn how Cisco Umbrella can help you discover which SaaS apps are being used, who's using them, and what risks they pose to your organization.
Posted: 06 Sep 2019 | Published: 06 Sep 2019

Cisco Umbrella

How to Test Your Security Effectiveness
sponsored by Verodin
WHITE PAPER: Download this white paper to learn about the Verodin Security Instrumentation Platform (SIP)—which uses a signal to continuously validate the layered defenses in your infrastructure to ensure they're optimally configured and working as expected.
Posted: 05 Sep 2019 | Published: 05 Sep 2019

Verodin

Cybersecurity Effectiveness Podcast: Featuring Greg Martin
sponsored by Verodin
PODCAST: The Cybersecurity Effectiveness Podcast: The Age of the Intelligent SOC features JASK CEO and Co-Founder, Greg Martin. In this episode, hear his predictions about the key cybersecurity challenges that organizations will be facing in the near future as well as the ground-breaking developments in AI and SOC automation.
Posted: 05 Sep 2019 | Premiered: Sep 5, 2019

Verodin

Remove Assumptions, Prove Security
sponsored by Verodin
WHITE PAPER: With no visibility into their cybersecurity effectiveness beyond a point in time, organizations have grown accustomed to holding a reactionary stance when managing their cybersecurity risks. Learn about Verodin SIP, an evidence based approach to managing your cybersecurity lifecycle.
Posted: 05 Sep 2019 | Published: 05 Sep 2019

Verodin

5 Ways to Reduce Risk and Boost Productivity
sponsored by Citrix
WHITE PAPER: While IT must enable both the flexibility employees need to be productive and the security the business requires, this balancing act often ends in compromise. In this white paper, explore 5 ways a secure digital workspace can reduce risk and boost productivity.
Posted: 05 Sep 2019 | Published: 05 Sep 2019

Citrix

The Cybersecurity Effectiveness Podcast: Richard Stiennon
sponsored by Verodin
PODCAST: In this podcast, listen to Richard Stiennon, serial author, industry expert, and Chief Research Analyst at IT-Harvest, discuss how security is maturing at the executive leadership level.
Posted: 05 Sep 2019 | Premiered: Sep 5, 2019

Verodin

How the Gigamon Insight Solution Can Help Secure Medical Devices
sponsored by Gigamon
WHITE PAPER: As the number of medical devices being used in HDOs' networks increase, so too does the number of targets for threat actors. In this white paper, learn about a passive network security monitoring solution and how it cover the existing medical devices in an HDO's network, but also any new devices that are placed onto the network.
Posted: 05 Sep 2019 | Published: 05 Sep 2019

Gigamon

Defending the Digital Enterprise
sponsored by Gigamon
WHITE PAPER: Given the amount of encrypted traffic and the threat vector it now poses, you need a way to efficiently decrypt traffic, share it with tools and then re-encrypt it. In this white paper, discover 7 things you need to do to successfully decrypt your SSL and TLS traffic.
Posted: 05 Sep 2019 | Published: 05 Sep 2019

Gigamon

Protection Inside and Outside the Office: The New State of Cybersecurity
sponsored by Cisco Umbrella
RESOURCE: Download this infographic to explore key findings from the Enterprise Strategy Group's survey of 450 cybersecurity experts on their experience protecting a network without perimeters.
Posted: 05 Sep 2019 | Published: 05 Sep 2019

Cisco Umbrella

Making Application & Infrastructure Vulnerability Management More Effective
sponsored by ZeroNorth
WHITE PAPER: Organizations are struggling to keep up with the dizzying pace it takes to roll out new software capabilities, which only deepens the challenge of keeping up with risks across applications and infrastructure. In this white paper, discover 5 steps you can take to help begin your Application and Infrastructure Vulnerability Management Program.
Posted: 05 Sep 2019 | Published: 05 Sep 2019

ZeroNorth

Will the GDPR Affect Your Organization?
sponsored by SAP
WHITE PAPER: In this brief white paper, explore how SAP Business ByDesign can help your organization maintain GDPR compliance. Review Business ByDesign product features and benefits, and decide if SAP Business ByDesign is right for your organization.
Posted: 05 Sep 2019 | Published: 31 Dec 2017

SAP

How Security Can Fuel Innovation
sponsored by ZeroNorth
WHITE PAPER: This white paper discusses how, by shifting security left in the development process for true DevSecOps, it's now no longer an obstacle to DevOps innovation, velocity and competitiveness. Instead, it's an asset. Read on to learn how.
Posted: 04 Sep 2019 | Published: 04 Sep 2019

ZeroNorth

Enhance your Cloud Security with AMD EPYC Hardware Memory Encryption
sponsored by AMD
DATA SHEET: Consumers and enterprises are becoming increasingly concerned about the security of their digital data, and with just cause. This sense of heightened concern is particularly relevant given the ongoing migration of end user data into the cloud. Read on to learn about the protection requirements for data in flight, data at rest, and data in use.
Posted: 04 Sep 2019 | Published: 04 Sep 2019

AMD

Incident Response: Your How-To Guide
sponsored by Farsight Security
EGUIDE: As the rate of cybersecurity incidents grows, security teams are looking for all the help they can get to prevent, detect and respond to attacks. Incident response can help. Download this e-guide to learn how your organization can build an incident response framework, how and when to use incident response tools, and more.
Posted: 04 Sep 2019 | Published: 04 Sep 2019

Farsight Security
76 - 100 of 3417 Matches Previous Page    2 3 4 5 6 7    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement