IT Management  >   Systems Operations  >   Security  >  

Cybersecurity

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Cyber Security, Cyber Security Enhancement Act of 2002
DEFINITION: Information assurance, including information security, information technology disaster recovery, and information privacy. See Section 225, Cyber Security Enhancement Act of 2002, of the Homeland Security Act.
Cybersecurity White Papers (View All Report Types)
1 - 25 of 370 Matches Previous Page  |  Next Page
Get your Enterprise Ready for GDPR
sponsored by CyberArk Software, Inc
WHITE PAPER: Take a closer look at this white paper to reveal a checklist for securing personal data to prepare for the GDPR.
Posted: 19 Sep 2017 | Published: 19 Sep 2017

CyberArk Software, Inc

360 Data Management for GDPR
sponsored by Avnet
WHITE PAPER: The GDPR is by far and away the most comprehensive global privacy regulation ever developed. Read this whitepaper to reveal approaches you can take to prepare for the GDPR.
Posted: 19 Sep 2017 | Published: 19 Sep 2017

Avnet

Top 10 AWS Cloud Security Risks and how to Resolve them
sponsored by evident.io
WHITE PAPER: Take a look at this white paper to reveal a security platform that can protect your Amazon Web Services (AWS) cloud.
Posted: 19 Sep 2017 | Published: 19 Sep 2017

evident.io

Aruba Campus Switching: The Foundation for the Modern Digital Workplace
sponsored by Aruba Networks
WHITE PAPER: In this white paper, learn the key benefits of different types of campus switching tools to prepare your network infrastructure for the increase of doing business on mobile.
Posted: 18 Sep 2017 | Published: 18 Sep 2017

Aruba Networks

Automate Log Management to Meet NIST 800-53 Compliance
sponsored by LogRhythm, Inc.
WHITE PAPER: The collection, management, and analysis of log data is integral to meeting many NIST 800-53 requirements. Explore how a log management and analysis platform can help your company meet or exceed these guidelines.
Posted: 15 Sep 2017 | Published: 31 Dec 2014

LogRhythm, Inc.

Five Risk Points To Avoid In Enterprise Security
sponsored by Microsoft
WHITE PAPER: Hackers have found sophisticated methods to breach the network undetected.In this white paper, guide yourself through the 5-step course to detect and prevent advance cyberattacks.
Posted: 15 Sep 2017 | Published: 15 Sep 2017

Microsoft

How to Build a SOC with Limited Resources
sponsored by LogRhythm, Inc.
WHITE PAPER: Read this white paper to discover the knowledge needed to successfully build your own security operations center (SOC).
Posted: 15 Sep 2017 | Published: 15 Sep 2017

LogRhythm, Inc.

Spain: Internet Security Threat Profile in Numbers
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Which industries in Spain receive the most malware, phishing and spam attacks?
Posted: 14 Sep 2017 | Published: 31 Mar 2017

Symantec & Blue Coat Systems

Sweden: Internet Security Threat Profile in Numbers
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Which industries in Sweden experience the most email attacks, including: malware, phishing, and spam?
Posted: 14 Sep 2017 | Published: 31 Mar 2017

Symantec & Blue Coat Systems

11 Security Analytics Providers Slug it Out
sponsored by LogRhythm, Inc.
WHITE PAPER: Forrester surveys indicate that 74% of global enterprise security technology decision makers rate improving security monitoring as a high or critical priority. In this Forrester report, discover an in-depth look at 11 security analytics vendors: where they excel, fall short, and how they compare to one another.
Posted: 14 Sep 2017 | Published: 06 Mar 2017

LogRhythm, Inc.

Orchestrated Response: A Game-Changing Strategy
sponsored by IBM Resilient
WHITE PAPER: Uncover how organizations have improved their security posture by using advanced security automation and orchestration strategies to alleviate cyber threats.
Posted: 13 Sep 2017 | Published: 13 Sep 2017

IBM Resilient

Study on the Cyber Resilient Organization: United Arab Emirates
sponsored by IBM Resilient
WHITE PAPER: Take an in-depth look at this Ponemon study to reveal factors effecting cyber resilience. Learn more about activities to improve it, barriers, and threats.
Posted: 12 Sep 2017 | Published: 30 Jun 2017

IBM Resilient

The Case Against ISP DNS
sponsored by Oracle + Dyn
WHITE PAPER: In this white paper, understand the challenges that can occur with Internet Service Provider (ISP)-based DNS and how to better prevent outages and DDoS attacks.
Posted: 11 Sep 2017 | Published: 08 Sep 2017

Oracle + Dyn

How to Implement NIST CSF : A 4-Step Journey to Cybersecurity Maturity
sponsored by Rsam
WHITE PAPER: Read this white paper to discover how a NIST Cybersecurity Framework platform provides users like you with strong security and threat protection against possible attackers.
Posted: 07 Sep 2017 | Published: 11 Sep 2017

Rsam

Online Security Through The Ages
sponsored by LogMeIn, Inc.
WHITE PAPER: Take a look at this infographic to uncover statistics about password security among generations and ways your company can manage and secure online platforms.
Posted: 06 Sep 2017 | Published: 21 Jun 2017

LogMeIn, Inc.

You're Only as Strong as your Weakest Password
sponsored by LogMeIn, Inc.
WHITE PAPER: 4.2B password credentials were stolen in 2016. Take a look at this infographic to uncover statistics regarding password security that will help you secure your company's password platform.
Posted: 06 Sep 2017 | Published: 06 Sep 2017

LogMeIn, Inc.

Changing Password Behavior with Real Data
sponsored by LogMeIn, Inc.
WHITE PAPER: Check out this case study to learn about how Matt Shafer, IT Manager at Informz, overcame the issue of an open sharing password platform by implementing a password security posture that allows team leaders to centrally control shared passwords.
Posted: 06 Sep 2017 | Published: 06 Sep 2017

LogMeIn, Inc.

6 Steps to Implementing a Risk-Based Security Approach
sponsored by Dell SecureWorks
WHITE PAPER: It is difficult to defend against something when you do not know what exactly you are defending against. Take an in-depth look at this white paper to uncover 6 steps to implementing a risk-based security approach to enhance your security posture.
Posted: 05 Sep 2017 | Published: 31 Dec 2016

Dell SecureWorks

Australian Privacy Act 1988 Amendment Explained
sponsored by Dell SecureWorks
WHITE PAPER: The amendments to the Privacy Act 1988 are going to force sweeping changes to the attitude around cybersecurity in Australia. This white paper explains who these amendments affect and what they mean for you.
Posted: 05 Sep 2017 | Published: 31 Dec 2016

Dell SecureWorks

Anatomy of a Cyberattack
sponsored by Infocyte
WHITE PAPER: According to Ponemon, the cost of a data breach is significantly less if you contain it within 30 days. Check out this white paper to uncover the anatomy of cyberattacks to see where different "hunt tools" can be used for your protection to detect data breaches early.
Posted: 05 Sep 2017 | Published: 05 Sep 2017

Infocyte

Protecting the Enterprise Against Unknown Malware
sponsored by Infocyte
WHITE PAPER: The annual economic cost of global cybercrime is pinpointed to a figure of $450 billion USD last year. This white paper introduces threat hunting as an essential component of your security strategy to combat the rise of unknown malware and cybercrime.
Posted: 05 Sep 2017 | Published: 05 Sep 2017

Infocyte

Armor Complete's Intelligent Security Model: A Closed-loop System that Actively Learns how to Combat Threats
sponsored by Armor
WHITE PAPER: In this white paper, discover how an Intelligent Security Model (ISM) delivers a high level of security and compliance while actively learning how to combat threats.
Posted: 05 Sep 2017 | Published: 05 Sep 2017

Armor

Reducing Attacker Dwell Time
sponsored by Infocyte
WHITE PAPER: Discover how to reduce attacker dwell time with a threat hunting strategy that enables you to detect and resolve breaches to your network faster.
Posted: 01 Sep 2017 | Published: 01 Sep 2017

Infocyte

WhoDunIt? The Mystery of the Advanced Persistent Threat (APT)
sponsored by Kaspersky Lab
WHITE PAPER: For companies that experienced a targeted cyberattack, 68% report data loss or exposure as a direct result of the attack. Advanced Persistent Threats (APTs) are even more disconcerting. Learn how to protect your company's sensitive information from APT attacks, and discover real-world examples of companies who used Kaspersky for attribution.
Posted: 01 Sep 2017 | Published: 01 Sep 2017

Kaspersky Lab

The Dawn of the DDoS of Things & 1 Tbps Attacks
sponsored by A10 Networks
WHITE PAPER: In this white paper learn how to prevent Mirai maleware, a type of DDoS attacks hackers use to compromise unsecured IoT devices.
Posted: 01 Sep 2017 | Published: 30 Jun 2017

A10 Networks
1 - 25 of 370 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement