Searching all of TechTarget| 82,884 results for "securing"

Conversations: Chat Server Security

See all conversation search results provided by ITKE.

Sponsored May 19, 2015

Strategies for Securing Your Enterprise

As risks grow, IT must develop new strategies to identify and disrupt threat sources. Discover how to mitigate security risks and extend your capabilities as your business evolves. Continue Reading


Manage May 12, 2015


By George Lawton Evaluate May 11, 2015

Navigating containerization security

Containers are enabling a much faster pace of releasing consistent software, but architects need to rethink how to secure applications. Continue Reading


By Warwick Ashford Mar 10, 2015

Security professionals look to workload security in the cloud

The first Cloud Security Spotlight Report shows broad cloud adoption and move towards workload security Continue Reading


By Ernie Hayden Evaluate May 26, 2015

A look at the development of an ICS security framework

Building an ICS security framework was an in-depth process and combined many different cybersecurity standards. Here's a look at how it developed. Continue Reading


By Rob Wright News Mar 06, 2015

CSA introduces security frameworks for government cloud security

The Cloud Security Alliance's new frameworks for the European Union offer baseline security measures for government agencies worldwide deploying secure cloud services. Continue Reading


By Valerie Silverthorne Evaluate May 22, 2015

Implementing AWS security best practices

AWS has improved its security features and offers a slew of resources for hardening its cloud. But admins still play a part in preventing breaches. Continue Reading


By Karen Scarfone Get Started May 18, 2015

Introduction to email security gateways in the enterprise

Email security gateways protect enterprises from threats such as spam and phishing attacks. Expert Karen Scarfone explains how these products get the job done. Continue Reading


By Kevin Beaver Get Started Mar 24, 2015

Software security testing: Where to start

For those of us new to software security testing, it can be an intimidating field of study. Where do the veterans suggest we begin? Continue Reading


By David Strom Evaluate Mar 23, 2015

The evolution of MFA security tokens

Tokens secure IT software and services by serving as additional factors. This slideshow takes a look back at the humble beginnings of MFA technology and how well security tokens now secure enterprise IT assets. Continue Reading