IT Management  >   Systems Operations  >  

Security

RSS Feed   
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 

Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Reports
1 - 25 of 3237 Matches Previous Page  |  Next Page
Why It’s Time for a Next-Gen Approach to BYOD Security, Privacy, and Productivity
sponsored by BlackBerry
DATA SHEET: As more remote employees use their own desktops, laptops and tablets, BYOD is gaining momentum. A next-generation approach to security can maximize user productivity and satisfaction, while cutting costs and allowing for better business continuity. Read the business brief to learn more.
Posted: 21 Apr 2021 | Published: 21 Apr 2021

TOPICS:  Security
BlackBerry

Critical Event Management Capabilities Drive Organizational Resiliency Amidst Uncertainty
sponsored by BlackBerry
ANALYST REPORT: Recent critical events have shown enterprises that the ability to keep personnel safe and informed with secure and instant communication is essential. IDC concludes that a business continuity IT platform like BlackBerry Alert can help, while reducing organizational costs. Read more in this brief.
Posted: 21 Apr 2021 | Published: 21 Apr 2021

TOPICS:  Security
BlackBerry

Ultimate guide to cybersecurity incident response
sponsored by Fujifilm Recording Media USA, Inc.
EGUIDE: Learn actionable incident response strategies that your IT and enterprise security teams can use to meet today's security threats and vulnerabilities more effectively.
Posted: 20 Apr 2021 | Published: 16 Apr 2021

TOPICS:  Security
Fujifilm Recording Media USA, Inc.

How to protect your organizations digital footprint
sponsored by ActZero
VIDEO: In this short video, discover 3 tips on how to protect your organization’s digital footprint.
Posted: 20 Apr 2021 | Premiered: 20 Apr 2021

TOPICS:  Security

Cybersecurity Key Performance Indicators
sponsored by ActZero
WHITE PAPER: Better KPIs make for better cybersecurity. This white paper covers KPI best practices with a detailed KPI Matrix you can use to up-level your cybersecurity program. Download now to get started.
Posted: 20 Apr 2021 | Published: 20 Apr 2021

TOPICS:  Security

How Appsian Improves SAP Segregation of Duties Violations Management
sponsored by Appsian
DATA SHEET: From stopping fraud, theft, and errors to preventing SOX compliance violations, SAP Segregation of Duties (SoD) can help minimize business risk. Learn more on how to reduce your SAP SoD risk exposure today.
Posted: 19 Apr 2021 | Published: 19 Apr 2021

TOPICS:  Security
Appsian

WFH Security Considerations: Remain Remote or Return to Office Question
sponsored by ActZero
WHITE PAPER: Employers will likely have to deal with a workforce that wants to work at home more so than in the past. That means dealing with risks. In this white paper, learn how a cloud-ready MDR service can provide endpoint security for endpoints no matter where they reside.
Posted: 19 Apr 2021 | Published: 19 Apr 2021

TOPICS:  Security

Vmware Tanzu Video
sponsored by VMware Tanzu
WEBCAST: According to Forrester research, application security is a major priority for most organizations. However, any given team’s approach to security may have some major oversights. Here, find answers for all your security questions, including who owns security in a DevOps world, where DevSecOps is implemented, and what container security must focus on.
Posted: 19 Apr 2021 | Premiered: Apr 19, 2021

TOPICS:  Security
VMware Tanzu

OPEN SOURCE SECURITY AND RISK ANALYSIS REPORT
sponsored by Synopsys
WHITE PAPER: Open-source security and risk analysis is crucial for every and any IT team. That’s why this report provides an in-depth snapshot of the current state of open-source security, compliance, licensing, and code quality risk in commercial software. Keep your software secure. Read the report here.
Posted: 19 Apr 2021 | Published: 19 Apr 2021

TOPICS:  Security

Incident Response Solution Brief
sponsored by BlackBerry
DATA SHEET: Many organizations today are unprepared to respond effectively to a serious security incident. This is often due to chronic resource issues and inadequate planning. Read this solution brief to learn how BlackBerry Security Services and their AI-powered tools can help your team be ready.
Posted: 16 Apr 2021 | Published: 16 Apr 2021

TOPICS:  Security
BlackBerry

Don’t let security trip you up
sponsored by Synopsys
WEBCAST: It’s time to shift the focus from reactive security to proactive security. Instead of focusing on new ways to find bugs already in the code base, you should address the root cause—by building expertise and providing the information needed to PREVENT bugs from entering the codebase.
Posted: 16 Apr 2021 | Premiered: Apr 16, 2021

TOPICS:  Security
Synopsys

The Changing Dynamics of AppSec, and Key Lessons You Can Learn
sponsored by Synopsys
WEBCAST: AppSec is continually evolving as new technologies come to the fore. In this resource, analyze some key recent trends in AppSec as well as the emerging activities that organizations are doing to protect themselves and their data.
Posted: 16 Apr 2021 | Premiered: Apr 16, 2021

TOPICS:  Security
Synopsys

2021 State of Open-Source Security Report
sponsored by Contrast Security
WHITE PAPER: Open-source libraries are growing in complexity, increasing risk while making it more difficult to secure modern applications. The 2021 State of Open-source Security Report uses telemetry from actual applications protected by Contrast OSS and Contrast Assess to reveal trends about library usage, vulnerabilities, and best practices. Read it here.
Posted: 15 Apr 2021 | Published: 15 Apr 2021

TOPICS:  Security
Contrast Security

New Survey Shows Integrating Application Security Testing Gaining Traction In Devops
sponsored by Synopsys
WHITE PAPER: Security professionals are focusing on DevOps to break traditional application security testing processes and tools—and for good reason. In this article, learn why an integrated DevSecOps approach is critical to building better code. Read the article here to see how your team can apply DevSecOps to your strategies.
Posted: 14 Apr 2021 | Published: 14 Apr 2021

TOPICS:  Security
Synopsys

The Forrester Wave™: Static Application Security Testing, Q1 2021
sponsored by Synopsys
ANALYST REPORT: In this exclusive Forrester Wave report, discover the 12 providers leading static application security testing (SAST), as well as what the next generation of SAST tools are focusing on. Get the details now. Save the report here.
Posted: 14 Apr 2021 | Published: 14 Apr 2021

TOPICS:  Security
Synopsys

Magic Quadrant For Application Security Testing
sponsored by Synopsys
ANALYST REPORT: The application security testing (AST) market is evolving—fast. In fact, according to new Gartner research, organizations will speed up their remediation of coding vulnerabilities identified by SAST by 30% by 2025, reducing time spent fixing bugs by 50%. Explore Gartner’s Magic Quadrant for AST here to see what other changes are to come.
Posted: 14 Apr 2021 | Published: 14 Apr 2021

TOPICS:  Security
Synopsys

How to Become a Threat Hunter
sponsored by Cisco Systems Inc.
EGUIDE: Much of hunting is instinct, and when it comes to hunting cyberthreats, it’s no different. Threat hunters are good at what do because they aren’t as ‘by-the-book’ as other professionals. But they do have a set of learnable skills that make them successful. Download this e-guide featuring Gartner analyst John Collins to know what these skills are.
Posted: 14 Apr 2021 | Published: 07 Apr 2021

Cisco Systems Inc.

Modernize DevOps with CyberArk Secrets Management and Red Hat OpenShift
sponsored by Red Hat
WEBCAST: No organization wants to be the next security breach headline in the news. However, many organizations still haven’t prioritized security enough to ensure a breach doesn’t happen. In this resource, explore how your organization can stay secure with the right DevSecOps flow, so that the only headlines about your team are positive ones.
Posted: 13 Apr 2021 | Premiered: Apr 13, 2021

TOPICS:  Security
Red Hat

Modern Application Development Security
sponsored by Synopsys
ANALYST REPORT: DevSecOps has moved security front and center in the world of modern development; however, security and development teams are driven by different metrics, making objective alignment challenging. In this exclusive ESG report, explore the most recent trends defining cybersecurity and development teams right now. Save the report here.
Posted: 13 Apr 2021 | Published: 13 Apr 2021

TOPICS:  Security
Synopsys

Day in the Life of a DevSecOps Professional
sponsored by Red Hat
WEBCAST: This video with Red Hat and Portshift explains how Snyk introduces security very early in the CI/CD pipeline, how OpenShift provides support for the pipeline itself and secures the platform, and ways in which Portshift extends security capabilities. View now to learn more.
Posted: 12 Apr 2021 | Premiered: Apr 12, 2021

TOPICS:  Security
Red Hat

Incident Response In The New Work From Home Economy
sponsored by Tanium
WHITE PAPER: This paper discusses the challenges for incident handlers to respond to breaches in the new work-from-home economy and what tactics, techniques, and tools can be used to respond to incidents, including those affecting workloads in the cloud.
Posted: 12 Apr 2021 | Published: 12 Apr 2021

TOPICS:  Security
Tanium

Can Your Security Keep Pace In A Devops Environment?
sponsored by Synopsys
WHITE PAPER: At the heart of DevSecOps is software assurance, which refers to the level of confidence that software will function as intended, as well as the prioritization that the software stay free of exploitable vulnerabilities. Explore how to ensure software assurance in your team’s DevOps strategy in this article. Read more here.
Posted: 12 Apr 2021 | Published: 12 Apr 2021

TOPICS:  Security
Synopsys

Bsimm11 Digest: The Ciso’s Guide To Modern Appsec
sponsored by Synopsys
WHITE PAPER: Many organizations have struggled to ensure their application security is keeping pace with accelerating development cycles. To succeed, application security must be integrated into every stage of the development pipeline—in other words, DevSecOps. This guide sets out to answer the most pressing DevSecOps questions. Find all the answers here.
Posted: 09 Apr 2021 | Published: 09 Apr 2021

TOPICS:  Security
Synopsys

IDC Marketscape: Worldwide Managed Security Services 2020 Vendor Assessment
sponsored by AT&T Cybersecurity
ANALYST REPORT: Download the report today to see what the IDC MarketScape had to say in their worldwide managed security services 2020 vendor assessment.
Posted: 08 Apr 2021 | Published: 08 Apr 2021

TOPICS:  Security
AT&T Cybersecurity

Protecting Cloud Workloads from 2021’s Top Cloud Threat
sponsored by Radware
WHITE PAPER: Get an overview of the security challenges brought about by migrating computing workloads to public cloud environments and learn how Radware addresses those challenges and assists organizations in protecting themselves.
Posted: 07 Apr 2021 | Published: 07 Apr 2021

TOPICS:  Security
Radware
1 - 25 of 3237 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences