IT Management  >   Systems Operations  >  

System Security

RSS Feed   
System Security Reports
 
Successfully Scaling Cybersecurity for Remote Work: Keep the Cloud Your Safe Place
sponsored by Forcepoint
RESOURCE: As organizations work to enable and secure remote workers, it’s critical to keep in mind that having people work remotely can mean an increase in security threats. So, how can IT and security teams protect users and data without hurting productivity or morale? Read this article to find out.
Posted: 03 Jun 2020 | Published: 03 Jun 2020

Forcepoint

Successfully Scaling Cybersecurity for Remote Work: Keep the Cloud Your Safe Place
sponsored by Crosskey Cyber Security
RESOURCE: As organizations work to enable and secure remote workers, it’s critical to keep in mind that having people work remotely can mean an increase in security threats. So, how can IT and security teams protect users and data without hurting productivity or morale? Read this article to find out.
Posted: 03 Jun 2020 | Published: 03 Jun 2020

Crosskey Cyber Security

A CARTA- Based, Zero Trust Approach to Workload Security
sponsored by Rezilion
WEBCAST: In this webcast, learn how adopting a Continuous Adaptive Risk and Trust Assessment, or CARTA approach, provides a zero-trust foundation for security and risk management leaders to gain more insight for contextual-based decision-making.
Posted: 26 May 2020 | Premiered: May 26, 2020

Rezilion

Executive Brief: Why Secure Mobile Access Is A Strategic Business Imperative
sponsored by SonicWall
WHITE PAPER: According to a recent study, 75% of organizations consider flex work to be the new norm. However, in order to support their distributed workforce, organizations need to ensure they make secure mobile access a strategic imperative. Download this white paper to learn more about secure mobile access and discover why organizations are embracing it.
Posted: 29 May 2020 | Published: 29 May 2020

SonicWall

Threats Using Coronavirus as a Lure
sponsored by Trend Micro
WEBCAST: As the coronavirus continues to spread, so too does the wave of cyberattacks and campaigns that leverage the pandemic as their entry point. In this webinar, join Jon Clay, Director of Global Threat Communications at Trend Micro, as he highlights current threat trends and common tactics being used by hackers.
Posted: 26 May 2020 | Premiered: May 26, 2020

Trend Micro

Top 10 Security Events to Monitor in Azure Ad and Microsoft 365
sponsored by Quest
WHITE PAPER: Although cloud environments enable organizations to be more efficient, it often comes at the cost of additional vulnerabilities. In this e-book, take a closer look a 10 security events that administrators track closely to keep their cloud environments secure.
Posted: 28 May 2020 | Published: 28 May 2020

Quest

Knock, Knock: Is This Security Thing Working?
sponsored by VMware
WHITE PAPER: 2020 is close to its halfway mark, so now is the perfect time to reflect on the current progress of cybersecurity initiatives, as well as your security posture as a whole. This whitepaper provides a closer look at key issues and emerging trends in the cybersecurity landscape, in order to help gauge your progress and guide your planning.
Posted: 22 May 2020 | Published: 31 Mar 2020

VMware

Automated and Integral Protection for Company-Owned IT Systems in the Home Office
sponsored by Matrix42
WEBCAST: In this webinar, learn about the benefits of Matrix42 Workspace Security, automated protection for private IT systems in the home office.
Posted: 28 May 2020 | Premiered: May 28, 2020

Matrix42

Data Security with Okta and Netskope
sponsored by Okta + Netspoke
RESOURCE: As organizations continue to embrace the productivity and cost benefits of cloud capabilities, it’s now more important than ever the make sure the right security checks are in place to secure sensitive data. Read this blog post to discover the common points of failure, explore what a CASB is (and how it can help), and more.
Posted: 27 May 2020 | Published: 18 Jul 2018

Okta + Netspoke

What Is DevSecOps and How Should It Work?
sponsored by Acunetix
RESOURCE: Poised to be the successor to DevOps, DevSecOps is a relatively new concept that aims to join the previously separate functions of DevOps and SecOps into a unified environment that provides conditions for secure application development. Read this article to learn more about DevSecOps, its history and how you can get started.
Posted: 03 Jun 2020 | Published: 20 Aug 2019

Acunetix
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info