IT Management  >   Systems Operations  >   Security  >  

Cyber Security Enhancement Act of 2002

RSS Feed    Add to Google    Add to My Yahoo!
Cyber Security Enhancement Act of 2002 White Papers (View All Report Types)
 
Augmented Intelligence Slashes Mobile and Endpoint Vulnerabilities
sponsored by IBM
WHITE PAPER: Learn how augmented intelligence and cognitive technology, as part of a UEM, can improve mobile security and reduce vulnerabilities, increase workforce productivity, help your organization make more informed decisions, and more.
Posted: 30 Mar 2017 | Published: 30 Mar 2017

IBM

Case Study: How the Diamond Model of Intrusion Analysis Unveiled Key Details About Malicious Activity
sponsored by ThreatConnect
WHITE PAPER: In the following case study, discover ways to gain a holistic view of threat intelligence and incident response so you can unite your entire security operations around a common defense, make informed business decisions, and more.
Posted: 01 May 2017 | Published: 01 May 2017

ThreatConnect

Data Breaches: What Can and Cannot Be Done
sponsored by Global Knowledge
WHITE PAPER: This white paper discusses the inevitability of data breaches and gives tips for staying as secure as possible in an insecure threat environment.
Posted: 11 Aug 2015 | Published: 11 Aug 2015

Global Knowledge

Why IT Leaders Are Buying into Mobile Security
sponsored by Lookout
WHITE PAPER: See how CIOs have zeroed-in the threat to mobile security and how they shut down attempts at breaching their networks. Read on to ensure mobility doesn't become a liability to your organization and learn how pros fend off today's data breaches.
Posted: 17 May 2016 | Published: 17 May 2016

Lookout

Compliance and Beyond: Future-Proofing Your Password Policy
sponsored by Specops Software
WHITE PAPER: This white paper digs down into a variety of password security best practices to determine which established methods are still relevant. Learn how to improve password management with new best practices designed for modern compliance.
Posted: 07 Apr 2017 | Published: 07 Apr 2017

Specops Software

Choosing the Right Security Solution: Moving Beyond SSL to Establish Trust
sponsored by Symantec Website Security Solutions
WHITE PAPER: In this white paper, you'll learn why SSL-based security platforms with solid track records of meeting new challenges are the best way to defend and future-proof e-commerce environments against a growing and dynamic internet threat environment.
Posted: 12 Jan 2015 | Published: 13 Feb 2014

Symantec Website Security Solutions

DNSSEC: How Savvy Attackers Are Using Our Defenses Against Us
sponsored by Neustar
WHITE PAPER: Learn more about how hackers are using DNSSEC against you and get inside the anatomy of one of these attacks. Discover how to best defend against these attacks and allow legitimate traffic to flow through your websites.
Posted: 03 Oct 2016 | Published: 30 Sep 2016

Neustar

HP Security Cyber Risk Report
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This HP Security Cyber Risk Report provides industry-wide data on vulnerabilities in software, mobile, and web applications; examines how specific technologies like iOS, Android, and JAVA contribute to the attack surface; and more.
Posted: 19 Nov 2014 | Published: 31 Jan 2014

Hewlett Packard Enterprise

Cybercrime Exposed: The Hidden Economy of Cybercrime-as-a-Service
sponsored by Intel
WHITE PAPER: Access this resource for an inside look at the thriving economy of "cybercrime-as-a-service."
Posted: 07 Jan 2016 | Published: 31 Dec 2013

Intel

Big Data and Predictive Analytics: On the CybersecurityFront Line
sponsored by SAS
WHITE PAPER: In this white paper, learn about the intersection between big data, analytics, and cybersecurity. Furthermore, gain an in-depth look at the types of attacks and the steps you can take improve organizational security, including: map and tap into existing data sources, use deep analytics to refine and sharpen the picture, and more.
Posted: 06 Jan 2016 | Published: 31 Dec 2015

SAS
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement