IT Management  >   Systems Operations  >   Security  >  

Cybersecurity

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Cyber Security, Cyber Security Enhancement Act of 2002
DEFINITION: Information assurance, including information security, information technology disaster recovery, and information privacy. See Section 225, Cyber Security Enhancement Act of 2002, of the Homeland Security Act.
Cybersecurity White Papers (View All Report Types)
1 - 25 of 286 Matches Previous Page  |  Next Page
Reducing Cyber Risk in the Legal Sector: The Blurred Boundaries of Trust
sponsored by LogRhythm, Inc.
WHITE PAPER: Download this white paper to shore up your legal firm's cybersecurity defenses by adopting security intelligence tools, as well as examine the top five use-cases for centralized monitoring within the legal sector. Learn how to reduce risk through faster detection and response by identifying key areas of vulnerability.
Posted: 22 Jul 2016 | Published: 22 Jul 2016

LogRhythm, Inc.

How Industry Collaboration Mitigates Cybersecurity Risks
sponsored by LogRhythm, Inc.
WHITE PAPER: Discover in this white paper how APAC business leaders can actively share cybersecurity resources, expertise, and best practices to collectively build defenses. Read on to learn how to integrate cybersecurity into HR policies, expansion strategies, staff training processes, and more.
Posted: 22 Jul 2016 | Published: 22 Jul 2016

LogRhythm, Inc.

Defending the Indefensible: Preparing for an Uncertain Digital Future
sponsored by LogRhythm, Inc.
WHITE PAPER: The following discussion explores fundamental challenges in enforcing cybersecurity measures, the financial burden of prevailing security approaches, and suggested solutions to overcome vulnerabilities in existing infrastructures. Access now to learn what CSOs are saying about the state of corporate cybersecurity.
Posted: 21 Jul 2016 | Published: 21 Jul 2016

LogRhythm, Inc.

HITRUST CSF Certification – Frequently Asked Questions
sponsored by Coalfire
WHITE PAPER: What do you know about the HITRUST Common Security Framework (CSF) Assurance Program? Access this resource now to obtain answers to 20 FAQs about HITRUST CSF – including its relationship with HIPAA – and bolster the security posture of your healthcare organization.
Posted: 28 Jun 2016 | Published: 28 Jun 2016

Coalfire

Strengthen Desktop Virtualization Security by Minimizing Endpoint Attack Surfaces
sponsored by Dell, Inc.
WHITE PAPER: Explore some of today's challenges in endpoint security and how desktop virtualization strategies can significantly reduce risks and improve protection at endpoints. You'll also examine real-world examples of organizations using desktop virtualization architectures with thin clients to enhance security.
Posted: 22 Jun 2016 | Published: 22 Jun 2016

Dell, Inc.

Defend Against the Undetected
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper discusses how an automated, integrated security process can ensure a more secure network. Discover how this security strategy can efficiently defend your network from the perimeter to the core.
Posted: 21 Jun 2016 | Published: 21 Jun 2016

Fortinet, Inc.

2016 Security Buyer's Guide
sponsored by Illumio
WHITE PAPER: Access a step-by-step guide, complete with checklists, for adaptive security buyers in 2016. This guide will allow enterprises to pre assess their security posture, discover gaps, and evolve their strategy to better suit the hybrid-cloud environment.
Posted: 13 Jun 2016 | Published: 13 Jun 2016

Illumio

Cyber Risk Report 2016 Executive Summary
sponsored by Hewlett Packard Enterprise
WHITE PAPER: In this year's cyber risk report, you will discover the evolving nature of cybercrime, as well as the developing legislation meant to curtail it. Read on to delve into what defenders now face as they look to secure their enterprises.
Posted: 10 Jun 2016 | Published: 19 Feb 2016

Hewlett Packard Enterprise

Best Practices for Strong Cyber Security
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Discover how enterprise security best practices can help you avoid suffering financial losses, damage to your brand, and damage to customer relationships caused by undetected or detected too late cyber attacks.
Posted: 10 Jun 2016 | Published: 10 Jun 2016

Hewlett Packard Enterprise

Behind the Mask: The Changing Face of Hacking
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This new report will help you learn more about hackers and how they work. Read it to understand what attack methods hackers use, why simple approaches like phishing still work, and more.
Posted: 10 Jun 2016 | Published: 10 Jun 2016

Hewlett Packard Enterprise

The Global Cost of Cyber Crime
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Discover the most salient findings of this enterprise security and intelligence study and learn what you can do to protect your organization.
Posted: 10 Jun 2016 | Published: 10 Jun 2016

Hewlett Packard Enterprise

Threat Defense Isn't Just About Detection: It's How Your Respond
sponsored by Intel Security
WHITE PAPER: EDR can mitigate threats before they impact your organization. Discover 5 key factors to look for when researching EDR to best determine which solutions are most proactive in helping to prevent attacks.
Posted: 10 May 2016 | Published: 31 Dec 2015

Intel Security

Think Like an Attacker: Six Steps Toward Better Security
sponsored by Intel Security
WHITE PAPER: Discover why piecemeal endpoint defenses are not sufficient to protect against today's threat vectors as we take you inside the mind of an attacker to help you bolster your defenses. Read on to learn six ways to think like a hacker and why new threats require more than strategies and tools to keep the bad guys at bay.
Posted: 06 May 2016 | Published: 06 May 2016

Intel Security

Security that Plays Well with Others
sponsored by Intel Security
WHITE PAPER: As cyberattacks increase in volume and sophistication, organizations need to present a unified coordinated defense. Discover how an open, integrated security architecture can help you coordinate your siloed legacy security products and simplify the threat defense lifecycle.
Posted: 06 May 2016 | Published: 31 Dec 2015

Intel Security

Understanding Cyberthreat Motivations to Improve Defense
sponsored by Intel Security
WHITE PAPER: Find out why you must add cyber-criminal motivation to your threat taxonomy in order to understand what causes a threat agent to commit harmful acts. Read on to discover in detail the elements of this new parameter and how this crucial understating of the hacker's mind can help protect your entire infrastructure.
Posted: 06 May 2016 | Published: 06 May 2016

Intel Security

The Key to Protecting Your Business Amid Cybercrime’s Current Boom
sponsored by CA Technologies
WHITE PAPER: This white paper invites you to explore new vulnerabilities in our application-centric culture. Find relief as you uncover a simple-to-deploy, automated, proven strategy for privileged access management delivered in a single appliance protecting physical, virtual and cloud environments.
Posted: 12 Apr 2016 | Published: 12 Apr 2016

CA Technologies

Formulate a Game Plan for Closing the SecOps Gap
sponsored by BMC
WHITE PAPER: Access this report to discover why collaboration between security and operations (SecOps) will drive faster threat response, stronger security, and improved compliance in your organization. Take a closer look at the SecOps gap now, and learn the gravity of IT misalignment.
Posted: 18 Mar 2016 | Published: 18 Mar 2016

BMC

Report: Modern Threat Intelligence
sponsored by IBM
WHITE PAPER: The complexities of doing business at scale, both strategic and technical, create barriers in preventing breaches. Uncover ways to focus on user education and systematic protocols for operating a strong risk assessment program, allowing you to overcome these barriers.
Posted: 15 Mar 2016 | Published: 29 Feb 2016

IBM

Own Your Defense: Network-Based Security
sponsored by Level 3 Communications, Inc.
WHITE PAPER: Many of the same things that drive business forward today are often the primary points of entry or vectors of attack that can damage your organization. Every new connection among your systems, employees, partners and customers is a potential point of vulnerability. Learn how to keep your business safe as threats grow.
Posted: 15 Mar 2016 | Published: 01 Mar 2016

Level 3 Communications, Inc.

Cyberthreat Intelligence: How Organizations are Using Analytics on Data Left Behind by Hackers
sponsored by LogRhythm, Inc.
WHITE PAPER: One barrier to understanding the merits of cyberthreat intelligence (CTI) is confusion about what it is and what it isn't. Access this article to gain an insider's perspective on what CTI really has to offer, who needs it, and how to find the right vendor.
Posted: 07 Mar 2016 | Published: 07 Mar 2016

LogRhythm, Inc.

Today's Global DDoS Threat Landscape Report
sponsored by Imperva
WHITE PAPER: DDoS attacks against network infrastructures continue to grow in size and duration. Download this report and learn what to expect and how you can protect your website from such attacks.
Posted: 09 Feb 2016 | Published: 06 Oct 2015

Imperva

Today's Top DDoS Services Providers
sponsored by Imperva
WHITE PAPER: Forrester Research offers unique insight into the rapidly growing DDoS attacks. This report details how well each vendor measures up against Forrester's criteria and against each other with their DDoS prevention services.
Posted: 09 Feb 2016 | Published: 22 Jul 2015

Imperva

Utilizing Security Ratings for Enterprise IT Risk Mitigation
sponsored by BitSight
WHITE PAPER: This white paper highlights a security ratings technology that measures company security performance and provides metrics to help mitigate risk and streamline security operations. Access now and learn how this cloud-based intelligence platform can help your enterprise improve your overall risk management in today's world of dangerous cyber-attacks.
Posted: 05 Feb 2016 | Published: 30 Jun 2014

BitSight

Defend Against the Undetected
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper discusses how an automated, integrated security process can ensure a more secure network. Discover how this security strategy can efficiently defend your network from the perimeter to the core.
Posted: 10 Feb 2016 | Published: 11 Jan 2016

Fortinet, Inc.

New Rules of Data Security Virtual Portal
sponsored by IBM
WHITE PAPER: This portal is your hub for the latest data security strategies and best practices. Watch this series of informative videos to help shed light on the real world implications of data breaches, the importance of ensuring regulatory compliance and how to leverage best breed security solutions.
Posted: 22 Jan 2016 | Published: 09 Dec 2015

IBM
1 - 25 of 286 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement