Searching all of TechTarget| 83,790 results for "security"

security: In information technology, security is the protection of information assets through the use of ...

See all definition search results provided by Whatis.com

Conversations: Network security

See all conversation search results provided by ITKE.

SearchSecurity

By Madelyn Bacon News Jul 29, 2015

Security operations centers could be key to better security

Video: Security operations centers are critical to continuous network monitoring and detecting data breaches. Eric Cole discusses SOCs and the role security automation plays in them. Continue Reading

ComputerWeekly

Jul 24, 2015

The cost of security for UK business

The draft Investigatory Powers Bill to increase surveillance is already controversial, but there are growing concerns over the potential economic consequences Continue Reading

SearchMobileComputing

By Jake O'Donnell News Jun 30, 2015

New Pulse Secure CEO on what mobile security lacks

Mobile security has come a long way, but organizations still have to address many sizable gaps. Continue Reading

SearchVirtualDesktop

Get Started Jun 24, 2015

Virtual desktop security guide

To secure virtual desktops, consider antivirus, certificates and network vulnerabilities. Just remember, VDI doesn't always increase desktop security. Continue Reading

ComputerWeekly

Jun 10, 2015

How to secure the internet of things

With the expansion of the IoT market, protecting the company's data and IP is more important than ever. Here are four ways organisations can put security at the core of the IoT value proposition Continue Reading

SearchSecurity

By Kevin Beaver Get Started Jul 28, 2015

How can the Border Router Security Tool improve enterprise security?

The Border Router Security Tool aims to improve router security to boost Internet safety. Expert Kevin Beaver explains its place in the enterprise. Continue Reading

SearchSecurity

By Nick Lewis Get Started Jul 29, 2015

ERP security: How to defend against SAP vulnerabilities

A recent study revealed more than 95% of SAP systems were exposed to potentially disastrous vulnerabilities. Expert Nick Lewis explains how to mitigate these SAP vulnerabilities and maintain ERP security. Continue Reading

SearchDataBackup

By Brien Posey Manage Jul 27, 2015

Secure your disk-based backups

Disk-based backups present different security risks than backup tapes. Protection methods can vary widely depending upon storage architecture. Continue Reading

ComputerWeekly

Jul 23, 2015

NHS Care.data: the security concerns

As NHS England restarts its Care.data programme, we look at how it is intended to work, the legislative background and the data security concerns Continue Reading

SearchCloudApplications

By Steve Weissman Manage Jul 17, 2015

How to avoid security issues in cloud computing

Allowing departments free range may create security issues for cloud computing within an entire enterprise. Continue Reading