Cyber Security Enhancement Act of 2002 White Papers

(View All Report Types)
Protect People, Processes and Technology from Web Application Threats
sponsored by IBM
WHITE PAPER: Securing externally facing applications is an important step toward safeguarding your critical assets. Find out why.
Posted: 08 Oct 2014 | Published: 29 Nov 2013

IBM

Hidden Lynx: Professional Hackers for Hire
sponsored by Symantec Corporation
WHITE PAPER: In this white paper, uncover the facts behind security's most threatening presence, the Hidden Lynx group, which uses more sophisticated, targeted attacks, and has the ability to adapt to defense methods.
Posted: 28 Oct 2013 | Published: 17 Sep 2013

Symantec Corporation

Three Mistakes Companies Make When It Comes to Vulnerability Management
sponsored by Core Security Technologies
WHITE PAPER: In this resource, get 3 self-assessment questions to establish whether or not your approach to vulnerability management is truly successful at mitigating future security risks.
Posted: 07 Oct 2013 | Published: 07 Oct 2013

Core Security Technologies

Defending Against Malware: A Holistic Approach to One of Today's Biggest IT Risks
sponsored by IBM
WHITE PAPER: This white paper offers background on today's malware and its 4 predictable steps. Click through to discover a set of integrated solutions that offer improved visibility and defense to block advanced attacks.
Posted: 05 Mar 2014 | Published: 31 Jan 2014

IBM

Building An Intelligence - Driven Security Operations Center
sponsored by EMC Corporation
WHITE PAPER: Access this white paper for insider tips on rapid cyber threat detection and remediation as well as how to coordinate technologies, personnel, and processes for better security.
Posted: 26 Sep 2013 | Published: 28 Feb 2013

EMC Corporation

Continuous Cyber Situational Awareness
sponsored by Lumeta Corporation
WHITE PAPER: This informative paper takes an in-depth look at continuous monitoring, describing how you can successfully deploy the technology and how it can increase visibility and streamline your security management.
Posted: 10 Feb 2014 | Published: 10 Feb 2014

Lumeta Corporation

Ponemon - Costs and Consequences of Gaps in Vulnerability Response
sponsored by ServiceNow
WHITE PAPER: Ponemon Institute surveyed almost 3,000 IT security professionals across the globe to understand how organizations are responding to vulnerabilities. This paper presents the findings of the most recent report and compares it to the 2018 study – read on for the complete results.
Posted: 08 Feb 2021 | Published: 06 Aug 2020

ServiceNow

Cyber defense: Understanding and combating the threat
sponsored by IBM
WHITE PAPER: The Global Defense Solutions Projects and Defense Exchange Conference (SPADE) is held annually to bring together organizations involved in network-centric operations, intelligence activities and other defense aspects. This resource explains some of the important topics.
Posted: 20 Jul 2012 | Published: 20 Jul 2012

IBM

EMA Report: The Benefits of a Unified Endpoint Management Approach
sponsored by IBM
WHITE PAPER: Read this resource to learn how a unified security and IT operations approach can better protect organizations' vast and growing amount of endpoints from sophisticated threats.
Posted: 05 Mar 2014 | Published: 24 Jan 2011

IBM

Managing Web Security in an Increasing Challenging Threat Landscape
sponsored by TechTarget Security
WHITE PAPER: This resource offers guidance to help your organization manage web security in an increasingly dangerous threat landscape. Learn how cybercriminals are targeting web-based vulnerabilities and see what you can do to stay safe by reading on now.
Posted: 31 May 2013 | Published: 31 May 2013

TechTarget Security