Searching all of TechTarget| 82,501 results for "securing"

Conversations: Chat Server Security

See all conversation search results provided by ITKE.

ComputerWeekly

By Warwick Ashford Mar 10, 2015

Security professionals look to workload security in the cloud

The first Cloud Security Spotlight Report shows broad cloud adoption and move towards workload security Continue Reading

SearchCloudSecurity

By Rob Wright News Mar 06, 2015

CSA introduces security frameworks for government cloud security

The Cloud Security Alliance's new frameworks for the European Union offer baseline security measures for government agencies worldwide deploying secure cloud services. Continue Reading

SearchSoftwareQuality

By Kevin Beaver Get Started Mar 24, 2015

Software security testing: Where to start

For those of us new to software security testing, it can be an intimidating field of study. Where do the veterans suggest we begin? Continue Reading

SearchSecurity

By David Strom Evaluate Mar 23, 2015

The evolution of MFA security tokens

Tokens secure IT software and services by serving as additional factors. This slideshow takes a look back at the humble beginnings of MFA technology and how well security tokens now secure enterprise IT assets. Continue Reading

SearchSecurity

By Mike O. Villegas Problem Solve May 04, 2015

How can security pros cope with a limited information security budget?

Many security professionals have to operate within a small information security budget. Expert Mike O. Villegas reviews some tips to maximizing the budget and persuading management to increase it. Continue Reading

SearchSecurity

By Michael Cobb Evaluate Feb 18, 2015

Are security seals a worthwhile website security check?

Security seals were created to help convey trust and protection to website users, but can they really be trusted? Security expert Michael Cobb explains. Continue Reading

ComputerWeekly

Mar 13, 2015

Information security in the retail chain

This article in our Royal Holloway Information Security Thesis Series looks at how automated distribution centres play a business-critical role in the retail supply chain, and any challenge to their continuous ... Continue Reading

SearchSecurity

Get Started Mar 11, 2015

Why SSL security matters

This video introduces SSL and describes SSL certificates and certificate authorities. It explains the concept capturing plain text traffic and SSL-encrypted traffic to show how easily an attacker can grab data as ... Continue Reading

SearchSecurity

By Eric Parizo News Apr 27, 2015

On healthcare data security, not all security pros see unique challenges

At an RSA Conference 2015 discussion on healthcare data security, experts with decades of experience perceive a unique challenge, while security pros see similarities with other verticals. Continue Reading

ComputerWeekly

Mar 06, 2015

How to secure the SDN infrastructure

As more enterprises look to deploy software-defined networking, the need for security from the ground up should not be underestimated Continue Reading