IT Management  >   Systems Operations  >   Security  >  

Cyber Security

RSS Feed    Add to Google    Add to My Yahoo!
Cyber Security White Papers (View All Report Types)
5 Days to Setting Up an Application Security Program
sponsored by WhiteHat Security
WHITE PAPER: This white paper outlines a five day guide to bolstering your app security strategy.  Access now to learn more.
Posted: 01 Oct 2015 | Published: 12 Jan 2015

WhiteHat Security

Critical Capabilities for Security Information and Event Management
sponsored by IBM
WHITE PAPER: This Gartner report reviews fifteen different SIEM offerings, ranking them according to use cases and revealing which products work best in different environments.
Posted: 02 Sep 2015 | Published: 25 Jun 2015


Close the Door on Cryptographic Key and Certificate Threats
sponsored by Venafi
WHITE PAPER: This white paper explores how exploits use cryptographic keys and certificates to compromise organizations, and how businesses can reduce their attack surface by securing them.
Posted: 10 Sep 2015 | Published: 31 Dec 2013


Special Report: Cybersecurity in 2015
sponsored by IBM
WHITE PAPER: This resource breaks down the cyber-attacks of 2014, presenting an overview of cybercrime that can help you stay safe in 2015 and beyond.
Posted: 14 Sep 2015 | Published: 14 Sep 2015


The Forrester Wave™: DDoS Services Providers, Q3 2015
sponsored by Imperva
WHITE PAPER: Forrester Research offers unique insight into the rapidly growing DDoS Protection market with its Wave Report on DDoS Services Providers. Read the report and learn why Imperva was positioned as a leader in the DDoS service providers space.
Posted: 06 Oct 2015 | Published: 22 Jul 2015


Sizing The Cloud Security Market
sponsored by HyTrust
WHITE PAPER: This report by Forrester Research organizes today's fragmented set of cloud security solutions into four discrete categories for S&R pros and projects spending patterns for the cloud security category as a whole.
Posted: 05 Oct 2015 | Published: 25 Aug 2015


Security Based on Trust, Not Fear: The Importance of a Trusted Cloud and Internet Ecosystem
sponsored by Qualys
WHITE PAPER: Security can no longer be about fear. Instead, it needs to be about enabling innovation. This white paper discusses how that can happen.
Posted: 13 Oct 2015 | Published: 31 Aug 2012


Advanced Threat Protection Against Targeted Attacks
sponsored by Trend Micro
WHITE PAPER: Discover how to detect, analyze, and respond to today's stelathy, targeted attacks in this handy white paper.
Posted: 30 Sep 2015 | Published: 07 Aug 2015

Trend Micro

Special Report: Which SIEM Platform is Best for You?
sponsored by IBM
WHITE PAPER: This Gartner report examines thirteen of the leading SIEM vendors, giving a detailed analysis of each one's strengths and weaknesses.
Posted: 31 Aug 2015 | Published: 20 Jul 2015


The ESG Cybersecurity Maturity Model
sponsored by Hewlett-Packard Company
WHITE PAPER: Based on their research, Enterprise Strategy Group has developed a cyber security maturity model that classifies organizations as basic, progressing, or advanced.
Posted: 18 Aug 2015 | Published: 22 Oct 2014

Hewlett-Packard Company
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement