IT Management  >   Systems Operations  >   Security  >  

Cybersecurity

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Cyber Security, Cyber Security Enhancement Act of 2002
DEFINITION: Information assurance, including information security, information technology disaster recovery, and information privacy. See Section 225, Cyber Security Enhancement Act of 2002, of the Homeland Security Act.
CybersecurityWhite Papers (View All Report Types)
1 - 25 of 272 Matches Previous Page  | Next Page
Networks That Know Security
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper explains why a multidimensional approach to network security is crucial to minimize any potential risks.
Posted: 29 Oct 2014 | Published: 01 Aug 2014

Juniper Networks, Inc.

Is the Heart of Your SAP System at Risk?
sponsored by Onapsis
WHITE PAPER: The following white paper explores the often-overlooked cyber-layer of the SAP system and provides practical advice on how to prevent security risks and attacks from taking place within this realm.
Posted: 28 Oct 2014 | Published: 28 Oct 2014


10 Steps to Mitigate a DDoS Attack in Real Time
sponsored by F5 Networks
WHITE PAPER: This brief resource details a 10-step process to stopping distributed denial of service (DDoS) attacks immediately and before critical damage can be made.
Posted: 22 Oct 2014 | Published: 15 Jan 2014

F5 Networks

The Cyber Resilience Blueprint: A New Perspective on Security
sponsored by Symantec Corporation
WHITE PAPER: This exclusive whitepaper offers up best practices for creating a cyber-resilient enterprise.
Posted: 14 Oct 2014 | Published: 12 Aug 2014

Symantec Corporation

What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware?
sponsored by IBM
WHITE PAPER: Mobile security is about more than the device: It's also about protecting apps on the device. Learn how IBM can help.
Posted: 09 Oct 2014 | Published: 31 Jan 2014

IBM

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

Defending Against Application Denial of Service Attacks
sponsored by Akamai Technologies
WHITE PAPER: This paper will dig into application DoS attacks, offering both an overview of common attack tactics and possible mitigations for each. By the end of the paper you should have a guide and an understanding of how your application availability will be attacked, and what you can do about it.
Posted: 08 Oct 2014 | Published: 08 Oct 2014

Akamai Technologies

Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk
sponsored by SurfWatch Labs
WHITE PAPER: This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk information, and what cyber insurance options make the most sense for your business.
Posted: 08 Oct 2014 | Published: 08 Oct 2014

SurfWatch Labs

Extending Security Intelligence with Big Data
sponsored by IBM
WHITE PAPER: Learn how IBM Security Intelligence with Big Data can help organizations gain insights into advanced data threats.
Posted: 08 Oct 2014 | Published: 31 Jan 2013

IBM

Protect People, Processes and Technology from Web Application Threats
sponsored by IBM
WHITE PAPER: Securing externally facing applications is an important step toward safeguarding your critical assets. Find out why.
Posted: 08 Oct 2014 | Published: 29 Nov 2013

IBM

Five Critical Steps to Achieving an Effective Application Security Program
sponsored by IBM
WHITE PAPER: Discover steps you can incorporate into every phase of the development process to improve your application security, and get an overview of application threats and the types of risks to prioritize and remediate.
Posted: 08 Oct 2014 | Published: 31 Dec 2013

IBM

How Executives Can Understand Cyber Risks and Ensure Governance
sponsored by SurfWatch Labs
WHITE PAPER: Learn about today's cyber security risks and how to incorporate a sound cyber risk framework based on a business intelligence approach.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

SurfWatch Labs

Outsider Threat Protection: Building a Kill Chain Defense
sponsored by Digital Guardian
WHITE PAPER: This white paper reveals the story behind outsider threats and how to defend against these attacks that steal sensitive data.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Digital Guardian

DDos Survival Handbook
sponsored by Singlehop
WHITE PAPER: This handbook is the survival guide to fight off cyber attackers and mitigate the risk of DDoS attacks.
Posted: 29 Sep 2014 | Published: 31 Dec 2013

Singlehop

Managing SSL Certificates in Pan-Asia Pacific Enterprises
sponsored by Symantec Corporation
WHITE PAPER: Businesses around the world face an array of threats to information security.  Enterprised in Pan-Asia face the same threats while contending with region-specific challenges associated with trade across diverse cultures.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

Symantec Corporation

How to Mitigate the Risk of Insider Threats
sponsored by Digital Guardian
WHITE PAPER: This white paper explains how to successfully ward off insider threats by altering the operating environment.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

Digital Guardian

Fight Cyber Crime with Splunk, Cisco, and Red Hat
sponsored by Red Hat
WHITE PAPER: Consult the following brief white paper to examine the current state of cyber crime and how Splunk, Cisco, and Red Hat have come together to scale-out cyber security analytics built on affordable, industry-standard infrastructure to help thwart and predict threats.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

Red Hat

Security and the Rise of Machine-to-Machine (M2M) Communications
sponsored by Global Knowledge
WHITE PAPER: In this informative resource, explore the unforeseen risks of M2M communication, the challenges of maintaining M2M security, and the possible solutions that exist to mitigate these risks.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

Global Knowledge

Internet Gateway Security – A state of the nation
sponsored by Icomm Technologies
WHITE PAPER: In this in-depth white paper, discover how new next generation firewalls can protect organisations against dangerous threats as well as address the vulnerabilities created by new technologies like cloud computing and mobilisation.
Posted: 24 Sep 2014 | Published: 24 Sep 2014

Icomm Technologies

Take Control of Your IT Security with New Cyber Resilience Programs
sponsored by Sungard
WHITE PAPER: In this in-depth whitepaper, discover a new cyber resilience program that can strengthen your defense against malicious attackers, improve responsiveness and adaptability, and provide comprehensive risk management.
Posted: 24 Sep 2014 | Published: 24 Sep 2014

Sungard

Data Breach Risks of Microsoft Lync
sponsored by Actiance
WHITE PAPER: With rapid adoption of Microsoft Lync, new forms of data such as IM, chat, voice, and video are proliferating. Organizations need to deploy industrial strength methods to prevent mounting security risks. Download THIS WHITEPAPER to find out how!
Posted: 22 Sep 2014 | Published: 22 Sep 2014

Actiance

Effectively Spot Security Threats with New SSL Visibilty Solutions
sponsored by Blue Coat Systems
WHITE PAPER: In this in-depth guide, discover new SSL visibility solutions that can help organization effectively monitor encrypted traffic and detect malicious content.
Posted: 22 Sep 2014 | Published: 31 Dec 2013

Blue Coat Systems

Next Generation Firewalls: Here’s What You Need To Know
sponsored by HP and Intel
WHITE PAPER: This expert eGuide breaks down next-generation firewalls, their new features, and the new IT rules that come along with them.
Posted: 19 Sep 2014 | Published: 19 Sep 2014

HP and Intel

Why Next-Generation Firewalls Are Critical To Your Organization’s Network Security
sponsored by Icomm Technologies
WHITE PAPER: This in-depth whitepaper explores the next generation of firewalls, which can provide more effective advanced threat protection, enhanced application intelligence and control, and higher performance.
Posted: 18 Sep 2014 | Published: 18 Sep 2014

Icomm Technologies

Get the Network Protection You Need with Next Generation Firewalls
sponsored by CDW Corporation
WHITE PAPER: In this white paper, discover what a next-generation firewall can do for your organization in terms of network security.
Posted: 03 Oct 2014 | Published: 03 Oct 2014

CDW Corporation
1 - 25 of 272 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement