IT Management  >   Systems Operations  >  

Security

RSS Feed   
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 

Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Reports
76 - 100 of 2924 Matches Previous Page  |  Next Page
Tanium's Star Set To Rise On The European Market
sponsored by Tanium
ANALYST REPORT: This Vendor Profile, written by IDC, looks at the development of Tanium with a specific focus on its expanding presence in Europe, as well as the development of its solutions portfolio. Download this report to learn more.
Posted: 26 Mar 2021 | Published: 26 Mar 2021

TOPICS:  Security
Tanium

CW Europe - September-November 2020: IT expertise in banks' boardrooms reduces risk, says European regulator
sponsored by ComputerWeekly.com
EGUIDE: The European Central Bank has found that banks with the most IT expertise in the boardroom have better control in several IT risk categories, including fewer successful cyber attacks and less downtime of critical IT systems.
Posted: 26 Mar 2021 | Published: 26 Mar 2021

ComputerWeekly.com

From The Node Up: The Complete Guide To Kubernetes Security
sponsored by Palo Alto Networks
EBOOK: Download this e-book to learn how to design a security strategy that reinforces, rather than hinders, the rest of your Kubernetes-based processes.
Posted: 25 Mar 2021 | Published: 25 Mar 2021

TOPICS:  Security
Palo Alto Networks

Royal Holloway: Testing antivirus efficacy in Linux
sponsored by ComputerWeekly.com
EZINE: Antivirus software plays an important part in protecting users and networks from malware, so installing and keeping it up-to-date is essential in securing computing devices. Yet Linux users believe this OS can only be marginally affected by malicious software. In this Royal Holloway article, we evaluate the effectiveness of some antivirus products.
Posted: 25 Mar 2021 | Published: 25 Mar 2021

ComputerWeekly.com

Review hybrid cloud management tools from Google, Azure, AWS, and more
sponsored by Techtarget
RESOURCE: Plenty of organizations are already using hybrid cloud strategies, but cloud management tools and strategies can oftentimes be more complex than they need to be. Open up this E-Book to explore hybrid cloud management tools from Google, AWS, Azure, and more.
Posted: 25 Mar 2021 | Published: 25 Mar 2021

Techtarget

Explore a hybrid cloud migration strategy
sponsored by Techtarget
RESOURCE: Check out this E-Guide on hybrid cloud adoption to learn benefits and advantages of hybrid cloud, how to migrate effectively, how to simplify your migration strategy, and much more.
Posted: 25 Mar 2021 | Published: 25 Mar 2021

Techtarget

It Leads The Way: How The Pandemic Empowered It
sponsored by Tanium
WHITE PAPER: Once you realize you can move all your users to WFH in days instead of years, you start to wonder what else you can do quickly. If massive changes are possible, how should IT organizations budget for 2021 and 2022? Read on to see what C-level decision-makers think on the matter.
Posted: 24 Mar 2021 | Published: 24 Mar 2021

TOPICS:  Security
Tanium

2021 Technology Spending Intentions Survey
sponsored by Tanium
ANALYST REPORT: In order to assess technology spending priorities over the next 12-18 months, ESG recently surveyed 664 IT and business professionals representing midmarket and enterprise-class organizations in North America and Western Europe. Download the report to uncover the results.
Posted: 24 Mar 2021 | Published: 24 Mar 2021

TOPICS:  Security
Tanium

How It Resilience Gaps Impact Your Business
sponsored by Tanium
WHITE PAPER: This report presents the results of a two-phase survey, conducted among 4,000+ business decision-makers and over 500 CIOs and CISOs, about the challenges IT leaders are facing today when balancing business security and continuity.
Posted: 24 Mar 2021 | Published: 24 Mar 2021

TOPICS:  Security
Tanium

Cyberwarfare Requiresspeed, Adaptability And Visibility To Win
sponsored by Tanium
ANALYST REPORT: Download this white paper by Chris Wilder, senior analyst for security at Moor Insights & Strategy, as he shares his expertise around the DoD and intelligence community's approach to cybersecurity, best practices to eliminate silos between IT ops and security teams, and how to deliver a force-multiplier for cybersecurity.
Posted: 23 Mar 2021 | Published: 23 Mar 2021

TOPICS:  Security
Tanium

Prisma Access 2.0: All Apps, All Users, Protected Anywhere
sponsored by Palo Alto Networks
WEBCAST: Digital transformation and work-from-anywhere mandates are driving massive changes to enterprise infrastructures. As a result, enterprises are faced with the challenge of effectively closing their security gaps while accommodating the productivity demands of their remote workforces.
Posted: 23 Mar 2021 | Premiered: Mar 23, 2021

TOPICS:  Security
Palo Alto Networks

Recognizing the Many Faces of Insider Threats
sponsored by Fortinet, Inc.
EBOOK: Insider threats pose significant risks to businesses. Whether caused by carelessness or malicious intent, insider threats can be mitigated. Access this e-book to read about the different forms of insider threats including, disgruntled employees, corporate spies, accidental exposures, outgoing employees, and more.
Posted: 23 Mar 2021 | Published: 23 Mar 2021

TOPICS:  Security
Fortinet, Inc.

Innovation Insight For Extended Detection And Response
sponsored by Palo Alto Networks
ANALYST REPORT: This Gartner report discusses both the advantages and the inherent risks of embracing an XDR solution. Inside the report, you'll find a deep dive into XDR product capabilities, an assessment of XDR benefits, uses and potential risks, examples of use cases where XDR makes sense, and criteria for evaluating the different offerings.
Posted: 23 Mar 2021 | Published: 23 Mar 2021

TOPICS:  Security
Palo Alto Networks

Royal Holloway: Protecting investors from cyber threats
sponsored by ComputerWeekly.com
RESEARCH CONTENT: The cyber security of personal investors who use UK investment platforms to manage their pensions or savings is not well understood and not often discussed. In this Royal Holloway security article, we identify the principal cyber threats to investors' assets on UK investment platforms and what can be done to prevent or mitigate these threats.
Posted: 22 Mar 2021 | Published: 24 Mar 2021

ComputerWeekly.com

Computer Weekly - 23 March 2021: Would the UK really nuke a cyber attacker?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, did the UK's defence and security review really suggest a nuclear response to a cyber attack? Data visualisation has been widely used to explain the Covid-19 pandemic, but not always that effectively. And jewellery retailer Pandora explains how it kept the personal touch as customers went online. Read the issue now.
Posted: 22 Mar 2021 | Published: 23 Mar 2021

ComputerWeekly.com

Secureworks: Connecting the Dots
sponsored by Dell SecureWorks
VIDEO: In this video, learn how you can use XDR to detect and respond to threats. It also explains how XDR can detect zero-day and malware-less attacks, and attackers using previously unknown tools.
Posted: 19 Mar 2021 | Premiered: 19 Mar 2021

TOPICS:  Security
Dell SecureWorks

Now’s the Time for an Integrated, Holistic and Cloud-Delivered Cybersecurity Model for Business Communications Services
sponsored by NWN Corporation
WHITE PAPER: Today's work-from-anywhere environment is giving organizations a golden opportunity to reevaluate their approach to cybersecurity and migrate to a model that is tightly aligned with the challenges their organization is facing. Download this white paper to learn more.
Posted: 19 Mar 2021 | Published: 19 Mar 2021

TOPICS:  Security
NWN Corporation

The Business Value of iboss cloud Enterprise Security Solutions
sponsored by iBoss
ANALYST REPORT: Throughout digital transformation efforts, enterprises need to keep a close eye on 4 main control points: Identities, applications, data and endpoints. How can you gain visibility without having to rely on legacy security? Download this IDC report to learn experiences that organizations have had using iboss cloud enterprise security solutions.
Posted: 18 Mar 2021 | Published: 31 Jan 2020

iBoss

Hitachi ID Bravura Discover
sponsored by Hitachi ID
DATA SHEET: Learn how Hitachi ID Bravura Discover delivers a powerful risk and threat assessment for both IAM and PAM solutions to help get your organization on the right track.
Posted: 12 Mar 2021 | Published: 12 Mar 2021

TOPICS:  Security
Hitachi ID

The 2021 Ransomware Survival Guide
sponsored by Proofpoint
EBOOK: Ransomware is an old threat that persists as a modern-day problem, but most companies are ill-prepared for a ransomware attack. Download this guide to find out what you can do before, during, and after a ransomware attack to protect your organization.
Posted: 11 Mar 2021 | Published: 11 Mar 2021

TOPICS:  Malware | Security
Proofpoint

5 Steps To Secure Your Remote Workforce: A Practical Guide
sponsored by Malwarebytes
EBOOK: Access this ebook to learn about the 5 steps to set your teams up for security success while working remote, including understand the challenges, regain control of your security posture, operationalizing security for remote work, and more.
Posted: 11 Mar 2021 | Published: 11 Mar 2021

TOPICS:  Security
Malwarebytes

Silver linings from 2020, for the future of work
sponsored by Okta
EBOOK: 5 leading technology directors recently participated in the Okta-sponsored Hot Topics series: “Dynamic Work: Reimagining the Workplace”. Read on to see what they had to say about the future of IT security and remote working.
Posted: 08 Mar 2021 | Published: 08 Mar 2021

TOPICS:  Security
Okta

CISSP Exam Guide: Chapter 1: Security and Risk Management
sponsored by McGraw Hill
WHITE PAPER: In this 174-page chapter download from McGraw Hill, learn everything you need to know about the first domain, security and risk management, to help you excel at your CISSP exam.
Posted: 08 Mar 2021 | Published: 31 Dec 2020

McGraw Hill

MITRE ATT&CK White Paper
sponsored by IronNet
WHITE PAPER: The MITRE ATT&CK Framework provides valuable and objective insights into the target of a threat and its current phase. Download this whitepaper to read about the 5 ways for a CISO to use the MITRE ATT&CK Framework including increasing your visibility of the threat landscape and strengthening your defensive posture now and over time.
Posted: 05 Mar 2021 | Published: 05 Mar 2021

IronNet

Securing Medical Technology Devices from 21st Century Cyber Criminals and Malware Attacks
sponsored by BlackBerry
WHITE PAPER: Over the past ten years, healthcare organizations have become the most targeted industry for cyber criminals, sustaining over 24% of all breaches. Learn about the benefits of the Blackberry Spark UES Suite including reduced risk against attacks such as zero-day threats and previously unknown malware.
Posted: 05 Mar 2021 | Published: 05 Mar 2021

BlackBerry
76 - 100 of 2924 Matches Previous Page    2 3 4 5 6 7    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences