Compliance Week
> Research Library > Technology > Security
 

Security

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.
Results 1 - 25 of 2245Sort Results By: Published Date | Title | Company Name
White Paper Published By: IBM MaaS360     Published Date: Sep 27, 2016
Protecting confidential data while keeping mobile users productive.
Tags : 
ibm, mobile, mobilize, mobile data security, security
    
IBM MaaS360
White Paper Published By: IBM MaaS360     Published Date: Sep 27, 2016
Learn How Enterprise Mobility Has Forever Changed the Way Enterprises Conduct and Secure Business
Tags : 
ibm, maas360, mobile, security, mobile security
    
IBM MaaS360
White Paper Published By: BitSight Technologies     Published Date: Sep 26, 2016
Learn how ransomware is evolving - and which industries are the most susceptible to attacks. Read this BitSight Insights report to learn: - How the rate of ransomware infections has grown over the past year - Which industries have exhibited the most ransomware infections - How businesses can directly mitigate the threat of ransomware infections, as well as infections originating from third party vendors and suppliers
Tags : 
bitsight, cyber crime, cyber attacks, ransomware, cyber security
    
BitSight Technologies
White Paper Published By: Hewlett Packard Enterprise     Published Date: Jul 12, 2016
IT security used to be about keeping intruders out and selectively letting in friendly visitors, which was best accomplished with a range of perimeter security and end-point solutions. Download this asset to learn more how the landscape has fundamentally shifted since, with much of this shift accelerating in the last 2-3 years. Sponsored by: HPE and Intelģ
Tags : 
best practices, technology, security, business management, intel
    
Hewlett Packard Enterprise
White Paper Published By: BitSight Technologies     Published Date: Jul 07, 2016
Download this white paper to learn: - Why vendor risk management is becoming a standard business practice - About the challenges organizations face in building formalized vendor risk programs - How to move beyond "point-in-time" tools and begin continuously monitoring your vendors.
Tags : 
bitsight, risk management, cybersecurity, vrm practices, vendor risk management
    
BitSight Technologies
White Paper Published By: IBM MaaS360     Published Date: Jul 01, 2016
Mobile is the new playground for thieves: How to protect against mobile malware
Tags : 
ibm, mobile, security, mobility
    
IBM MaaS360
White Paper Published By: IBM MaaS360     Published Date: Jul 01, 2016
Best practices for mobile application lifecycle management: Security from design through deployment
Tags : 
ibm, mobile, mobile applications, application lifecycle, security
    
IBM MaaS360
White Paper Published By: IBM MaaS360     Published Date: Jul 01, 2016
The purpose of this research is to understand how companies are reducing the risk of unsecured mobile apps in the workplace.
Tags : 
ibm, mobile, mobile applications, security
    
IBM MaaS360
White Paper Published By: IBM MaaS360     Published Date: Jun 30, 2016
Learn how to protect corporate data when users use personal devices for work
Tags : 
ibm, bring your own device, byod, mobile, security
    
IBM MaaS360
White Paper Published By: IBM MaaS360     Published Date: Jun 30, 2016
A humorous look at ITís challenges in managing Bring Your Own Device (BYOD) for todayís organizations
Tags : 
ibm, mobile, mobile device management, mdm, security
    
IBM MaaS360
White Paper Published By: BitSight Technologies     Published Date: May 26, 2016
Does your organization have sensitive data stored across the globe? Learn how understanding the global cyber threat landscape can help evaluate the potential risks of doing business in certain nations in this report.
Tags : 
bitsight, data security, risk management, cybersecurity, vrm practices
    
BitSight Technologies
White Paper Published By: BitSight Technologies     Published Date: May 26, 2016
With this guide, youíll never have to wonder about that again. Youíll learn: - How to nail down your presentation goals and style. - How to select metrics your board will care about. - Things to keep in mind before and after a board presentation.
Tags : 
bitsight, risk management, cybersecurity, vrm practices, vendor risk management
    
BitSight Technologies
White Paper Published By: BitSight Technologies     Published Date: Feb 29, 2016
Cybersecurity is an issue facing nearly every organization todayóand if you arenít taking the necessary precautions, your company, customers, and vendors could all suffer.
Tags : 
cybersecurity, security risk, security ratings, security, it management
    
BitSight Technologies
White Paper Published By: Qualys     Published Date: Feb 17, 2016
Automated asset inventory might not be the first thing that comes to mind when considering cutting-edge security technologies. In the context of todayís distributed enterprise, however, itís essential. Since the apps, systems, and services your users access to conduct business are already in the cloud, it makes sense to consider looking to cloud-based technologies to keep track of them all. For the security and compliance professional, itís critical to have access to a reliable and accurate asset inventory, especially when investigating security incidents and verifying and demonstrating compliance.
Tags : 
qualys, security technology, cloud based technology, best practices, security
    
Qualys
White Paper Published By: Qualys     Published Date: Feb 17, 2016
Itís not easy being todayís CISO or CIO. With the advent of cloud computing, Shadow IT, and mobility, the risk surface area for enterprises has increased dramatically, while IT budgets have shrunk and skilled cyber security talent is virtually impossible to find. Thankfully, the CIS Top 20 Critical Controls provides a pragmatic approach, offering prioritized guidance on the important steps for implementing basic cyber hygiene practices. With the CIS Top 20 Critical Security Controls, CISOs now have a blueprint for reducing risk and managing compliance. By automating each of these controls, CISOs enable their information security teams to do much more with less, essentially operationalizing good cyber hygiene.
Tags : 
qualys, cis, critical security, cloud computing, cyber security
    
Qualys
Webinar Published By: BitSight Technologies     Published Date: Jan 27, 2016
During this webinar, BitSight CTO and Co-Founder Stephen Boyer shows you how to use Security Ratings to quickly and accurately assess the security risk an acquisition target (or other third party) brings to your information ecosystem.
Tags : 
cybersecurity, security risk, acquisition target, security ratings, risk-based conversations
    
BitSight Technologies
White Paper Published By: BitSight Technologies     Published Date: Jan 11, 2016
Need some assistance with the creation of your vendor security risk assessment? This eBook contains vital questions you should be incorporating into your vendor risk management program.
Tags : 
security, it management, knowledge management, data management, data center
    
BitSight Technologies
White Paper Published By: BitSight Technologies     Published Date: Jan 11, 2016
Why does the cyber security performance of several industries differ? Download the latest BitSight Industry Benchmarking report to find out.
Tags : 
security, it management, knowledge management, data management, data center
    
BitSight Technologies
White Paper Published By: BitSight Technologies     Published Date: Jan 11, 2016
Is Illegal File Sharing Occurring Within Your or Your Vendorsí Cyber Ecosystem? Learn about the risks posed by peer-to-peer file sharing and why you should be monitoring this activity.
Tags : 
security, it management, data management
    
BitSight Technologies
White Paper Published By: IBM MaaS360     Published Date: Oct 08, 2015
Federal: This white paper reviews requirements from the National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) about Mobile Device security for usage in Federal affairs.
Tags : 
ibm, nist, dod, mobile device management, data security
    
IBM MaaS360
White Paper Published By: Qualys     Published Date: Jun 03, 2015
Get all the Facts and See How to Implement a Successful Vulnerability Management Program
Tags : 
management implementation, network security, solutions, key resources, security
    
Qualys
White Paper Published By: BitSight Technologies     Published Date: Feb 03, 2015
Download "Making Risk Management More Effective with Security Ratings" to learn how BitSight is revolutionizing the way organizations manage security risk throughout their ecosystem.
Tags : 
risk management, security ratings, compliance mandates, executive reporting, security risk assessments
    
BitSight Technologies
White Paper Published By: BitSight Technologies     Published Date: Feb 03, 2015
In this white paper, Jon Oltsik, Senior Principle Analyst at Enterprise Strategy Group, explores the need for objective security performance metrics in order to identify, quantify and mitigate cyber risk across the business ecosystem.
Tags : 
security ratings, it risk mitigation, cyber risk, performance metrics, network security risk
    
BitSight Technologies
White Paper Published By: BitSight Technologies     Published Date: Feb 03, 2015
Download "Cybersecurity Is Essential for M&A Due Diligence" to learn how Security Ratings can help you examine the risk your latest target poses to your information security (and potentially your bottom line).
Tags : 
cybersecurity, security ratings, acquistion target, cybersecurity assessment, information security
    
BitSight Technologies
White Paper Published By: Qualys     Published Date: Jan 08, 2015
Drivers for cloud solutions include the need to innovate, simplify and cut costs. Users say a key benefit cloud-based security is no need to deploy equipment or software. The cloud provider furnishes and hosts everything in secure data centers. This arrangement lets your business avoid capital expenses and to control ongoing costs. This paper describes how your small or medium-sized company can manage IT risks and maintain regulatory compliance with minimal staff and budget.
Tags : 
cloud solutions, security, secure data centers, it risks, compliance
    
Qualys
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.