All Research Sponsored By:TechTarget Security
-
Intrusion Detection and Prevention: Decision Time
Learn how to evaluate your potential vendor's IDS/IPS product and its ability to meet your specific business requirements.
-
Intrusion Detection and Prevention: RFP Technology Decisions
To properly evaluate IDS/IPS products, you must understand vendor offerings and how well they fit with your organization.
-
Intrusion Detection and Protection: From Business Problem to Technical Solution
Learn how IDS/IPS help you thwart attacks and mitigate post-attack damage.
-
Information Security Magazine – October 2014
Continuous monitoring has been part of the information security lexicon for years. So why are so many security professionals still wondering how to get a program started?
-
Data Loss Prevention: Decision Time
This expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.
-
Data Loss Prevention: RFP Technology Decisions
This expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.
-
Data Loss Prevention: From Business Problem to Technical Solution
This expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.
-
Windows Shopping: Will 8.1 Meet Your Security Needs?
Microsoft Windows 8.1 attempts to respond to a demand for new security features for network endpoints and user devices. This technical guide offers a concise review of its security features and whether MS Windows 8.1 fills its promises.
-
Information Security Magazine: September 2014
Open source software vulnerabilities have security executives worried. Lower your risk by revisiting application security policy and enforcing development best practices.
-
Countering Cyber-Crime with a Sharp Eye and a Clear Plan
Bigger, more diverse networks mean a bigger attack surface for hackers. Today's networking pros must assess and update network security strategies to account for new vulnerabilities and respond to inevitable attacks.
-
Securing the Internet of Things
Discover the risks related to the IoT and what you can do to mitigate them. Gain an understanding of how traditional threats are altered by the IoT and what steps must be taken now to get a viable and effective IoT policy in place.
-
Information Security Magazine – July/August 2014
Big data and security with non-relational data management platforms are too often an afterthought. Here's what you need to get started with NoSQL security.
-
Information Security ASEAN July 2014
This issue looks at the state of the Personal Data Protection Act in Singapore and Malaysia?
-
Information Security ANZ July 2014
This ezine looks at how will new privacy laws impact IT departments in Australia?
-
TechTarget's Annual Salary and Careers Survey Results
The results of TechTarget's 2013 IT Salary and Careers Survey chart the compensation, job satisfaction and project priorities of 1,711 IT professionals, including hundreds of senior IT leaders.
-
TechTarget's 2013 Annual Salary and Careers Infographic
TechTarget's 2013 Annual Salary and Careers Survey polled 1,711 IT professionals on their 2013 compensation, anticipated future earnings and technology priorities in 2014.
-
Information Security E-Zine – June 2014
Global threat intelligence services have continued to evolve and play more of role in SIEM and endpoint security products. How can threat intelligence benefit risk scenarios?
-
Coming at You: How to Deal with the Latest DDoS Attacks
Access this TechGuide to learn more about DDoS threats and how to protect your systems—while shape-shifting cyberattackers are tough to stay ahead of, they're too destructive to ignore.
-
Insider Edition: There's No Room for Either/Or When It Comes to Cloud and Security
Improved capabilities for logging and reporting cloud-based activity are now available, as are new ways for cloud providers to certify and communicate their security postures. This Insider Edition looks at efforts such as the STAR certification and the recently announced CloudTrust protocol.
-
Information Security – May 2014
The online authentication protocols proposed by the Fast Identity Online Alliance face a reality check. As FIDO-ready products ship, what are the implications for enterprises?
-
Information Security Magazine – April 2014
In this issue, we help you assess your mobile security strategy in the face of emerging threats and attackers' use of mobile devices to carry out attacks.
-
Information Security ASEAN March 2014
This ezine looks at the security challenges facing IT security professionals in the ASEAN region with a look at threats and industry trends.
-
Information Security ANZ March 2014
This issue looks at the security challenges facing IT security professionals in the Australia/New Zealand region.
-
What’s the Best Focus for MDM Strategy Now?
This guide provides expert advice on how to craft a mobile device security strategy that safeguards enterprise assets and prevents minor security issues from becoming major security disasters.
-
Technical Guide on Application Security
This expert Tech Guide from SearchSecurity.com offers insight on today's application security threat environment, as well as key recommendations and challenges with implementing the latest defense tools.