IT Management  >   Systems Operations  >   Security  >  

Cyber Security Enhancement Act of 2002

RSS Feed    Add to Google    Add to My Yahoo!
Cyber Security Enhancement Act of 2002 White Papers (View All Report Types)
 
Your Shadow IT Discovery Best Practices Guide
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Learn how to guide your organization through the process of safely adopting cloud apps and services, mitigating the influence of shadow IT and reducing your security risk.
Posted: 14 Jul 2017 | Published: 14 Jul 2017

Symantec & Blue Coat Systems

Top 10 AWS Cloud Security Risks and how to Resolve them
sponsored by evident.io
WHITE PAPER: Take a look at this white paper to reveal a security platform that can protect your Amazon Web Services (AWS) cloud.
Posted: 19 Sep 2017 | Published: 19 Sep 2017

evident.io

Cloud Security: 2017 Spotlight Report
sponsored by Quest
WHITE PAPER: Access this e-book to explore how organizations are responding to the security threats in the cloud and what tools and best practices IT cybersecurity leaders are considering in their move to the cloud.
Posted: 11 Aug 2017 | Published: 11 Aug 2017

Quest

Australian Privacy Act 1988 Amendment Explained
sponsored by Dell SecureWorks
WHITE PAPER: The amendments to the Privacy Act 1988 are going to force sweeping changes to the attitude around cybersecurity in Australia. This white paper explains who these amendments affect and what they mean for you.
Posted: 05 Sep 2017 | Published: 31 Dec 2016

Dell SecureWorks

Continuous Application Security Testing Benefits
sponsored by WhiteHat Security
WHITE PAPER: Security scrutiny is heavier than ever for financial services. Learn 4 benefits of properly deployed continuous application security testing can give your organization to help shine under the current environment of scrutiny.
Posted: 25 Jul 2017 | Published: 25 Jul 2017

WhiteHat Security

4 Major Threats to Mobile Security
sponsored by MobileIron
WHITE PAPER: Learn about 4 top malware threats to mobile security, how they work, what impact they could have on your business if you're infected, and how to detect and mitigate each strain.
Posted: 07 Jul 2017 | Published: 07 Jul 2017

MobileIron

4 Critical Elements of a Successful GRC Implementation
sponsored by Rsam
WHITE PAPER: The GRC landscape is changing quickly, are you ready to adapt? Explore these 4 critical elements of a successful GRC implementation and see what they can do for your organization.
Posted: 18 Jul 2017 | Published: 18 Jul 2017

Rsam

360 Data Management for GDPR
sponsored by Avnet
WHITE PAPER: The GDPR is by far and away the most comprehensive global privacy regulation ever developed. Read this whitepaper to reveal approaches you can take to prepare for the GDPR.
Posted: 19 Sep 2017 | Published: 19 Sep 2017

Avnet

4 Key Considerations for Securing Operation Technology in the Oil & Gas Industry
sponsored by Bayshore Networks
WHITE PAPER: The Industrial Internet of Things (IIoT) is revolutionizing the manufacturing industry – but also opens the door to cyber threats. Learn about the opportunities and risks created, and the need for securing the operation technology environment. Plus, discover 4 key considerations to protect industrial assets against cyber threats.
Posted: 27 Jul 2017 | Published: 02 Jul 2017

Bayshore Networks

Anatomy of a Cyberattack
sponsored by Infocyte
WHITE PAPER: According to Ponemon, the cost of a data breach is significantly less if you contain it within 30 days. Check out this white paper to uncover the anatomy of cyberattacks to see where different "hunt tools" can be used for your protection to detect data breaches early.
Posted: 05 Sep 2017 | Published: 05 Sep 2017

Infocyte
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement