IT Management  >   Systems Operations  >   Security  >  

Cybersecurity

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Cyber Security, Cyber Security Enhancement Act of 2002
DEFINITION: Information assurance, including information security, information technology disaster recovery, and information privacy. See Section 225, Cyber Security Enhancement Act of 2002, of the Homeland Security Act.
Cybersecurity White Papers (View All Report Types)
101 - 125 of 379 Matches Previous Page  |  Next Page
How to Upgrade Your Endpoint Protection
sponsored by Sentinel Labs, Inc.
WHITE PAPER: 91% of successful data breaches start with attackers infecting an endpoint via a phishing attack. Learn why malicious actors are targeting endpoints, why they are particularly vulnerable, and how to stop your enterprise from falling prey.
Posted: 05 Jul 2017 | Published: 05 Jul 2017

Sentinel Labs, Inc.

How to Ensure You're Not Part of the Next Botnet
sponsored by Sophos, Inc.
WHITE PAPER: Botnets are a near limitless resource of computing power for hackers. In this white paper learn how to avoid your machines and devices from falling prey to these types of manipulations and shut down this avenue of attack.
Posted: 05 Jul 2017 | Published: 05 Jul 2017

Sophos, Inc.

How to Protect Against Ransomware
sponsored by Sophos, Inc.
WHITE PAPER: What does a typical ransomware attack look like? What security solutions should be in place to give the best possible defense? Discover the critical security technologies that every IT setup should include to thwart today's ransomware.
Posted: 05 Jul 2017 | Published: 05 Jul 2017

Sophos, Inc.

Advanced Endpoint Protection Test Report
sponsored by Sentinel Labs, Inc.
WHITE PAPER: Join experts Thomas Skybakmoen and Morgan Dhanraj as they reveal independent test results of advanced endpoint protection with simulated malware, exploits, and blended threats.
Posted: 30 Jun 2017 | Published: 14 Feb 2017

Sentinel Labs, Inc.

What Every CSO Must Know About Open Source Software
sponsored by Flexera Software
WHITE PAPER: Using open source software (OSS) without careful oversight is a potential for risk to every organization. Application security for open source strategy requires processes, training and tools. Access this resource to uncover everything your security team needs know about OSS.
Posted: 30 Jun 2017 | Published: 30 Jun 2017

Flexera Software

Don't Settle for a Patchwork: Synch-up your Security Solutions
sponsored by Sophos, Inc.
WHITE PAPER: Patchwork solutions working in isolation can't keep up with coordinated, complex attacks. Discover how endpoint and network security can work in concert to protect your enterprise from today's threats.
Posted: 29 Jun 2017 | Published: 29 Jun 2017

Sophos, Inc.

Phishing is Big Business. Don't Get Hooked.
sponsored by Sophos, Inc.
WHITE PAPER: 91% of cyberattacks and their resulting data breaches now begin with a spear phishing email. Dive into the evolution of phishing, how it works, and what it looks like. Discover the importance of combining advanced security technologies with educated, phishing-aware employees.
Posted: 29 Jun 2017 | Published: 29 Jun 2017

Sophos, Inc.

6 Risks and Opportunities to Strengthen Security using IaaS
sponsored by Centrify Corporation
WHITE PAPER: The idea of a secure perimeter has moved beyond the data center. Organizations must create the secure perimeter around the users and their devices. Examine six common risks of the modern "perimeter-less" network, and uncover six opportunities to strengthen security using IaaS.
Posted: 28 Jun 2017 | Published: 28 Jun 2017

Centrify Corporation

5 Way to Manage Mobility and IoT Risks
sponsored by Aruba Networks
WHITE PAPER: While organizations today recognize that to stay competitive they must embrace BYOD, many still struggle with security. Uncover 5 ways to manage mobility and IoT risks.
Posted: 28 Jun 2017 | Published: 28 Jun 2017

Aruba Networks

Confronting Today's Advanced Email Threats
sponsored by Vircom
WHITE PAPER: Email is becoming one of the most favored attack surfaces used by malicious actors to harm your organization. Discover how to protect your enterprise from the growing number of sophisticated threats in today's threat environment.
Posted: 28 Jun 2017 | Published: 28 Jun 2017

Vircom

Cybersecurity in the Age of Agile, DevOps, and AppDev
sponsored by Veracode, Inc.
WHITE PAPER: With cybersecurity becoming a chief issue among enterprises with high-profile attacks like WannaCry in the news, many enterprises are looking to shore up their defenses and mitigate vulnerabilities. Discover why app security (AppSec) is one of the leading issues.
Posted: 27 Jun 2017 | Published: 27 Jun 2017

Veracode, Inc.

Access Visibility and Security for Wired and Wireless Devices
sponsored by Aruba Networks
WHITE PAPER: The traditional network perimeter is a thing of the past. IT security pros need the right tools to tackle existing and unforeseen challenges. Discover a 3 step approach to securing your network and the growing number of devices on it.
Posted: 27 Jun 2017 | Published: 27 Jun 2017

Aruba Networks

Ransomware: Disaster-proof Your Data With an API
sponsored by Rubrik
WHITE PAPER: Many enterprises look to disaster recovery and backup to protect them (they can't ransom data you have a secure copy of), but that's easier said than done. Discover 6 backup tips to help protect your company from ransomware.
Posted: 27 Jun 2017 | Published: 27 Jun 2017

Rubrik

Endpoint Visibility: Prerequisite for Today's Security
sponsored by Aruba Networks
WHITE PAPER: With the billions of IoT devices expected to connect to networks in the next 3 years, and the well-publicized security breaches of late, there is a warranted demand among IT pros for real-time visibility and reporting. Learn how continuous monitoring and profiling of connected devices could be your ticket to modern endpoint security.
Posted: 26 Jun 2017 | Published: 26 Jun 2017

Aruba Networks

The Spectrum of Mobile Risk: Understanding the Full Range of Risks to Enterprise Data From Mobility
sponsored by Lookout
WHITE PAPER: Download this white paper to discover a mobile risk matrix that will help organizations understand the prevalence of mobile risk surrounding software vulnerabilities, mobile app threats, behavior and configurations and more.
Posted: 23 Jun 2017 | Published: 23 Jun 2017

Lookout

Key Issues for E-Discovery and Legal Compliance
sponsored by Smarsh
WHITE PAPER: Managers are often worried their organizations will be sued at some point, but most aren't adequately prepared to deal with e-discovery issues. In this Osterman Research report, uncover insight from the results of an in-depth survey of decision makers and influencers at mid-sized and large organizations.
Posted: 22 Jun 2017 | Published: 22 Jun 2017

Smarsh

5 Steps to Eradicate Text Messaging Risk
sponsored by Smarsh
WHITE PAPER: Prohibiting the use of text messages in your organization does not protect you from risk - it simply hides it. Discover 5 steps on how to leverage text messaging more in your organization as a legitimate communication channel while reducing your organization's compliance, legal and reputational risk.
Posted: 21 Jun 2017 | Published: 21 Jun 2017

Smarsh

2017 Electronic Communications Compliance Survey Report
sponsored by Smarsh
WHITE PAPER: With the growth in the number of allowed communication channels and the sheer volume of messages, compliance is struggling to keep up. Access this survey report to discover the top concerns about mobile communication, what compliance benefits improved archival methods can provide and more.
Posted: 21 Jun 2017 | Published: 21 Jun 2017

Smarsh

What GDPR Means for Your Security Strategy
sponsored by Dell SecureWorks
WHITE PAPER: Due to the GDPR, compliance is mandatory by 25th May 2018. Access this whitepaper to discover what data security requirements are laid down by the GDPR, and how to ensure your organization is ready.
Posted: 20 Jun 2017 | Published: 20 Jun 2017

Dell SecureWorks

3 Ways Text Messaging Exposes Your Company to Massive Risk
sponsored by Smarsh
WHITE PAPER: Organizations often don't consider retention and oversight of texts, which exposes them to significant risk for compliance and litigation. Discover 3 massive risks for your enterprise carried by texting, and how to mitigate.
Posted: 20 Jun 2017 | Published: 20 Jun 2017

Smarsh

Digital Certificates: Ensure Security with This 2-step Process
sponsored by Blue Cedar
WHITE PAPER: Digital certificates can provide a secure second factor for authenticating connected mobile apps. Uncover how to leverage them to secure your mobile devices.
Posted: 19 Jun 2017 | Published: 19 Jun 2017

Blue Cedar

Preparing for GDPR's Incident Response Challenges
sponsored by IBM Resilient
WHITE PAPER: The EU's GDPR goes into effect on May 25, 2018 and with the regulation comes new challenges for organizations dealing with personal data. Access this resource to ensure your incident response team is fully prepared before the GDPR mandate.
Posted: 19 Jun 2017 | Published: 19 Jun 2017

IBM Resilient

What Makes a Cyber Resilient Organization?
sponsored by IBM Resilient
WHITE PAPER: With a surprising number of companies unsure of their ability to recover from cyberattacks, now is your time to ensure your organization can. Discover what it takes to be cyber resilient and prevent, detect, contain, and recover from a myriad of serious threats against data, applications, and IT infrastructure.
Posted: 19 Jun 2017 | Published: 28 Feb 2017

IBM Resilient

Report: Your Guide to Today's Healthcare Threat Landscape
sponsored by Symantec
WHITE PAPER: Uncover 6 threats to your healthcare organization and how they have evolved over the past year, what specific dangers they pose to your healthcare organization, and what you can do to mitigate their harm.
Posted: 16 Jun 2017 | Published: 16 Jun 2017

Symantec

Log Management Buyer's Guide
sponsored by Rapid7
WHITE PAPER: The log management space is confusing, noisy, and crowded with solutions that are often very similar or vague about their offerings. Discover 11 questions that you should be asking when shopping for a log management solution.
Posted: 16 Jun 2017 | Published: 16 Jun 2017

Rapid7
101 - 125 of 379 Matches Previous Page    3 4 5 6 7 8    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement