IT Security Audits Reports

Infographic: 5 ways to achieve a risk-based security strategy
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this infographic, learn five steps to implement a risk-based security strategy that naturally delivers compliance as a consequence of an improved security posture.
Posted: 08 Feb 2021 | Published: 16 Aug 2019

TechTarget ComputerWeekly.com

What GDPR privacy requirements mean for U.S. businesses
sponsored by TechTarget Security
EBOOK: Enforcement of the EU's new GDPR privacy regulations is imminent, and potential fines send a clear message to companies to protect their customers, or else.
Posted: 27 Dec 2017 | Published: 26 Dec 2017

TechTarget Security

Application Development Security Requires Forethought
sponsored by Veracode, Inc.
EGUIDE: Learn how RASP, or runtime application self-protection, could be the answer to prevent vulnerabilities from slipping through the web app review process and block new, unforeseen threats.
Posted: 22 May 2017 | Published: 18 May 2017

Veracode, Inc.

Create an Effective Email Phishing Test in 7 Steps
sponsored by Cisco Umbrella
EGUIDE: In this expert guide, find out how you can create an effective email phishing test in 7 steps to see how vulnerable your organization really is.
Posted: 03 Sep 2019 | Published: 03 Sep 2019

Cisco Umbrella

E-Guide: Monitoring Strategies for Insider Threat Detection
sponsored by IBM
EGUIDE: In this e-guide, you will learn about practical strategies for implementing insider threat detection tools. Also covered in this e-guide are the three common types of insider crimes and how each one requires its own set of insider threat detection tactics. Read on to learn more about monitoring strategies for insider threat detection.
Posted: 22 Mar 2011 | Published: 22 Mar 2011

IBM

Database Security Audit and Protect Critical Databases
sponsored by Imperva
WHITE PAPER: Databases store extraordinarily valuable and confidential data. An increasing number of compliance regulations compel organizations to audit access to this sensitive data and protect it from attack and abuse.
Posted: 04 Feb 2011 | Published: 04 Feb 2011

Imperva

Incident Response Tools Can Help Automate Your Security
sponsored by Cisco Umbrella and Dimension Data
EGUIDE: In this era of nonstop security threats, incident response tools that help automate detection and reaction are now essential. In this expert e-guide, learn how to update your IR process.
Posted: 29 Mar 2017 | Published: 22 Mar 2017

Cisco Umbrella and Dimension Data

How to Effectively Manage the Cloud Logs of Security Events
sponsored by Splunk
EGUIDE: Discover the security growing pains created by the growth of cloud file sharing and collaboration services and how they are presenting new problems including "shadow cloud" and alert fatigue.
Posted: 16 May 2017 | Published: 11 May 2017

Splunk

What to Look for in Secure Sockets Layer
sponsored by TechTarget Security
EBOOK: This Buyer's Guide helps enterprise security pros get up to date on SSL encryption and aids them in determining what SSL certificate is best for their enterprise security strategy.
Posted: 04 May 2016 | Published: 04 May 2016

TechTarget Security

Presentation Transcript: Helping to Reduce Compliance Costs for the UK Public Sector
sponsored by Dell SecureWorks
PRESENTATION TRANSCRIPT: Dell SecureWorks has vast experience in helping customers achieve successful audits against compliance standards. In this presentation trancript, Lee Lawson, Head of Security Testing and Response services with Dell SecureWorks, offers advice on how to maximize your budget.
Posted: 22 Aug 2011 | Published: 22 Aug 2011

Dell SecureWorks