Searching all of TechTarget| 94,967 results for "securing"

Conversations: Network security

See all conversation search results provided by ITKE.

ComputerWeekly

Apr 04, 2016

Secure Voting

This report from WebRoots Democracy, a pressure group for e-voting, aims to answer the key questions surrounding online voting security and the potential e-voting systems. Continue Reading

SearchSecurity

By Keith Townsend ,Kevin Beaver ,Craig Mathias Manage Apr 21, 2016

Find the security advantage in SDN

The implications of software-defined networking (SDN) are still being sorted out. Still, there is little doubt that this approach brings sweeping changes throughout the IT infrastructure and the way it is managed.... Continue Reading

ComputerWeekly

Apr 18, 2016

Cyber Security 2016 and beyond

Cyber risks to businesses increasingly feature in the news as a growing number of companies are targeted by attacks aimed at stealing personal and intellectual property data, but despite this coverage, studies show... Continue Reading

ComputerWeekly

By Alex Scroxton Apr 13, 2016

BT seeks security recruits

BT is to recruit 900 people to its security business in the next 12 months as part of a push against cyber crime Continue Reading

SearchCloudComputing

By Stephen J. Bigelow Evaluate Apr 06, 2016

Prepare for these multicloud security snags

The interoperability hurdles that still exist in multicloud environments can create new security headaches for enterprise IT teams. Continue Reading

SearchSecurity

Get Started Apr 01, 2016

Integrated Security Systems Design

In this excerpt of Integrated Security Systems Design, author Thomas L. Norman explains the tools of security system design, the place of electronics in the process, how to establish electronic security program ... Continue Reading

SearchSecurity

By Michael Cobb Problem Solve Mar 25, 2016

How to tell a security backdoor from a vulnerability

Security backdoors and security vulnerabilities can often be confused with one another. Expert Michael Cobb offers guidance on distinguishing the two. Continue Reading

SearchSoftwareQuality

By Valerie Silverthorne News Feb 22, 2016

Job security and a big paycheck? Get security experience

Developers are in short supply all around but those with security experience are particularly in need. Here's how you can move your career in a new direction. Continue Reading

SearchAWS

By Kurt Marko Manage Apr 25, 2016

EC2 Security Group bundles security policy for instances

With a few exceptions, AWS customers have little control over the location or configuration of cloud infrastructure. EC2 Security Groups and Network Access Control Lists help protect workloads. Continue Reading

SearchCIO

By Emily McLaughlin Evaluate Apr 27, 2016

Enterprise security architecture: Technology overview

In this photo story, Nemertes Research CEO Johna Till Johnson reviews six enterprise security architecture technologies CIOs should consider when developing an IT security roadmap. Continue Reading