RSS feed Get our RSS feed

News by Topic

read

Results 4926 - 4950 of 5552Sort Results By: Published Date | Title | Company Name
By: Tenable     Published Date: Feb 07, 2018
"This IDC Technology Spotlight examines the evolution of vulnerability management. By leveraging the cloud and new technologies that deliver greater visibility, organizations can gain an accurate picture of their assets and overall risk posture. This is a critical step toward addressing the current landscape where attackers are using a wide variety of vectors such as mobile, social, and cloud-based attacks to infiltrate organizations and steal data. By reading this report you will get an overview of: - Benefits of cloud-based security and vulnerability management - Challenges of adopting cloud-based vulnerability management - IDC assessment of Tenable.io cloud vulnerability management"
Tags : 
     Tenable
By: Tenable     Published Date: Mar 07, 2018
Includes 5 tips for bridging the DevOps InfoSec gap. Across industries, in the public and private sector alike, the benefits of DevOps are undeniable: speed to market, improved service delivery and cost savings. At the same time, DevOps can create security blind spots that impact an entire enterprise. To understand why this happens and learn how you can bridge the gap between security and development, read: Information Security in the DevOps Age: Aligning Conflicting Imperatives. Topics covered include: - Rethinking the role of security - Shifting security left by focusing on code quality and prevention - Blind spots in containers and open source components - 5 tips for bridging the DevOps infosec gap Written by CyberScoop, this paper offers practical advice for DevOps and InfoSec professionals who want to realize the benefits of accelerated software development without jeopardizing enterprise security.
Tags : secure devops, container security, docker, infosec
     Tenable
By: Tenable     Published Date: Mar 07, 2018
"Learn how you can accelerate development and strengthen security – without disrupting your operations. Organizations that effectively meld DevOps and InfoSec can shift security from an afterthought to an integrated, automated, and proactive practice. By reading this paper from IDG, you’ll learn three reasons why DevOps is a game-changer for security and steps you can take foster a more collaborative and proactive approach to securing your enterprise. Topics covered include: - Adapting security testing tools and processes to the developer - Automating security into the CI/CD toolchain - The impact of secure DevOps on your bottom line - Increasing security awareness and commitment across teams This paper provides high-level guidance for DevOps and InfoSec professionals seeking collaborative, efficient approaches for strengthening application and information security."
Tags : secure devops, container security, docker, infosec
     Tenable
By: Tenable     Published Date: Mar 08, 2018
Which questions have you overlooked and why do the answers matter? According to Gartner, “OT SRM (security and risk management) leaders must ask the right questions during the technology procurement process to achieve long-term success in their security investments.” Further, Gartner states, “Translating IT security practices and copying IT security technology will not result in a secure operational technology (OT) environment.” By reading “7 Questions SRM Leaders Aren't Asking OT Security Providers,” you’ll learn which questions to ask, why they matter, and be armed with follow-up guidance to make smarter decisions. Questions covered include: - Does the Solution Provide Asset Discovery to Enable Operational Continuity and System Integrity? - Does the Solution Detect and Alert on Known Common Vulnerabilities and Exposures? - Does Your Solution Provide IT Support in Addition to OT? - Does Your Solution Support Secure IT/OT Alignment? Threats and vulnerabilities originally targeti
Tags : 
     Tenable
By: Tenable     Published Date: Nov 06, 2018
"What steps should you take to enable the effective and secure use of public cloud services? According to Gartner, “CIOs need to ensure their security teams are not holding back cloud initiatives with unsubstantiated cloud security worries. Instead, they should encourage their teams to apply imagination and energy to develop new approaches to securely and reliably leverage the benefits of SaaS, PaaS and IaaS.” By reading, “Clouds Are Secure: Are You Using Them Securely?,” you will gain insight into Gartner’s recommended practices for effective and secure adoption of public cloud services, including: Develop an enterprise cloud strategy, including guidance on what data can be placed into which clouds and under what circumstances. Implement and enforce policies on cloud ownership, responsibility and risk acceptance by outlining expectations for form, significance and control of public cloud use. Follow a life cycle approach to cloud governance that emphasizes the operational control of
Tags : 
     Tenable
By: Tenable     Published Date: Jan 25, 2019
"This Gartner report charts your course to the future of information security with Gartner’s “continuous adaptive risk and trust assessment” (CARTA) as your guide. This reports highlights a need for security and risk management leaders to embrace a strategic approach where security is adaptive, everywhere, all the time. Gartner calls this strategic approach ""continuous adaptive risk and trust assessment,"" or CARTA. By reading “Seven Imperatives to Adopt a CARTA Strategic Approach,” you will gain insight into CARTA and better understand the people, process and technical changes it calls for, including: -Replacing one-time security gates with adaptive, context-aware security platforms. -Continuously discovering, monitoring, assessing and prioritizing risk and trust — reactively and proactively. -Performing risk and trust assessments early in digital business initiatives, including development. -Instrumenting for comprehensive, full-stack visibility, including sensitive data handling.
Tags : 
     Tenable
By: Tenable     Published Date: Jan 25, 2019
"Web application attacks are the top source of data breaches today. The 2018 Cybersecurity Insiders Application Security Report reveals that 62% of cybersecurity professionals are at best moderately confident in their organization’s application security posture. Not surprisingly, about the same number consider their application security strategies immature.Applications play a critical role in supporting key business processes, but organizations are struggling to keep them safe. This eBook examines the 5 best practices for application security. Read this ebook now to understand: -Which types of apps present the highest security risk -Best practices for reducing security risks associates with web applications -Steps you can take now to secure web applications "
Tags : 
     Tenable
By: Tenable     Published Date: Feb 27, 2019
"With the number of vulnerabilities on the rise, and their severity increasing, how can you identify the biggest cyber threats to your business – and know what to fix first? Download the “3 Things You Need to Know About Prioritizing Vulnerabilities” ebook now to: -Discover the 3 critical steps to building an effective vulnerability remediation plan -Explore the pitfalls of popular prioritization approaches -Learn next steps you can take today to dramatically reduce the list of vulnerabilities you need to remediate If you’re looking for answers to questions like “Where should we prioritize based on risk?” and “Which vulnerabilities are likeliest to be exploited?” this quick read is an excellent way to get started. Download the free ebook now."
Tags : 
     Tenable
By: Teradata     Published Date: Feb 26, 2013
This survey and research report discusses shifts in the data management landscape and the movement to align data with operational and analytical workloads creating the best possible unified data architecture platform. Read on to learn more.
Tags : big data, survey report, data management, landscape, movement, align data, operational and analytics workloads, business intelligence
     Teradata
By: Teradata     Published Date: Feb 04, 2015
Digital marketing campaigns provide quantifiable results like nothing ever before, and the multi-channel world is certainly the biggest opportunity to hit marketing strategies in decades. But how can sophisticated brand marketers keep pace with everything new in digital marketing? Where will it take us next? And how can marketing leaders use digital channels to edge out competitors? Read this white paper to learn the benefits of personalization to digital marketing, how to make your digital marketing practices future focused, and how responsive email design can increase open rates and reduce subscriber opt-outs.
Tags : teradata, digital, marketing, brand, engagement, personalization, experience, performance
     Teradata
By: Teradata     Published Date: Jun 22, 2015
This paper looks at the critical connection between data analytics and the future of tax compliance. It shows how the ability to pinpoint the “right” cases can bring more efficiency—and more revenue—to tax agencies. It also confirms that tax agencies already have vital data at their fingertips; the challenge is to find new and better ways to put it to use. Finally, it describes how a cohesive compliance strategy demands an agile, balanced solution of people, processes, technology, and data.
Tags : 
     Teradata
By: Teradata     Published Date: May 02, 2017
Read this article to discover the 4 things no data warehouse should be without.
Tags : cloud data, cloud security, cloud management, storage resource, computing resources, data warehousing, data storage, cloud efficiency
     Teradata
By: Teradata     Published Date: May 02, 2017
Should the data warehouse be deployed on the cloud? Read this IDC Research Spotlight to learn more.
Tags : data warehouse, data storage, data management, data analytics, data preparation, data integration, system integration
     Teradata
By: Teradata     Published Date: May 02, 2017
Ventana’s Internet of Things (IoT) research found that the intention of organizations to embrace IoT and operational intelligence often outpace their current capabilities. Furthermore, most organizations are not ready to derive maximum value from IoT. This analyst report will take you through the Top 10 Best Practices for organizations considering how to engage with and best leverage IoT.
Tags : ventana, report, iot, operational intelligence, organizations
     Teradata
By: Texas Instruments     Published Date: Aug 21, 2009
Download this whitepaper now and read how WLAN technology embedded in CE devices offers consumers a glimmer of hope that someday soon they will be free to experience their media content on their terms.
Tags : wireless, wlan, ce device, consumer electronics, electronics, digital media, vcr, tivo
     Texas Instruments
By: Texas Instruments     Published Date: Nov 06, 2006
Read how the Next Generation Residential Gateway (RG) is capable of supporting the ever increasing need for higher data throughput rates, signaling range that covers the whole house and robustness capable of mitigating the sources of interference found in the home.
Tags : bandwidth, residential gateways, bandwidth management, home networking, wireless networking, consumer electronics, texas instruments
     Texas Instruments
By: Texas Memory Systems     Published Date: Feb 25, 2012
With flash based systems now commonly in the TBs of capacity and rapidly becoming more affordable, it may be time to look at using solid state storage with high bandwidth applications. Read this white paper to find out more.
Tags : solid state storage, bandwidth, high bandwidth, applications, data warehousing, tbs, tb capacity, storage
     Texas Memory Systems
By: Texas Memory Systems     Published Date: Feb 25, 2012
It is common knowledge that PCIe SSD is faster, right? Maybe not, says George Crump from Storage Switzerland. Read on to find out why.
Tags : pcie, pcie ssd, ssd, architecture, design, zero-latency, retrieval, solid state storage
     Texas Memory Systems
By: Texas Memory Systems     Published Date: Feb 25, 2012
In this final piece on server virtualization and SSD, Storage Switzerland discusses the power of performance, specifically, the dramatic impact that latent-free storage can make on the virtual environment. Read on to find out more!
Tags : desktop virtualization, architecture, design, zero-latency, retrieval, solid state storage, bandwidth, high bandwidth
     Texas Memory Systems
By: Thawte     Published Date: Oct 22, 2011
Read this guide to learn about typical situations where multiple domain certificates are the ideal solution, how multiple domain certificates work, and how to select the right multi-domain certificate for your needs.
Tags : san certificate, subject alternative name certificates, ucc, unified communications certificate, ssl certificates, ssl security, certificate authority, authentication
     Thawte
By: Thawte     Published Date: Oct 31, 2011
Read this guide to learn about what SSL does, how it works, and how it can help build credibility online.
Tags : ssl, ssl certificate, ssl certificates, web security, ssl security, ssl provider, ssl encryption, ev ssl
     Thawte
By: The Mx Group     Published Date: May 08, 2013
Why are the majority of all sales leads (as many as 80 percent!) never followed up? Download this e-book and discover a 10-step process for transforming your current lead management process from a challenge into a competitive advantage.
Tags : lead management, channel management, opportunity management, sales cycle, sales pipeline, sales-ready leads, sales qualified leads, sql
     The Mx Group
By: The Starr Conspiracy     Published Date: Mar 29, 2013
People consume marketing messages at an alarming rate - almost 3,000 messages and ads per day. We also filter most of that. Read this whitepaper to learn how to find the right channels for your kick-ass marketing strategy and win.
Tags : marketing strategy, channels, marketing channels, starr conspiracy, effective channel marketing, emerging marketing, internet marketing, marketing research
     The Starr Conspiracy
By: The Starr Conspiracy     Published Date: Mar 29, 2013
Message is the most important of all marketing elements. Great messages change the destinies of companies and people. Without message, brand and promotion are crude instruments. Read and learn how the best messages are bold, compelling and polarizing
Tags : message manifesto, brand, promotion, white paper, polarizing, bold, compelling, starr conspiracy
     The Starr Conspiracy
By: TheLadders     Published Date: Feb 23, 2012
The goals of the new insights solutions from TheLadders is to help companies narrow down candidates based on the attributes that will allow them to be successful within the organization. Read to find out more.
Tags : theladders, human resources, quality hire, talent acquisition, talent management, recruiter, staffing
     TheLadders
Start   Previous    191 192 193 194 195 196 197 198 199 200 201 202 203 204 205    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics