Searching all of TechTarget| 95,413 results for "securing"

Conversations: Network security

See all conversation search results provided by ITKE.

ComputerWeekly

Apr 04, 2016

Secure Voting

This report from WebRoots Democracy, a pressure group for e-voting, aims to answer the key questions surrounding online voting security and the potential e-voting systems. Continue Reading

SearchSecurity

By Mike O. Villegas Evaluate May 03, 2016

Could a security pledge replace security awareness training?

Some universities use a security pledge so that students commit to good cybersecurity practices. Mike O. Villegas discusses whether this might work for enterprise employees. Continue Reading

SearchSecurity

By Kim Lindros ,Ed Tittel Evaluate May 04, 2016

What to Look for in Secure Sockets Layer

Any website that collects or transmits sensitive information must be protected by Secure Socket Layer encryption. SSL and its successor, Transport Security Layer (TLS), are security protocols used to create an ... Continue Reading

SearchSecurity

By Kathleen Richards Manage May 02, 2016

Network security infrastructure isn't only for hackers

Rapidly changing environments, from sprawl to consolidation, increase the challenges of network risk analysis, proper segmentation, and policy and change management. Continue Reading

SearchSecurity

By Keith Townsend ,Kevin Beaver ,Craig Mathias Manage Apr 21, 2016

Find the security advantage in SDN

The implications of software-defined networking (SDN) are still being sorted out. Still, there is little doubt that this approach brings sweeping changes throughout the IT infrastructure and the way it is managed.... Continue Reading

ComputerWeekly

Apr 18, 2016

Cyber Security 2016 and beyond

Cyber risks to businesses increasingly feature in the news as a growing number of companies are targeted by attacks aimed at stealing personal and intellectual property data, but despite this coverage, studies show... Continue Reading

ComputerWeekly

By Alex Scroxton Apr 13, 2016

BT seeks security recruits

BT is to recruit 900 people to its security business in the next 12 months as part of a push against cyber crime Continue Reading

SearchCloudComputing

By Stephen J. Bigelow Evaluate Apr 06, 2016

Prepare for these multicloud security snags

The interoperability hurdles that still exist in multicloud environments can create new security headaches for enterprise IT teams. Continue Reading

SearchSecurity

Get Started Apr 01, 2016

Integrated Security Systems Design

In this excerpt of Integrated Security Systems Design, author Thomas L. Norman explains the tools of security system design, the place of electronics in the process, how to establish electronic security program ... Continue Reading

ComputerWeekly

By Warwick Ashford May 23, 2016

Israel’s cyber security frontier

The Israeli city of Beer Sheva is quickly becoming a global centre of cyber security technology Continue Reading