IT Management  >   Systems Operations  >   Security  >  

Cybersecurity

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Cyber Security, Cyber Security Enhancement Act of 2002
DEFINITION: Information assurance, including information security, information technology disaster recovery, and information privacy. See Section 225, Cyber Security Enhancement Act of 2002, of the Homeland Security Act.
CybersecurityWhite Papers (View All Report Types)
126 - 150 of 203 Matches Previous Page  | Next Page
Escalating Targeted Web and Email Attacks
sponsored by M86 Security UK
WHITE PAPER: Today's cybercriminals are more dangerous and sophisticated than ever before, launching more targeted attacks for bigger payoffs. And with new emerging technologies, also come new ways of exploitation. In this resource, explore the growing issue of targeted web and email threats and discover a unique approach to mitigating them.
Posted: 23 Feb 2012 | Published: 23 Feb 2012

M86 Security UK

Global Threat Report January 2012: Where are the 419s of Yesteryear?
sponsored by ESET
WHITE PAPER: This January 2012 Global Threat report offers information and articles on today's threat environment including the lastest list of the top 10 threats. View now to gain key insight from security researchers and experts exploring 419s, the need for need anti-virus, anti-malware or anti-spam, 2012 trends, PUAs and more.
Posted: 13 Feb 2012 | Published: 13 Feb 2012

ESET

Global Threat Report December 2011
sponsored by ESET
WHITE PAPER: Stay informed about the most important cybersecurity issues facing the IT community today. Review this 2011 Global Threat report to help you protect your business in 2012 and beyond. Explore key topics including threat trends and security gains, monthly malware reports and the essential Top Ten Threats lists.
Posted: 26 Jan 2012 | Published: 26 Jan 2012

ESET

Global Threats Report Dec 2011
sponsored by ESET
WHITE PAPER: The Global Threat Report offers a monthly overview of the most important cybersecurity issues facing the IT community today, offering informative articles, security tips, viral online resources, expert advice and opinions from ESET researchers, and the essential Top Ten Threats lists. Access now to learn how you can stay informed.
Posted: 26 Jan 2012 | Published: 26 Jan 2012

ESET

Security Predictions for 2012
sponsored by Websense, Inc.
WHITE PAPER: This pivotal resource offers valuable insight into 7 security predictions for the coming year, as well as ways in which your organization can prepare for whatever lurks on the horizon.
Posted: 18 Jan 2012 | Published: 18 Jan 2012

Websense, Inc.

Lumension Patch Management: Picking the Low-Hanging Fruit
sponsored by Lumension
WHITE PAPER: This white paper explores a centralized, comprehensive approach to application patching, allowing security pros to automatically detect risks, deploy patches and protect business information across a complex, highly distributed physical and virtual environment.
Posted: 12 Jan 2012 | Published: 12 Jan 2012

Lumension

The four rules of complete web protection
sponsored by Sophos, Inc.
WHITE PAPER: As an IT manager you’ve always known the web is a dangerous place. But with infections growing and the demands on your time and budget rising, it’s time to revisit your strategy. This whitepaper discusses the major web threats and provides four rules to help you stay protected. When you follow them, these rules will also save you time and money.
Posted: 01 Jan 2012 | Published: 16 Dec 2011

Sophos, Inc.

Beating the Bad Guys: Strategies to Mitigate the Malware Threat
sponsored by RSA, The Security Division of EMC
WHITE PAPER: While there is no silver bullet to eliminate cybercrime and malware, there are ways to mitigate risk, requiring a combination of multiple technologies to protect endpoints, online sessions and transactions. View this paper to examine the regulatory environment and uncover successful strategies for beating the bad guys.
Posted: 23 Nov 2011 | Published: 23 Nov 2011

RSA, The Security Division of EMC

Security Predictions for 2012
sponsored by Websense, Inc.
WHITE PAPER: With the rise of bring-your-own-devices, mobility, social networking and the cloud, 2012 is likely to bring its share of security challenges. Websense Security Labs researchers compiled a list of security predictions to offer IT pros guidance for on what to expect this upcoming year. View now to uncover the top seven events.
Posted: 23 Nov 2011 | Published: 22 Nov 2011

Websense, Inc.

Modern Cyber Threats and Government Agencies
sponsored by M86 Security
WHITE PAPER: View this paper to explore how and why targeted attacks work, modern cyber attacks in the real world, the rise in public sector attacks, Web and email security solutions and more.
Posted: 18 Nov 2011 | Published: 18 Nov 2011

M86 Security

Advanced Threats: The New World Order
sponsored by RSA, The Security Division of EMC
WHITE PAPER: This paper examines the state of advanced threats on the front lines, as seen by the companies, law enforcement officials and government leaders. View now to gain a better understanding of these emerging threats, its challenges to all organizations and how to defend against them.
Posted: 25 Oct 2011 | Published: 25 Oct 2011

RSA, The Security Division of EMC

The Evolving Threat Landscape
sponsored by Juniper Networks, Inc.
WHITE PAPER: This paper surveys emerging threats, profiles theirhighly organized perpetrators, and reviews some of the revolutionary technologies that make these attacks so persistent and effective.
Posted: 02 Sep 2011 | Published: 02 Sep 2011

Juniper Networks, Inc.

Fraud Prevention and Detection for Credit and Debit Card Transactions
sponsored by IBM
WHITE PAPER: Over the past 20 years, financial institutions, governments, insurers and retailers have seen an explosion in the amount and types of fraud perpetrated against them.
Posted: 07 Jul 2011 | Published: 01 Aug 2009

IBM

Knowledge of threats and vulnerabilities
sponsored by IBM
WHITE PAPER: IBM Security Solutions are built on the Secure by Design philosophy, which states that IT infrastructure should be designed, created and operated with security in mind. This paper focuses on how IBM helps clients understand the threat landscape and vulnerabilites.
Posted: 01 Jul 2011 | Published: 01 Sep 2010

IBM

Cybercrime and the Healthcare Industry
sponsored by RSA, The Security Division of EMC
WHITE PAPER: As technologies in healthcare continue to evolve, so will the cybercriminal activity targeted at healthcare organizations progress as well. This paper takes a look into cybercrime in the healthcare industry and discusses why access to data and information is fast becoming a target of scrutiny and risk.
Posted: 21 Jun 2011 | Published: 21 Jun 2011

RSA, The Security Division of EMC

The Next Generation of Cybercrime
sponsored by Dell SecureWorks
WHITE PAPER: This white paper will educate you about a range of different security threats, as well as, the hackers that perpetrated these viruses. You will also receive a list of best practices for protecting your organization the right way.
Posted: 31 May 2011 | Published: 31 May 2011

Dell SecureWorks

Cybersecurity Readiness Study: An Executive Summary
sponsored by ArcSight, an HP Company
WHITE PAPER: This study by Ponemon Institute will cover the development of cyber attacks and the development of security systems that can prevent an detect these attacks. It will also tell you when organizations are doing to counter these threats and how you can find out if your organization is prepared for these threats.
Posted: 17 May 2011 | Published: 17 May 2011

ArcSight, an HP Company

CISO Guide to Next Generation Threats
sponsored by FireEye
WHITE PAPER: The only way to protect yourself against next generation threats is to have next generation protection. Traditional firewalls, IPS, anitivirus, and signature based systems are still useful against known threats, but they don't stand a chance against new ones
Posted: 17 May 2011 | Published: 16 May 2011

FireEye

CISO Guide to Next Generation Threats
sponsored by FireEye
WHITE PAPER: This white paper will tell you about a new security solutions and the need to your business to update it's security solutions to a Next-Generation security system.
Posted: 09 May 2011 | Published: 09 May 2011

FireEye

Why Hackers have turned to Malicious JavaScript Attacks
sponsored by Sophos, Inc.
WHITE PAPER: Learn about the threat of malicious JavaScript attacks, and how they work. Understand how cybercriminals make money with these types of attacks and why IT managers should be vigilant.
Posted: 13 Apr 2011 | Published: 13 Apr 2011

Sophos, Inc.

Attack of the PDF Documents: How Adobe’s PDF Format has become one of the top carriers of malware
sponsored by Sophos, Inc.
WHITE PAPER: Since PDF has become so common on the Internet, with nearly every business using it as the document format of choice for delivering forms, articles, and whitepapers, the security problems and malware potential of PDF are far too tempting for the bad guys to ignore.
Posted: 11 Apr 2011 | Published: 11 Apr 2011

Sophos, Inc.

Considerations for Integrating Intelligence into Security Operations
sponsored by Verisign, Inc.
WHITE PAPER: This white paper outlines four critical elements of cyber security intelligence that organizations must meet to ensure that the integration of the intelligence will help improve the safety and profitability of enterprises.
Posted: 18 Mar 2011 | Published: 18 Mar 2011

Verisign, Inc.

Data Breaches: A Growing Problem for the Healthcare Community
sponsored by Wave Systems Corp.
WHITE PAPER: While the pros of Electronic Medical Records (EMR) and online Healthcare Portals greatly outweigh the cons, their introduction comes at a price — an increased risk of both accidental and intentional data loss.
Posted: 17 Mar 2011 | Published: 17 Mar 2011

Wave Systems Corp.

Eradicate Cross-Site Scripting
sponsored by Veracode, Inc.
WHITE PAPER: The rise of e-commerce has generated a concurrent surge of Internet crime into a multi-billion-a-year industry, as criminals follow the money, the countless potential online victims and the vulnerability of web applications to easy exploitation.
Posted: 28 Feb 2011 | Published: 28 Feb 2011

Veracode, Inc.

Security from Above: How Cloud based Security Delivers Up‐to‐the‐Minute Network Protection
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: The convergence of numerous trends is causing organizations to reconsider their approach to security.While widespread email viruses and worms have decreased, attacks via the web are on the rise.
Posted: 24 Feb 2011 | Published: 24 Feb 2011

WatchGuard Technologies, Inc.
126 - 150 of 203 Matches Previous Page    4 5 6 7 8 9    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement