Searching all of TechTarget| 84,225 results for "securing"

Conversations: Network security

See all conversation search results provided by ITKE.


By Kurt Marko ,Dan Sullivan Manage Aug 24, 2015

Techniques to create a more secure AWS

Acceptance of the public cloud depends on users being comfortable with a provider’s security practices. Amazon Web Services, in particular, has been aggressive about enhancing its security offerings. Even so, users... Continue Reading


By Madelyn Bacon News Jul 29, 2015

Security operations centers could be key to better security

Video: Security operations centers are critical to continuous network monitoring and detecting data breaches. Eric Cole discusses SOCs and the role security automation plays in them. Continue Reading


By Jake O'Donnell News Jun 30, 2015

New Pulse Secure CEO on what mobile security lacks

Mobile security has come a long way, but organizations still have to address many sizable gaps. Continue Reading


Jul 24, 2015

The cost of security for UK business

The draft Investigatory Powers Bill to increase surveillance is already controversial, but there are growing concerns over the potential economic consequences Continue Reading


By Stephen J. Bigelow Manage Aug 25, 2015

Mitigating AWS compliance and security risks

Public cloud providers can suffer server failures like any other business. Startups need to be aware of their own risk tolerance while maintaining security standards. Continue Reading


By Ben Linders Manage Aug 25, 2015

How to handle security in Agile product development

In Agile product development, user stories may not be enough to ensure application security. Here are tips for dealing with security more effectively. Continue Reading


By Dan Sullivan Get Started Aug 21, 2015

What are the security concerns of backup as a service?

While backup as a service sounds like a great idea, there are several considerations to keep in mind prior to jumping in feet first. Expert Dan Sullivan explains. Continue Reading


By Linda Endersby Aug 20, 2015

Latest partnerships to spring up out of security challenge

Partnerships strengthening channel response to cybercrime and security demands Continue Reading


By Karl Flinders Aug 19, 2015

Mobile security – what works and what doesn’t?

Experts told the CW500 Security Club how mobility brings new challenges to security departments and an opportunity to go beyond building walls around the enterprise Continue Reading


Get Started Jun 24, 2015

Virtual desktop security guide

To secure virtual desktops, consider antivirus, certificates and network vulnerabilities. Just remember, VDI doesn't always increase desktop security. Continue Reading