IT Management  >   Systems Operations  >   Security  >  

Cyber Security Enhancement Act of 2002

RSS Feed    Add to Google    Add to My Yahoo!
Cyber Security Enhancement Act of 2002 White Papers (View All Report Types)
Gartner Critical Capabilities for SIEM
sponsored by Intel Security
WHITE PAPER: As a companion to the Gartner Magic Quadrant for SIEM, the Gartner Critical Capabilities report for SIEM helps IT security organizations compare their requirements with the most common SIEM use cases. Discover in-depth how Gartner rates McAfee SIEM by critical capabilities.
Posted: 23 Oct 2015 | Published: 25 Jun 2014

Intel Security

Malicious Email Files: The Growing Digital Weapon
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This infographic delivers some fast facts on email-based cyber-risks and how you can defend against them. Discover how advanced hackers are leveraging email against you and what you can do to stop them.
Posted: 17 Nov 2015 | Published: 17 Nov 2015

Check Point Software Technologies Ltd.

Automating the SANS 20 Critical Security Controls
sponsored by Qualys
WHITE PAPER: This white paper breaks down the 20 critical security controls developed by SANS, discussing how you can best follow them.
Posted: 16 Oct 2015 | Published: 31 Mar 2013


Securing Apps from the First Line of Code
sponsored by WhiteHat Security
WHITE PAPER: This white paper teaches you how to integrate security analysis into apps from the moment the first line of code is written to reduce risks. View now to learn how to discover and remedy vulnerabilities during the development process in real-time.
Posted: 01 Oct 2015 | Published: 28 Oct 2014

WhiteHat Security

From Checkboxes to Frameworks: CISO Insights on Moving From Compliance to Risk-Based Cyber-Security Programs
sponsored by IBM
WHITE PAPER: Access this report to discover three common struggles experienced by CISOs, as well as a five-step program designed to improve your cyber-security strategy.
Posted: 09 Nov 2015 | Published: 30 Oct 2015


State of File Collaboration Security
sponsored by FinalCode
WHITE PAPER: Access this research report on file collaboration security for insights into file data leakage risks, security processes and control maturity, perceived cloud-based file platform threats, and more.
Posted: 08 Oct 2015 | Published: 08 Oct 2015


Case Study: Overcoming the Challenges of K-12 Security
sponsored by AlienVault
WHITE PAPER: This case study describes how Council Rock School District, a large district with a tight budget, found a unified security solution that met its needs.
Posted: 27 Oct 2015 | Published: 27 Oct 2015


Big Data Security for Dummies
sponsored by Blue Coat Systems
WHITE PAPER: This in-depth resource tells you all you need to know about big data security and how it can catch advanced, targeted attacks.
Posted: 23 Oct 2015 | Published: 23 Oct 2015

Blue Coat Systems

Evaluating the Next Generation of Threat Prevention
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This white paper looks at a next-generation threat prevention tool, evaluating the effectiveness of this form of technology and the practicality of implementing it.
Posted: 10 Nov 2015 | Published: 10 Nov 2015

Check Point Software Technologies Ltd.

Case Study: How a Major Media Organization Fought off Hacktivists
sponsored by Akamai
WHITE PAPER: This case study tells how a major media company took steps to successfully keep hacktivists at bay and maintain uptime across 19 digital properties.
Posted: 09 Nov 2015 | Published: 09 Nov 2015

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement