462 Results for:

Why EDR technologies are essential for endpoint protection

sponsored by SearchSecurity.com Published: 20 Jun 2019 eBook

EDR technologies are what security pros need to protect endpoints from zero-day malware and other advanced persistent threats. Learn how endpoint detection and response products work to keep attackers from ...

View Now

Who Needs Security Orchestration, Automation and Response?

sponsored by SearchSecurity.com Published: 08 May 2019 eBook

Who needs SOAR? The understaffed security team. Or put it another way: most security teams. In this SOAR guide, our expert contributor providers a detailed list of potential uses and details of what SOAR can do to ...

View Now

Secure DevOps Brings Better, Faster, Safer Software

sponsored by SearchSecurity.com Published: 03 May 2019 eBook

In the rush to implement DevOps, security is too often overlooked. But DevSecOps is essential in these hack-filled days. Learn how you can add security to software development today.

View Now

Who needs security orchestration, automation and response?

sponsored by SearchSecurity.com Published: 17 Apr 2019 eBook

Who needs SOAR? Only those companies with understaffed, overworked IT security teams. Or in other words; most security teams. Learn how SOAR tools can help ease the burden of required security tasks and free up ...

View Now

The Best Email Security Comes Through Strategy and Tactics

sponsored by SearchSecurity.com Published: 29 Mar 2019 eBook

Achieving the best email security possible should be a top InfoSec priority. Why? Attackers work day and night thinking up new ways to bypass IT security. In this security handbook, learn how to approach email ...

View Now

Incident response playbook in flux as services, tools arrive

sponsored by SearchSecurity.com Published: 12 Feb 2019 eBook

The enterprise incident response "playbook" is getting a rewrite. An IR playbook guides an enterprise security team's work, identifying triggering events and outlining best practices or regulatory requirements. ...

View Now

Explore the Threat Hunting Process

sponsored by SearchSecurity.com Published: 12 Feb 2019 Ezine

The threat hunting process hinges on an expert's ability to create hypotheses and to hunt for patterns and indicators of compromise in data-driven networks. In this issues of Information Security, explore learn how...

View Now

CISOs Map Out Their 2018 Cybersecurity Plans

sponsored by SearchSecurity.com Published: 11 Oct 2018 Ezine

As attack vectors increase and cyberattacks become more sophisticated, how are CISOs preparing? Find out inside this issue of Information Security magazine, where security professionals detail the process of ...

View Now

User behavior analytics tackles cloud, hybrid environments

sponsored by SearchSecurity.com Published: 28 Sep 2018 Ezine

In this issue of Information Security, explore why organizations are investing in user behavior analytics for on-premises and cloud.

View Now

How to Best Secure DNS? There's More Than One Approach

sponsored by SearchSecurity.com Published: 24 Aug 2018 eBook

Few aspects of the internet are as crucial as the domain name system. A DNS failure could bring the internet to a halt. What approach are you taking to protect and secure DNS in your organization? Download this ...

View Now