Searching all of TechTarget| 41,969 results for "practices"

SearchSecurity

By Michael Heller News Sep 29, 2016

Yahoo breach calls into question detection and remediation practices

The Yahoo breach was the largest in history and the fallout is widespread, including a lawsuit, possible SEC investigation and questions about Yahoo's breach detection and response. Continue Reading

SearchITOperations

By Meredith Courtemanche News Sep 28, 2016

Create habitual IT security practices for the full stack

IT security should be so ingrained in developers and infrastructure managers it becomes second nature, rather than a stopping point along the flow of application lifecycles. Continue Reading

SearchSecurity

By Kevin Beaver Get Started Jul 12, 2016

Best practices for an information security assessment

Information security assessments can be effective for identifying and fixing issues in your enterprise's policies. Expert Kevin Beaver explains the key components of the process. Continue Reading

SearchCloudApplications

By George Lawton News Jul 06, 2016

Best practices for private cloud deployment

Find out how the world's largest betting site, Paddy Power Betfair, leveraged a private cloud to accelerate application delivery. Continue Reading

SearchNetworking

By Leon Adato Manage Sep 06, 2016

Automation key element in network monitoring best practices

The fundamentals underpinning network monitoring might be simple, but it doesn't mean keeping tabs on your network is easy. What can you do to improve your monitoring tool framework? Continue Reading

SearchServerVirtualization

By Brian Kirsch Manage Sep 01, 2016

Master IT documentation with the right tools and practices

IT documentation cannot be overlooked when it comes to complex environments. As such, be sure to choose the appropriate tools and best practices for your company. Continue Reading

SearchITOperations

By Beth Pariseau News Aug 29, 2016

SecOps is an art best practiced solo

DevOps is all about collaboration, but security reviews are best left to one individual within a company, startups say. Continue Reading

ComputerWeekly

Aug 24, 2016

CW@50: Bugs, blunders and bad practices

Computer Weekly’s arrival on 22 September 1966 reflected a growing global industry and the hopes for British computing Continue Reading

SearchUnifiedCommunications

By Tsahi Levent-Levi Manage Aug 16, 2016

What are best practices for managing WebRTC services?

Keep your WebRTC voice and video deployment up to date to make sure employees don't experience service disruptions. Tsahi Levent-Levi offers best practices to manage WebRTC. Continue Reading

SearchMobileComputing

By Craig Mathias Manage May 17, 2016

Mobile identity management best practices

IT admins need identity management tools to ensure network users are who they say they are. This applies to mobile users on an enterprise WLAN and the wired network itself. Continue Reading