Searching all of TechTarget| 96,969 results for "securing"

Conversations: Network security

See all conversation search results provided by ITKE.


By Bob Egan Manage Aug 24, 2016

Mobile security issues and solutions

Mobile technology usage is growing just as the number of threats facing mobile data is growing. CIOs must combat mobile security issues to stay ahead in the mobile-dominated world. Continue Reading


By Sean Martin ,Michael Cobb ,Johna Till Johnson Manage Aug 19, 2016

What's New in IAM Security and Strategy

Most of the pivotal changes in identity and access management, or IAM, were discussed and developed at least ten years ago. Deployment of advanced IAM security technology has been glacial in comparison to most ... Continue Reading


By Simon Quicke Aug 09, 2016

Demand for security consultancy on the rise

Gartner has been looking into what the rest of this year holds for the security market and concluded that consultancy and outsourcing are in demand Continue Reading


Get Started Aug 02, 2016

DevOps and security? Here's how

The automation of development and operations processes, known as DevOps, is catching on in project teams and business units across industries. The missing component in many of these high-risk scenarios? Security. ... Continue Reading


By Esther Shein Get Started Jun 29, 2016

MSP security portfolios: How to offer security awareness training

Expand your MSP security portfolio by offering security awareness training, an important layer to clients' overall security initiatives. Continue Reading


By Mike Gillespie Jun 27, 2016

Security Think Tank: A starter guide for biometrics in security

How can organisations move to biometric authentication of users without running the risk of exposing sensitive biometric information? Continue Reading


By Brien Posey Get Started Jun 23, 2016

Customize security settings with the Security Configuration Wizard

The Security Configuration Wizard can help organizations secure servers, but admins should be cautious when converting security policies into group policy objects. Continue Reading


By Kristen Lee Manage Jun 21, 2016


Apr 04, 2016

Secure Voting

This report from WebRoots Democracy, a pressure group for e-voting, aims to answer the key questions surrounding online voting security and the potential e-voting systems. Continue Reading


By Erin Dale Evaluate Aug 24, 2016

How mobile biometrics can strengthen security

The eye-opening reality: iris scans, and other biometric authentication methods, will soon be used for enterprise mobile security, phasing out the old username and password. Continue Reading