Searching all of TechTarget| 89,282 results for "security"

security: In information technology, security is the protection of information assets through the use of ...

See all definition search results provided by WhatIs.com

Conversations: Network security

See all conversation search results provided by ITKE.

SearchCloudSecurity

By Dave Shackleford Evaluate Jan 26, 2016

How Azure Security Center boosts Microsoft cloud security

Azure Security Center looks to enhance Microsoft's cloud platform by improving visibility and control. Expert Dave Shackleford outlines the features intended to do that. Continue Reading

SearchSecurity

By Mike O. Villegas Evaluate Jan 15, 2016

What should security automation do for enterprises?

Letting security automation handle certain tasks can make a security team more efficient. Here's which tasks should be automated and which should be left to the professionals. Continue Reading

MicroscopeUK

By Simon Quicke Jan 08, 2016

Surge in demand for security specialists

Customers are struggling to find people with security skills handing the channel the chance to fill the gap Continue Reading

SearchCloudSecurity

By Rob Wright News Dec 10, 2015

Pulse Secure readying Cloud Secure offering

Following its split from Juniper Networks, Pulse Secure looks to take on cloud access and authentication problems with a new product. Continue Reading

ComputerWeekly

Feb 04, 2016

Security Think Tank: Ransomware exploits poor security practice in SMEs

What is the best strategy for business to protect against ransomware? Continue Reading

SearchHealthIT

By Reda Chouffani ,Shaun Sutner Manage Feb 02, 2016

Best Practices for Secure Texting in Healthcare

As healthcare providers and vendors seek information about how to safeguard personal health information (PHI), texting is one area that without question carries a great deal of risk. It's convenient, but unsecured ... Continue Reading

SearchSecurity

By Robert Richardson News Feb 01, 2016

IoT security issues unplugged

A new ecosystem is needed for the Internet of Things and machine-to-machine communications, say thought leaders. But where does that leave security? Continue Reading

SearchSecurity

By Mike O. Villegas Manage Jan 26, 2016

How to limit privileged accounts and boost security

Too many privileged accounts can result in access abuse in enterprises. Expert Mike O. Villegas discusses which account privileges should be limited to reduce security incidents. Continue Reading

SearchWindowsServer

By Kevin Beaver Problem Solve Jan 25, 2016

How to stick to your IT security plan

Completing an IT security plan to protect the Windows Server environment requires setting deadlines to stay accountable. Continue Reading

SearchSecurity

By Michael Heller News Jan 20, 2016

Cisco Security Report: Dwell time and encryption security struggles

The Cisco Security Report for 2016 covered a lot of ground and adds to the encryption debate by noting that increased encryption creates more challenges for cybersecurity. Continue Reading