The currency of trust: why banks and insurers must make customer data safer and more secure
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
Banks and insurers enjoy a significantly higher level of trust from consumers in the cyber security of their systems than any other sector, but the financial services industry is less confident in its ability to detect security breaches, this report from Capgemini reveals.
Posted: 08 Feb 2021 | Published: 25 Apr 2017
|
|
|
Royal Holloway: Purple team playbook – threat modeling for security testing
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
The reality of information security is that it is impossible to completely ensure that an attacker cannot get into the corporate network. Instead, companies should look at how they prepare and react to security attacks by gaining an understanding of how cyber criminals work by combining the talents of red teams and blue teams
Posted: 08 Feb 2021 | Published: 15 Jul 2020
|
|
|
SIEM, SOAR or both? Our security experts weigh in
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this E-Guide we turn to the Computer Weekly Security Think Tank, a hand-picked panel of cyber security insiders, experts, analysts, and advocates with over a century's worth of collective experience between them, to explore the topic of Security Information and Event Management (SIEM), and Security Orchestration, Automation and Response, (SOAR).
Posted: 08 Feb 2021 | Published: 21 Dec 2020
|
|
|
Mobile security moving to a unified approach
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
This e-guide offers expert insights into how the current trends in mobile security strategy are showing a move from mobile device management, to enterprise mobile management and unified endpoint management, which indicates a move towards a unified approach to mobile security.
Posted: 08 Feb 2021 | Published: 28 Feb 2018
|
|
|
Presentation Transcript: Endpoint security fundamentals
sponsored by Sophos
PRESENTATION TRANSCRIPT:
This presentation transcript, taken from the video of the same name, offers a "back-to-basics" look at endpoint security and helps you identify the truly critical components of an enterprise client security program, especially when budgets are tight.
Posted: 25 Jun 2009 | Published: 25 Jun 2009
|
|
|
Laws, regulations and compliance: Top tips for keeping your data under your Control
sponsored by Sophos UK
WHITE PAPER:
The challenges of complying with government, industry and internal regulations designed to protect data is becoming harder and more expensive to manage. This paper outlines the rules, looks at the main threats to security compliance and highlights how a well-defined strategy, backed up by powerful technology can provide the solution.
Posted: 20 Mar 2009 | Published: 01 Dec 2008
|
|
|
Presentation Transcript: The Economics of Endpoint Security
sponsored by Sophos UK
PRESENTATION TRANSCRIPT:
Check out this presentation transcript to learn about a great endpoint security solution while balancing budgetary requirements.
Posted: 25 Jun 2009 | Published: 24 Jun 2009
|
|
|
Information Security Magazine, July 09: Controlling Privileged Accounts
sponsored by Information Security Magazine
EZINE:
This month's cover story is about reigning in privileged accounts such as the UNIX root and Windows Administrator accounts. Regulatory requirements and economic realities are pressuring enterprises to secure their privileged accounts, but how? Also in this issue: Keeping UTM Unified instead of Unnecessary, and more. Read on to learn more.
Posted: 13 Jul 2009 | Published: 13 Jul 2009
|
|
|
Information Security Magazine: March 2009 - Sky-High Risk?
sponsored by Information Security Magazine
EZINE:
This month's issue of Information Security focuses on risk management. We'll cover many important topics, such as: Cloud Computing - cost savings vs. security concerns; Web 2.0 - ways monitor and manage Web 2.0 usage within your company; Web Application Firewalls - How to choose and implement the right WAF for your company; and much more.
Posted: 20 Apr 2009 | Published: 20 Mar 2009
|
|
|
Lowering Risk by Applying Consistent Security Across All of Your Locations
sponsored by Juniper Networks, Inc.
WEBCAST:
Security in today's IT infrastructure presents challenges to all sorts of organizations, but especially to distributed enterprises. Branch offices and remote locations are often less secure than the headquarters or main data center location. Watch this webcast to learn how and why you should ensure that every location is properly secured.
Posted: 17 Jul 2009 | Premiered: Jul 17, 2009
|
|