IT Management  >   Systems Operations  >   Security  >  

Cyber Security Enhancement Act of 2002

RSS Feed    Add to Google    Add to My Yahoo!
Cyber Security Enhancement Act of 2002 White Papers (View All Report Types)
 
7 Key Questions to Ask When Selecting an Incident Response Service Provider
sponsored by Dell SecureWorks
WHITE PAPER: This white paper offers 7 key questions to ask when selecting an incident response service provider, to help you evaluate vendors based on your organization's needs.
Posted: 20 Dec 2017 | Published: 20 Dec 2017

Dell SecureWorks

GDPR Compliance Checklist: A 9-Step Guide
sponsored by AlienVault
WHITE PAPER: The GDPR has the potential to significantly alter the way businesses handle and store data as it consolidates and replaces many local data protection laws. This guide offers a 9-step GDPR checklist to ensure your organization is prepared for the May 2018 regulation.
Posted: 04 Jan 2018 | Published: 04 Jan 2018

AlienVault

If You Think Compliance is Expensive, Try Violations
sponsored by Oracle Corporation UK Ltd
WHITE PAPER: You don't need to be a victim of a cyberattack for your information systems to be on the wrong side of compliance regulations. Explore this white paper to discover how to prepare your sensitive data in the cloud for regulations such as GDPR, PCI DSS, and more.
Posted: 08 Jan 2018 | Published: 08 Jan 2018

Oracle Corporation UK Ltd

Key Considerations in Selecting a Customer IAM Solution
sponsored by Janrain
WHITE PAPER: The rise of the social customer creates opportunities for organizations to develop deeper relationships with customers in support of business objectives. Explore this white paper to gain insight into selecting a customer IAM strategy that works best for your organization.
Posted: 07 Dec 2017 | Published: 07 Dec 2017

Janrain

New Cybersecurity Regulations Adopted to Protect Financial Systems & Information
sponsored by HID Global
WHITE PAPER: According to the Symantec Internet Security Threat Report, the United States is at the top of the list for both the number of breaches by country and the number of identities stolen by country. Explore this white paper to discover how to protect your organization from data breaches.
Posted: 23 Oct 2017 | Published: 13 Oct 2017

HID Global

Your GDPR Plan: 4 Steps to Bolster Security and Meet Compliance
sponsored by Dell SecureWorks
WHITE PAPER: Getting GDPR compliant can be a valuable competitive differentiator between organizations. To maximize the benefits and minimize the security risks, taking the right approach to compliance is vital. This white paper reveals a 4-step plan to bolstering security to meet GDPR compliance standards.
Posted: 18 Dec 2017 | Published: 18 Dec 2017

Dell SecureWorks

A Secure, IT-Approved File Sharing Alternative to Shadow IT
sponsored by Citrix
WHITE PAPER: Discover how to mitigate the security risks and Shadow IT issues associated with online file sharing services. Find out how to protect your data while still enabling employees to be productive, and uncover 5 ways to identify and eliminate Shadow IT that results from unauthorized file sharing accounts.
Posted: 24 Oct 2017 | Published: 24 Oct 2017

Citrix

The 7 Building Blocks of Better Threat Visibility
sponsored by RSA
WHITE PAPER: According to RSA, the anticipated losses to cybercrime by 2021 are $6 trillion. Explore this e-book to uncover how to advance your threat visibility with 7 building blocks.
Posted: 04 Jan 2018 | Published: 04 Jan 2018

RSA

Secure DevOps Survival Guide
sponsored by Veracode, Inc.
WHITE PAPER: DevOps is the most disruptive trend affecting secure development today. This resource provides you with the importance of securing DevOps and everything to know when adopting a DevOps approach.
Posted: 10 Jan 2018 | Published: 10 Jan 2018

Veracode, Inc.

Vulnerable By Design: Why Destructive Exploits Keep On Coming
sponsored by enSilo
WHITE PAPER: Attackers can exploit design vulnerabilities and gain root access to highly secure systems leading to data theft, disruption of critical infrastructure and more. Explore this resource to gain insight into design vulnerabilities and malware which exploit them. In addition uncover the differences between design and security vulnerabilities.
Posted: 15 Jan 2018 | Published: 15 Jan 2018

 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement