About 26 results
Open links in new tab
  1. What is SIEM (security information and event management)?

    Jul 2, 2025 · SIEM (security information and event management) is software that helps organizations detect, analyze, and respond to security threats by collecting and correlating …

  2. Security automation systems, tools and tactics

    Manually operating enterprise security systems and infrastructure can be daunting. In this resource center, find out how security automation systems can save time, money and …

  3. TechTarget – Réseau de sites internet anglophones et …

    Notre réseau de plus de 750 contributeurs indépendants fournit des informations approfondies et impartiales, des analyses fiables et des perspectives concrétes.

  4. JSP Examples - searchsecurity.techtarget.com

    This is a collection of samples demonstrating the usage of different parts of the Java Server Pages (JSP) specification. Both JSP 2.0 and JSP 1.2 examples are presented below.

  5. How do you align an IT risk assessment with COBIT controls?

    Mar 19, 2009 · Implementing a risk assessment that will align the COBIT control framework with risks is a valuable undertaking and a smart way to approach the challenge.

  6. Information security incident response

    In this security incident response guide learn how to handle a security breach, stolen laptop or data leakage and how to create a response policy and plan.

  7. Preventing Data Theft, Combating Internal Threats

    Jan 1, 2006 · Discover how to protect sensitive data and prevent internal threats and hacker attacks with several methods such as encryption and employee monitoring.

  8. 301 Moved Permanently

    301 Moved Permanently 301 Moved Permanently cloudflare

  9. searchsecurity.techtarget.com

    searchsecurity.techtarget.com

  10. searchsecurity.techtarget.com

    searchsecurity.techtarget.com