IT Management  >   Systems Operations  >   Security  >  

Cybersecurity

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Cyber Security, Cyber Security Enhancement Act of 2002
DEFINITION: Information assurance, including information security, information technology disaster recovery, and information privacy. See Section 225, Cyber Security Enhancement Act of 2002, of the Homeland Security Act.
Cybersecurity White Papers (View All Report Types)
1 - 25 of 308 Matches Previous Page  |  Next Page
Are You Leaving the Door Open for Cyber Threats?
sponsored by Palo Alto Networks
WHITE PAPER: In this exclusive e-guide, learn how businesses can eliminate security boundaries and develop a resilient defense posture against readily-advancing threats. Read on to uncover how to choose the right firewall, enable steadfast security within virtually all type of apps, and more.
Posted: 02 Dec 2016 | Published: 02 Dec 2016

Palo Alto Networks

The Threat Lifecycle Management Framework
sponsored by LogRhythm, Inc.
WHITE PAPER: You can lessen your organization's risk of experiencing a damaging cyber incident or data breach by understanding six key phases of threat lifecycle management (TLM.) Discover how integrated TLM capabilities can optimally reduce mean time to detect (MTTD) and mean time to respond (MTTR.)
Posted: 30 Nov 2016 | Published: 30 Nov 2016

LogRhythm, Inc.

The Top Cybersecurity Risks – And How Enterprises Are Responding
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Download this report, based on a 2016 Strategic Cybersecurity Survey of 300 IT and security professionals, to discover key strategies to promote smooth sailing when navigating your organization through the shifting threat management landscape, including also a risk assessment of cloud providers.
Posted: 23 Nov 2016 | Published: 31 Oct 2016

Arctic Wolf Networks, Inc.

Ransomware: 3 Seconds to Encryption
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Discover eye-opening ransomware statistics and figures in this short infographic. You'll learn just how rampant the ransomware problem has become among small businesses, but also discover how you can protect your organization to combat ransomware effectively.
Posted: 21 Nov 2016 | Published: 31 Oct 2016

Arctic Wolf Networks, Inc.

IoT Guardian for the Healthcare Industry
sponsored by Zingbox
WHITE PAPER: Last year, healthcare was the most attacked industry, and 17% of documented attacks were facilitated through IoT medical devices. Download this white paper and discover how to fully protect your network from vulnerable or compromised medical devices – a healthcare organization's weakest link.
Posted: 18 Nov 2016 | Published: 31 Oct 2016

Zingbox

Four Countermeasures to Protect Against Ransomware
sponsored by Trend Micro
WHITE PAPER: Organizations must treat mitigating the risks associated with ransomware as strategic imperative. Learn about a prescriptive approach to do so based on 4 countermeasures curated by ESG, that align with the kill chain to effectively thwart these attacks.
Posted: 18 Nov 2016 | Published: 31 Aug 2016

Trend Micro

Guide to Encrypted Traffic Management
sponsored by Blue Coat Systems
WHITE PAPER: This short guide will help you understand how encrypted traffic is growing and how it's increasingly being exploited. Get tips on how to protect your SSL/TLS traffic, and learn how to effectively monitor your network traffic for potential intrusions.
Posted: 17 Nov 2016 | Published: 31 Oct 2016

Blue Coat Systems

Dangerous Threats Require Backup for Data Protection and Recovery
sponsored by Code42
WHITE PAPER: Discover the intricacies of data leakage and theft, the motivations and tactics of a wide range of attackers, and guidance for effective action against their machinations.
Posted: 17 Nov 2016 | Published: 30 Nov 2015

Code42

Insider’s Guide to Defeating Ransomware: Protect Your Data at its Source
sponsored by Imperva
WHITE PAPER: Given the speed at which ransomware impacts organizations, security teams need to detect ransomware at the earliest stage possible. Learn how monitoring access to data on corporate file shares in real time can help you efficiently detect suspicious file modifications, allowing you to detect -- and block -- a ransomware attack.
Posted: 16 Nov 2016 | Published: 16 Nov 2016

Imperva

Making DDoS Mitigation Part of Your Incident Response Plan - Critical Steps and Best Practices
sponsored by Akamai
WHITE PAPER: The time to prepare yourself for a DDoS attack was yesterday. Discover why distributed denial of service (DDoS) attacks are so damaging to organizations and understand what you can do to protect your company today.
Posted: 16 Nov 2016 | Published: 31 Oct 2016

Akamai

Barbarians at the Gate - Shoring Up Web Application Defenses with Client Reputation
sponsored by Akamai
WHITE PAPER: Web application firewalls (WAFs) have become increasingly useful in mitigating cyberthreat risk to online assets for many companies. Learn how this and other cloud security approaches should be used in combination as part of your comprehensive defense strategy.
Posted: 16 Nov 2016 | Published: 31 Oct 2016

Akamai

10 Things Every Web Application Firewall Should Provide
sponsored by Imperva
WHITE PAPER: Where traditional firewalls have failed, web application firewalls provide strong, thorough protection. Uncover the top 10 features your team should consider when it comes to web application firewall adoption.
Posted: 14 Nov 2016 | Published: 14 Nov 2016

Imperva

Definitive Guide to Security Intelligence and Analytics
sponsored by LogRhythm, Inc.
WHITE PAPER: Security intelligence and analytics are key to uncovering and recovering from major cyberattacks. Learn how to be smart about detection and prevention, from surveying the cyberattack lifecycle to selecting the right security tool.
Posted: 10 Nov 2016 | Published: 10 Nov 2016

LogRhythm, Inc.

IIA: Stronger Cybersecurity Starts With a Data and Analytics Strategy
sponsored by SAS
WHITE PAPER: Discover why security analytics is the key to cyber security efficiency. It provides the necessary and timely visibility into network behavior and enables devices and entities acting suspiciously to be quickly identified and investigated.
Posted: 10 Nov 2016 | Published: 31 Oct 2016

SAS

Top Three Gaping Holes in Your Data Security
sponsored by Globalscape
WHITE PAPER: Regardless of efforts to secure your network from external threats, data breaches usually begin from inside. In this Globalscape paper, you'll learn: the 3 layers most targeted (the network, data & users), bad security practices, why Managed File Transfer is a critical component to combat bad practices, and more.
Posted: 08 Nov 2016 | Published: 08 Nov 2016

Globalscape

Be Afraid of Your Shadow: What Is Shadow IT? And How to Reduce It
sponsored by Globalscape
WHITE PAPER: Are you sure that employees are only using IT-sanctioned ways of transferring data? If the answer is "no," then your sensitive data may be vulnerable. In this guide from Globalscape, you'll learn: what shadow IT is and its drawbacks, how to identify signs of a shadow IT problem, how to reduce shadow IT, and more.
Posted: 07 Nov 2016 | Published: 31 Oct 2016

Globalscape

Cracking the Code on Application Security Success
sponsored by Veracode, Inc.
WHITE PAPER: Discover how to develop your own application security (AppSec) programs to reduce cyber risk and enable business to run as smoothly as possible. Learn key answers to your most pressing AppSec questions and get practical advice for working across teams to ensure the success of your new AppSec program.
Posted: 04 Nov 2016 | Published: 31 Oct 2016

Veracode, Inc.

Application Security Program Checklist
sponsored by Veracode, Inc.
WHITE PAPER: This step-by-step guide will help you implement an advanced application security program for your organization. Be ahead of the curve by knowing the answer to these questions before meeting with high ranking decision makers.
Posted: 04 Nov 2016 | Published: 31 Oct 2016

Veracode, Inc.

Ultimate Guide to Application Security
sponsored by Veracode, Inc.
WHITE PAPER: Learn how to work with appropriate teams to develop a clear application security strategy with concrete requirements for security policies. This, combined with selecting the right application security partners, can ensure your ability to create an advanced application security program that systemically reduces risk and enables innovation.
Posted: 03 Nov 2016 | Published: 31 Oct 2016

Veracode, Inc.

Trends and Tactics: How IT Professionals are Approaching AppSec Today
sponsored by Veracode, Inc.
WHITE PAPER: Discover the strategies and tactics being implemented by IT professionals to ensure the security of their applications. Learn the obstacles they're working everyday to overcome and devise a plan of your own to mitigate your app security hardships.
Posted: 03 Nov 2016 | Published: 31 Oct 2016

Veracode, Inc.

The Rise of Ransomware
sponsored by Barracuda Networks
WHITE PAPER: Discover eye-opening statistics about the ever-increasing ransomware problems against today's enterprises. Learn what types of attacks are taking place, where these attacks are taking place and what you can do to best protect your organization from financial and brand name disaster.
Posted: 01 Nov 2016 | Published: 01 Sep 2016

Barracuda Networks

Benefits of Security Intelligence Services
sponsored by Kaspersky Lab
WHITE PAPER: This white paper examines how the use of security intelligence services can help prepare your company's defenses so you can proactively mitigate threats from advanced attacks. Discover how to implement threat intelligence, leveraging data to track and manage risks before they have a negative impact on your organization.
Posted: 27 Oct 2016 | Published: 31 Aug 2016

Kaspersky Lab

Ultimate Guide to Multi-Vector DDoS Protection
sponsored by A10 Networks
WHITE PAPER: Learn everything you need to know about DDoS attacks on the rise. You'll discover how and where they attack, why most existing solutions fall short and 5 key components of a strong multi-vector DDoS attack protection solution.
Posted: 21 Oct 2016 | Published: 30 Sep 2016

A10 Networks

Comparative Analysis of Cybercriminal Groups: Buhtrap, Carbanak, and Metel
sponsored by Booz Allen Hamilton
WHITE PAPER: Learn about the Buhtrap, Carbanak and Metel cybercriminal groups in this white paper. Discover background on each group's operations over the years, what sort of damage they've done and what tools they've used to accomplish their malicious objectives.
Posted: 21 Oct 2016 | Published: 23 Mar 2016


Fragmentation: The "Silent Killer" of Your Security Management Program
sponsored by ThreatConnect
WHITE PAPER: Look at the issues caused by security fragmentation and uncover a path towards enhanced security through better unity, one that cuts the detection deficit with a cohesive, intelligent defense.
Posted: 19 Oct 2016 | Published: 30 Sep 2016

ThreatConnect
1 - 25 of 308 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement