IT Management  >   Systems Operations  >  

System Security

RSS Feed   
System Security Reports
 
CW Europe – December 2018
sponsored by ComputerWeekly.com
EZINE: Dutch military intelligence have released a lot of details about the attempted to hack into the networks of the Organisation for the Prohibition of Chemical Weapons (OPCW) in The Hague.
Posted: 06 Dec 2018 | Published: 13 Dec 2018

ComputerWeekly.com

Gain Visibility into Assets and Vulnerabilities Across Any Environment
sponsored by Alert Logic
RESOURCE: Learn how you can gain visibility into your environments (cloud, on-premises, or hybrid), and identify the remediation steps required to eliminate exposures.
Posted: 30 Nov 2018 | Published: 30 Nov 2018

Alert Logic

The HoneyPot Project
sponsored by Armor
WHITE PAPER: Download this resource to uncover the results from a real-world demonstration that shows the types of attacks targeting public cloud environments for small and midsized businesses called the Honeypot Project.
Posted: 19 Nov 2018 | Published: 19 Nov 2018

Armor

MSSP Buyer's Guide: For Security Orchestration & Automation Platforms
sponsored by Siemplify
WHITE PAPER: As the MSSP market continues to flourish, customer demand and intense competition places margins under constant pressure. This guide outlines the challenges faced by MSSPs and sets out the criteria to consider when presented with orchestration as a solution. It also provides direction regarding the implantation of orchestration.
Posted: 07 Dec 2018 | Published: 07 Dec 2018

Siemplify

Build Identity Verification Processes with the Power of AI
sponsored by Jumio
EGUIDE: This expert e-guide explores recent developments in AI-powered identity verification technology. Get tips on how to outsmart potential fraudsters by finding out how you can improve your identity verification practices by building machine learning and other AI-based technologies into your security strategy.
Posted: 19 Nov 2018 | Published: 15 Nov 2018

Jumio

6 Steps For Building a Robust Incident Response Function
sponsored by IBM Resilient
WHITE PAPER: Organizations globally realize that working only to prevent and detect cyberattacks will not protect them against cyber security threats. Download this white paper to learn about IBM Resilient, and review the 6 steps to developing sophisticated and robust incident response functions.
Posted: 26 Nov 2018 | Published: 26 Nov 2018

IBM Resilient

Computer Weekly – 11 December 2018: Manchester's evolution from rag trade to digital hub
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we visit Manchester to examine the city's growing digital and e-commerce industry and find out why the former home of the UK rag trade has been so successful. We look at the challenges of IT security in the quantum computing age. And we talk to Bloomberg's CTO about tech innovation. Read the issue now.
Posted: 07 Dec 2018 | Published: 07 Dec 2018

ComputerWeekly.com

Seizing Control of Software Supply Chain Security
sponsored by CrowdStrike
WHITE PAPER: When it comes to software supply chain attacks, the picture is clear: Too many organizations are not placing enough emphasis on these types of attacks. Download this global cybersecurity survey report for key findings and recommendations on how to prevent software supply chain attacks, today.
Posted: 19 Nov 2018 | Published: 19 Nov 2018

CrowdStrike

Intrusion Detection Systems (IDS)
sponsored by Armor
WHITE PAPER: In this white paper, learn about 2 different Intrusion Detection Systems (IDS) that can analyze and correlate all security events, and trigger further investigation by a Security Operations Center when necessary.
Posted: 19 Nov 2018 | Published: 19 Nov 2018

Armor

Armor Complete: Technical Solution Brief
sponsored by Armor
RESOURCE: Learn about secure cloud hosting platform and how it could help your organization reduce the burden of security without compromising it.
Posted: 28 Nov 2018 | Published: 28 Nov 2018

Armor
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement