Network Security Audits Reports

Infographic: 5 ways to achieve a risk-based security strategy
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this infographic, learn five steps to implement a risk-based security strategy that naturally delivers compliance as a consequence of an improved security posture.
Posted: 12 Mar 2020 | Published: 12 Mar 2020

TechTarget ComputerWeekly.com

Your Guide to Combatting Ransomware's Domination of 2017
sponsored by CyberArk
EGUIDE: Learn how to boost your ransomware security awareness in this expert e-guide. Additionally, discover why ransomware continues to be a major threat and what ransomware prevention tools can help you win the battle.
Posted: 06 Jun 2017 | Published: 02 Jun 2017

CyberArk

Security-In-Depth Using Integrated Risk-Conscious Controls
sponsored by Tripwire, Inc.
WHITE PAPER: This white paper explores how your organization can change the way it protects its critical data, combining preventive, detective and corrective controls to stop breaches from happening, detect threats as they arise, and correct settings that introduce security risk or non-compliance. Read now to learn more.
Posted: 28 Sep 2012 | Published: 30 Dec 2011

Tripwire, Inc.

IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
sponsored by IBM
WHITE PAPER: Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
Posted: 09 Oct 2014 | Published: 29 Nov 2013

IBM

Presentation Transcript: Helping to Reduce Compliance Costs for the UK Public Sector
sponsored by Dell SecureWorks
PRESENTATION TRANSCRIPT: Dell SecureWorks has vast experience in helping customers achieve successful audits against compliance standards. In this presentation trancript, Lee Lawson, Head of Security Testing and Response services with Dell SecureWorks, offers advice on how to maximize your budget.
Posted: 22 Aug 2011 | Published: 22 Aug 2011

Dell SecureWorks

7 Essential Steps to Achieve, Measure and Prove Optimal Security Risk Reduction
sponsored by Qualys, Inc.
WHITE PAPER: Rapid changes within technology, new server and software deployments, and the evolving sophistication of attack methods used to infiltrate systems and steal data create the greatest set of challenges faced by security and IT administrators trying to keep their systems secure and within regulatory compliance. Interested in reducing security risk?
Posted: 20 Oct 2009 | Published: 20 Oct 2009

Qualys, Inc.

An Expert Guide to the PCI DSS 3.0
sponsored by TechTarget Security
EBOOK: This expert handbook gives you the information that you require right now to understand the updated requirements for the PCI DSS 3.0, which went into effect in early 2014.
Posted: 31 Jan 2014 | Published: 31 Jan 2014

TechTarget Security

All Qualified Security Assessors Are Not Created Equal
sponsored by AT&T Corp
WHITE PAPER: The Payment Card Industry Data Security Standard (PCI DSS) requires Level 1 merchants and service providers to undergo an onsite assessment of their security systems and procedures annually. This assessment is typically performed by a Qualified Security Assessor (QSA). This paper provides criteria to consider in choosing a QSA for your assessment
Posted: 04 Aug 2010 | Published: 04 Aug 2010

AT&T Corp

Your IIoT Security Plan: Risks in Manufacturing
sponsored by Bayshore Networks
EGUIDE: In this e-guide learn how to get smart about industrial IoT security risks in manufacturing, as well as how to map out an industrial IoT plan to create a smooth-running, smart factory.
Posted: 02 Jun 2017 | Published: 26 May 2017

Bayshore Networks

What to Look for in Secure Sockets Layer
sponsored by TechTarget Security
EBOOK: This Buyer's Guide helps enterprise security pros get up to date on SSL encryption and aids them in determining what SSL certificate is best for their enterprise security strategy.
Posted: 04 May 2016 | Published: 04 May 2016

TechTarget Security