IT Management  >   Systems Operations  >   Security  >  

Cyber Security

RSS Feed    Add to Google    Add to My Yahoo!
Cyber Security White Papers (View All Report Types)
 
Rules Of Engagement: A Call To Action To Automate Breach Response
sponsored by Digital Guardian
WHITE PAPER: This white paper delves into why security teams need to automate incident response (IR) plans to defend against dynamic cybercriminal attacks. View now to learn the four steps to developing an automated rules of engagement workflow to combat hackers.
Posted: 14 Apr 2015 | Published: 02 Dec 2014

Digital Guardian

New Defence Strategy Needed To Combat Cybersecurity Adversaries
sponsored by Hewlett-Packard Company
WHITE PAPER: View this informative white paper to learn why companies need to implement a new defense strategy to keep cybercriminals at bay.
Posted: 13 May 2015 | Published: 13 May 2015

Hewlett-Packard Company

Advanced Threat Protection Lifecycle Defense
sponsored by Blue Coat Systems
WHITE PAPER: In this infographic, discover a method of advanced threat protection that fights every step of the advanced threat lifecycle.
Posted: 09 Apr 2015 | Published: 09 Apr 2015

Blue Coat Systems

Today's Top Security Risks Revealed
sponsored by Hewlett-Packard Company
WHITE PAPER: This extensive white paper explores the current state of security threats that organizations are up against. Read on to learn how to prepare and strengthen defenses against evolving attacks.
Posted: 28 Apr 2015 | Published: 15 Apr 2015

Hewlett-Packard Company

How You Can Protect Your Organization from Advanced Attacks
sponsored by IBM
WHITE PAPER: This white paper introduces a strategy that can reduce the rate of APTs and targeted attacks, and that can help you mitigate them when they do occur.
Posted: 21 Apr 2015 | Published: 31 Mar 2015

IBM

Uncover Advanced Attacks and Detect Hidden Breaches
sponsored by Hewlett-Packard Limited
WHITE PAPER: In this white paper, discover how you can gain greater visibility into the state of both active and live threats hidden within your network.
Posted: 22 May 2015 | Published: 30 Apr 2015

Hewlett-Packard Limited

Protecting Against Online Banking Fraud with F5
sponsored by F5 Networks
WHITE PAPER: Access this white paper to learn how you can simplify your approach to anti-fraud solutions.
Posted: 06 May 2015 | Published: 06 May 2015

F5 Networks

The C-Suite Battle Plan for Cyber Security Attacks in Healthcare
sponsored by Imprivata
WHITE PAPER: This white paper examines why passwords are the top vulnerability that healthcare hackers exploit . Uncover what techniques and tools your enemies are using and how to defend yourself by improving your key management strategy. Read on now to learn more.
Posted: 27 Apr 2015 | Published: 15 Apr 2015

Imprivata

2015 Cyberthreat Defense Report
sponsored by Citrix
WHITE PAPER: In this report, discover what security professionals had to say about mobile security, endpoint security, and other important trends in the cybersecurity landscape.
Posted: 12 May 2015 | Published: 12 May 2015

Citrix

Improving the Effectiveness of Log Analysis
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper acts as a buyer's guide for log monitoring and management solutions and points out the five key features you need to ensure data protection.
Posted: 24 Apr 2015 | Published: 01 Apr 2015

Hewlett-Packard Company
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement