IT Management  >   Systems Operations  >   Security  >  

Cyber Security Enhancement Act of 2002

RSS Feed    Add to Google    Add to My Yahoo!
Cyber Security Enhancement Act of 2002 White Papers (View All Report Types)
 
2017 Security Threat Report: Executive Summary
sponsored by Symantec
WHITE PAPER: Inside this summary of the larger 77-page 2017 Threat Report, discover 6 cyberattack insights and how they have evolved over the past year.
Posted: 17 Jul 2017 | Published: 17 Jul 2017

Symantec

5 Way to Manage Mobility and IOT Risks
sponsored by Aruba Networks
WHITE PAPER: By 2020 there will be more people with a mobile phone than those with running water and a car. Securing those and other IoT devices is top priority for enterprises around the globe. Discover these 5 insightful tips to ensure IoT and mobile security for your organization.
Posted: 28 Jun 2017 | Published: 28 Jun 2017

Aruba Networks

IAM Case Study: How to Maximize Your ROI and Security
sponsored by OneLogin
WHITE PAPER: Security and ROI don't have to be antagonistic. Learn how one company achieved a 482% ROI with their IAM over the course of three years, and more.
Posted: 17 Jul 2017 | Published: 17 Jul 2017

OneLogin

Build or Buy? Security Operations Center Strategies for Midmarket Companies
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Discover insights into the challenges and opportunities of building your security internally and the advantages of a managed security operations center.
Posted: 02 Jun 2017 | Published: 28 Feb 2017

Arctic Wolf Networks, Inc.

A New Security Strategy for Today's Virtualized Computing Infrastructure
sponsored by Quest
WHITE PAPER: When it comes to cloud computing environments, attackers have a massive advantage – time. Discover what it takes to close the time-gap between attacker and defender to protect today's enterprise cloud computing infrastructure.
Posted: 20 Jul 2017 | Published: 20 Jul 2017

Quest

SANS 2016 Survey on Security and Risk
sponsored by WhiteHat Security
WHITE PAPER: Financial service organizations are successfully attacked more than any other type of cybercrime victim. Discover how and why they are attacked, how prepared they are, and what steps are being taken to mitigate their risk.
Posted: 24 Jul 2017 | Published: 24 Jul 2017

WhiteHat Security

Improve Your Cloud Security Without Adding Complexity
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Discover how to improve your cloud security without adding complexity by learning how to selectively encrypt or tokenize field-level information in SaaS apps like Salesforce, ServiceNow, and Oracle.
Posted: 14 Jul 2017 | Published: 14 Jul 2017

Symantec & Blue Coat Systems

Your Guide to HIPAA Compliance for Containers
sponsored by Twistlock, Inc.
WHITE PAPER: With the advent of microservices it is likely that many new healthcare apps are being built with containers. Discover how to achieve compliance with the HIPAA Security Rule for containerized workloads for healthcare apps.
Posted: 20 Jul 2017 | Published: 20 Jul 2017


2017 Application Security Report
sponsored by WhiteHat Security
WHITE PAPER: With so many cyberattacks targeting the app layer, securing it is vital to your organization's digital transformation. Inside this, 2017 application security report discover 60 pages of detailed app security data.
Posted: 25 Jul 2017 | Published: 25 Jul 2017

WhiteHat Security

Malware Year in Review 2016
sponsored by PhishMe
WHITE PAPER: Ransomware's explosive growth in 2016 was evidence of a paradigm shift in criminal business ventures, resulting in estimated losses of well over $1 billion. Discover 4 major malware trends and specific examples of how they worked, and what it may mean for 2017.
Posted: 14 Jun 2017 | Published: 14 Jun 2017

PhishMe
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement