IT Management  >   Systems Operations  >   Security  >  

Cyber Security Enhancement Act of 2002

RSS Feed    Add to Google    Add to My Yahoo!
Cyber Security Enhancement Act of 2002 White Papers (View All Report Types)
 
10 Myths About Cyber Threat Intelligence: Separating Fact from Fiction
sponsored by Cyveillance, Inc.
WHITE PAPER: This white paper clears up 10 common misconceptions surrounding threat intelligence, helping you separate fact from fiction to determine whether or not you could benefit from deploying it in your organization.
Posted: 16 Jul 2015 | Published: 16 Jul 2015

Cyveillance, Inc.

SQL Injection: How to Sidestep the Oldest Hacking Trick in the Book
sponsored by EE
WHITE PAPER: This white paper provides insight into the basics of SQL injection attacks and discusses why it continues to be one of the most common forms of cyber-attack.
Posted: 20 May 2015 | Published: 06 May 2015

EE

Cybersecurity and Data Protection: What Every Board of Directors Should Know
sponsored by Raytheon|Websense
WHITE PAPER: This document presents a non-technical overview of cybersecurity and provides recommendations for board members wishing to keep their organization safe.
Posted: 03 Sep 2015 | Published: 03 Sep 2015

Raytheon|Websense

Website Security Threat Report Part 2
sponsored by Symantec Corporation
WHITE PAPER: Download part 2 of this Website Security Threat Report for the latest on the fast-evolving world of targeted attacks - from cyber espionage tactics to denial of service, spear-phishing and watering hole attacks.
Posted: 07 Jul 2015 | Published: 07 Jul 2015

Symantec Corporation

Keep Yourself Secure from Growing Cyber-Threats
sponsored by Hewlett-Packard Limited
WHITE PAPER: In this infographic, discover what you can do to stay safe in an increasingly dangerous cyber landscape, including increasing proactivity in your security strategy and partnering with security services.
Posted: 21 May 2015 | Published: 21 May 2015

Hewlett-Packard Limited

Achieve Business Continuity with Secure and Reliable Unified Communications
sponsored by ThinkingPhones
WHITE PAPER: This white paper provides 5 steps to educating yourself on the common pitfalls when investing in a unified communications platform. Access this paper now to get insight into achieving long-term security and stability with UC.
Posted: 02 Sep 2015 | Published: 02 Sep 2015

ThinkingPhones

Uncover Advanced Attacks and Detect Hidden Breaches
sponsored by Hewlett-Packard Limited
WHITE PAPER: In this white paper, discover how you can gain greater visibility into the state of both active and live threats hidden within your network.
Posted: 22 May 2015 | Published: 30 Apr 2015

Hewlett-Packard Limited

What Canadian Businesses Stand to Lose from Cybercrime
sponsored by IBM
WHITE PAPER: In this report, data from businesses all over Canada is analyzed to reveal how much your organization stands to lose if breached.
Posted: 04 Sep 2015 | Published: 31 May 2015

IBM

Threat Intelligence Report: What 2014's Hacks Mean for Today
sponsored by CrowdStrike
WHITE PAPER: This threat intelligence report analyzes some of the biggest hacks of 2014, form Target to the Ukrainian elections, and draws conclusions about what to look for in 2015 and beyond.
Posted: 04 Aug 2015 | Published: 01 Jan 2015

CrowdStrike

Sagicor Takes on Malware and Wins
sponsored by Malwarebytes Corporation
WHITE PAPER: This white paper tells the story of how one financial institution put a stop to their constant stream of malware attacks.
Posted: 08 May 2015 | Published: 08 May 2015

 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement