CISO Reports

The CISO's guide to supply chain security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Supply chain attacks have long been a concern in cyber security circles as it can be difficult to enforce security measures for suppliers and partners. In this e-guide, find out why supply chain attacks are intensifying amid the pandemic, how companies are responding to the attacks and what else organisations can do to disrupt the cyber kill chain.
Posted: 04 Jul 2021 | Published: 05 Jul 2021

TechTarget ComputerWeekly.com

CISO Success Stories: How security leaders are tackling evolving cyber threats
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The cyber threat landscape facing chief information security officers (CISOs) has morphed into a rapidly evolving beast, fuelled by the breakneck pace of digital transformation. In this e-guide, delve into the unique pressures faced by CISOs in technology and other industries, and how they are rising to the challenge.
Posted: 18 Jan 2024 | Published: 19 Jan 2024

TechTarget ComputerWeekly.com

Data Protection 2.0: It’s Not Just Names and Numbers Anymore
sponsored by Tripwire, Inc.
WHITE PAPER: The external forces of advanced threats and compliance obligations, combined with the internal forces of new business initiatives, lead to a complex set of data protec­tion requirements. This paper provides an overview of the many data protection challenges CISOs face and suggests a sequence of five actions to take to address these challenges.
Posted: 08 Feb 2011 | Published: 08 Feb 2011

Tripwire, Inc.

How Secure is your sudo? - The Good, the Bad, and the Ugly of Privileged Identity Management (PIM)
sponsored by BeyondTrust Corporation
WHITE PAPER: This white paper will illustrate certain positive situations where open source solutions like sudo often work in smaller scale enterprises. However, this white paper will also spotlight red flags that relate to larger companies or companies experiencing significant IT growth. Read this paper to learn more.
Posted: 21 May 2010 | Published: 20 May 2010

BeyondTrust Corporation

A New Standard for Security Leaders. Insights from the 2013 IBM CISO Assessment
sponsored by IBM
WHITE PAPER: This guide discusses security leaders' top concerns with today's aggressive threat landscape.
Posted: 05 Mar 2014 | Published: 31 Oct 2013

IBM

Dedicated to Information Security: The High-Stakes Role of the CISO
sponsored by TechTarget Security
EZINE: Almost 20 years into its existence, the CISO job is still open to discussion. In this issue of Information Security, we look at the role's influence on broader security initiatives, plus challenges of the job and the changes ahead. Download now and you'll also get tips on implementing cyberthreat intelligence, a CISO Q&A, and more.
Posted: 01 Dec 2016 | Published: 01 Dec 2016

TechTarget Security

Cybersecurity Threats: Managing Enterprise Risk and Ensuring Regulatory Compliance
sponsored by Silver Tail Systems
EGUIDE: This e-guide discusses the NERC compliance security threats, better cybersecurity through risk management, and what enterprise security administrators can do to defend themselves against such attacks.
Posted: 22 Feb 2011 | Published: 22 Feb 2011

Silver Tail Systems

SIM Technical Guide
sponsored by TechTarget Security
EZINE: In this SearchSecurity.com Technical Guide on security information and event management (SIEM) systems, we explore the current state of SIEMs in the enterprise today and whether augmentation, cloud service, or rip and repair is your best upgrade option.
Posted: 08 Mar 2013 | Published: 08 Mar 2013

TechTarget Security

Cloud Security: Enterprise Point of View
sponsored by Dimension Data
VIRTUAL SEMINAR: Access this webcast today to listen as Darren O'Loughlin, CSO for Dimension Data's global business enabling IT as a Service, shares strategic objectives for securing applications and workloads on an enterprise-class cloud.
Posted: 29 Jan 2015 | Premiered: 26 Nov 2014

Dimension Data

Leveraging a Maturity Model to Achieve “Proactive Compliance”
sponsored by Symantec Corporation
WHITE PAPER: Read this paper to learn about a new approach to compliance that seeks to move beyond the short-term goal of passing an audit and to incorporate compliance into an organization's operations in a more proactive sense utilizing the Capability Maturity Model.
Posted: 02 Sep 2009 | Published: 03 Aug 2009

Symantec Corporation