Searching all of TechTarget| 89,354 results for "securing"

Conversations: Network security

See all conversation search results provided by ITKE.


By Dave Shackleford Evaluate Jan 26, 2016

How Azure Security Center boosts Microsoft cloud security

Azure Security Center looks to enhance Microsoft's cloud platform by improving visibility and control. Expert Dave Shackleford outlines the features intended to do that. Continue Reading


By Mike O. Villegas Evaluate Jan 15, 2016

What should security automation do for enterprises?

Letting security automation handle certain tasks can make a security team more efficient. Here's which tasks should be automated and which should be left to the professionals. Continue Reading


By Simon Quicke Jan 08, 2016

Surge in demand for security specialists

Customers are struggling to find people with security skills handing the channel the chance to fill the gap Continue Reading


By Rob Wright News Dec 10, 2015

Pulse Secure readying Cloud Secure offering

Following its split from Juniper Networks, Pulse Secure looks to take on cloud access and authentication problems with a new product. Continue Reading


Feb 04, 2016

Security Think Tank: Ransomware exploits poor security practice in SMEs

What is the best strategy for business to protect against ransomware? Continue Reading


By Reda Chouffani ,Shaun Sutner Manage Feb 02, 2016

Best Practices for Secure Texting in Healthcare

As healthcare providers and vendors seek information about how to safeguard personal health information (PHI), texting is one area that without question carries a great deal of risk. It's convenient, but unsecured ... Continue Reading


By Robert Richardson News Feb 01, 2016

IoT security issues unplugged

A new ecosystem is needed for the Internet of Things and machine-to-machine communications, say thought leaders. But where does that leave security? Continue Reading


By Mike O. Villegas Manage Jan 26, 2016

How to limit privileged accounts and boost security

Too many privileged accounts can result in access abuse in enterprises. Expert Mike O. Villegas discusses which account privileges should be limited to reduce security incidents. Continue Reading


By Kevin Beaver Problem Solve Jan 25, 2016

How to stick to your IT security plan

Completing an IT security plan to protect the Windows Server environment requires setting deadlines to stay accountable. Continue Reading


By Michael Heller News Jan 20, 2016

Cisco Security Report: Dwell time and encryption security struggles

The Cisco Security Report for 2016 covered a lot of ground and adds to the encryption debate by noting that increased encryption creates more challenges for cybersecurity. Continue Reading