Searching all of TechTarget| 85,364 results for "security"

security: In information technology, security is the protection of information assets through the use of ...

See all definition search results provided by

Conversations: Network security

See all conversation search results provided by ITKE.


By Warwick Ashford Nov 18, 2015

Security key to digital transformation

In the future, we will go to systems of systems, which means we will need a secure and trusted ecosystem from the sensor to the user, says security firm Exceet Continue Reading


By Ed Tittel Evaluate Oct 25, 2015

Oracle Advanced Security: Database security tool overview

Expert Ed Tittel examines Oracle Advanced Security, a database security add-on product with transparent data encryption (TDE) and data redaction features. Continue Reading


By Ed Tittel Evaluate Oct 25, 2015

Imperva SecureSphere: Database security tool overview

Expert Ed Tittel examines Imperva SecureSphere Database Activity Monitoring and Database Assessment, products that are deployed as an inline bridge or as a lightweight agent to assess and monitor local database ... Continue Reading


By Tom Nolle ,Michael Cobb Manage Nov 16, 2015

How to ensure a secure API

Application program interfaces, or APIs, are nothing new in the IT world, but over the past ten years, public-facing APIs have risen from a handful to over 10,000. The function of APIs is to add capabilitiies to ... Continue Reading


By Warwick Ashford Oct 20, 2015

Security industry broken, says security researcher

Information security professionals need to start really caring about security and ensuring the suppliers and businesses do the same, according to a security researcher Continue Reading


By Mike O. Villegas Get Started Nov 02, 2015

What should CISOs include in security reports?

Security reports are a good way for CISOs to communicate with the board of directors. Here are specific topics that should be included in the reporting. Continue Reading


Oct 09, 2015

The security dangers of home networks

Most companies take reasonable steps to protect their networks from virus attacks, but one area of vulnerability that is often overlooked is infection from employees’ home networks Continue Reading


By David Strom Manage Oct 08, 2015

Emerging security threats you're up against now

Learn about the 'hacking as a service' and other emerging security threats. Continue Reading


By David Sherry Get Started Sep 10, 2015

Learn from the past: Ensure a secure future of information security

To ensure the future of information security, enterprises must learn from the past, launch proper training and install the right technologies. Continue Reading


By Rob Shapland Get Started Sep 30, 2015

An introduction to cloud container security

While the benefits of cloud containers are readily apparent, there aren't clear guidelines on how to secure the technology. Expert Rob Shapland offers pointers on how to stay safe. Continue Reading