IT Management  >   Systems Operations  >   Security  >  

Cybersecurity

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Cyber Security, Cyber Security Enhancement Act of 2002
DEFINITION: Information assurance, including information security, information technology disaster recovery, and information privacy. See Section 225, Cyber Security Enhancement Act of 2002, of the Homeland Security Act.
CybersecurityWhite Papers (View All Report Types)
126 - 150 of 272 Matches Previous Page  | Next Page
2013 Fourth Annual Cost of Cyber Crime Study
sponsored by Hewlett-Packard Limited
WHITE PAPER: This guide explores the state of cybercrime in today's IT landscape and provides global statistics on the high costs of security breaches.
Posted: 11 Feb 2014 | Published: 31 Oct 2013

Hewlett-Packard Limited

10 Things Your Next Firewall Must Do
sponsored by Palo Alto Networks
WHITE PAPER: This valuable resource highlights the renewed focus on firewalls to improve security given the increasing complexities in network architectures. Click now to explore next-generation firewalls, and 10 things that they must do to protect your organization.
Posted: 24 Dec 2013 | Published: 19 Aug 2013

Palo Alto Networks

Extending Security Intelligence with Big Data solutions
sponsored by IBM
WHITE PAPER: Cybercriminals are continuing to grow and their tactics are becoming more refined. This guide outlines the role big data plays in IT security and how analytics can help thwart cybercrminals.
Posted: 24 Dec 2013 | Published: 31 Jan 2013

IBM

The Bot Threat
sponsored by Hewlett-Packard Company
WHITE PAPER: In this white paper, get vital information about the malicious bot, also known as botnets when in large forces, and explore 4 key features that will help you build a defense-in-depth security system to prevent these attacks from compromising your networks.
Posted: 13 Nov 2013 | Published: 19 Nov 2014

Hewlett-Packard Company

Planning a Career Path in Cybersecurity
sponsored by Global Knowledge
WHITE PAPER: The need for personnel knowledgeable and experienced in security implementation and management has never been greater, and the need is growing.
Posted: 01 Nov 2013 | Published: 01 Nov 2013

Global Knowledge

Continuous Cyber Situational Awareness
sponsored by Lumeta Corporation
WHITE PAPER: This informative paper takes an in-depth look at continuous monitoring, describing how you can successfully deploy the technology and how it can increase visibility and streamline your security management.
Posted: 10 Feb 2014 | Published: 10 Feb 2014

Lumeta Corporation

Protecting Your APIs Against Attack & Hijack
sponsored by CA Technologies.
WHITE PAPER: Even though application programming interfaces (APIs) experience the same threats as the Web, thanks to architecture differences, existing Web security methods aren't enough to keep them protected. Read on to unveil 5 best practices to secure your API architectures.
Posted: 06 Feb 2014 | Published: 31 Dec 2012

CA Technologies.

Embracing Opportunities With Smartphone and Tablets While Eliminating Risks
sponsored by SafeNet Asia Ltd
WHITE PAPER: In this white paper, discover a unified platform that simplifies authentication controls for the ever-growing amount of endpoints to reduce the fear of unauthorized access to sensitive data.
Posted: 09 Jan 2014 | Published: 20 Oct 2011

SafeNet Asia Ltd

Taming the Integration Nightmares of a 1,000 App Enterprise
sponsored by Palo Alto Networks
WHITE PAPER: Access this informative white paper today, which highlights an innovative integration approach that will enable you to significantly boost business agility and cost control.
Posted: 26 Dec 2013 | Published: 28 Jan 2014

Palo Alto Networks

Cybersecurity Imperatives: Reinvent Your Network Security With Palo Alto Networks
sponsored by Palo Alto Networks
WHITE PAPER: In this valuable resource, discover a security platform designed to keep up with today's ever-evolving threat landscape, which offers optimum network security without lowering network performance or reducing business productivity.
Posted: 26 Dec 2013 | Published: 31 Aug 2013

Palo Alto Networks

Five Tips to Reduce Risk From Modern Web Threats
sponsored by Sophos, Inc.
WHITE PAPER: Safeguarding your systems from ever-changing cybercriminals eyeing your sensitive data can be overwhelming. This guide explores 5 steps you can take to reduce risk from modern web threats.
Posted: 19 Dec 2013 | Published: 30 Sep 2013

Sophos, Inc.

Taking Charge of Security in a Hyperconnected World
sponsored by RSA
WHITE PAPER: Access this resource to uncover the top mistakes IT managers are making in their security strategies, and why they need a more continuous approach to improving defense systems in today's ever changing threat landscape.
Posted: 06 Dec 2013 | Published: 31 Oct 2013

RSA

Information Security Emagazine: Best Practices for the Evolving Threat Landscape
sponsored by Hewlett-Packard Limited
WHITE PAPER: In this security emagazine, discover a variety of resources that offer exclusive best practices on how to boost security strategies to address the rise in cyber threats.
Posted: 02 Dec 2013 | Published: 02 Dec 2013

Hewlett-Packard Limited

Defending Against Denial of Service Attacks
sponsored by F5 Networks
WHITE PAPER: Access this white paper for key information about how denial of service (DoS) attacks have taken advantage of the lack of security and compliance measures around network availability. Read on to learn how you can leverage networks and applications to defend against these threats.
Posted: 25 Nov 2013 | Published: 31 Oct 2012

F5 Networks

For Secure Access, Passwords Alone Do Not Work
sponsored by Verizon
WHITE PAPER: This informative paper explores an innovative alternative to passwords. Discover how multifactor authentication can provide a higher level of security than a password alone and find out how this solution can comprehensively enhance your data protection strategy. Read on now to learn more.
Posted: 18 Nov 2013 | Published: 31 Oct 2013

Verizon

Safeguarding Business in a Time of Expanding and Evolving Cyber Threats
sponsored by Verizon
WHITE PAPER: This paper explores how advanced cybersecurity threat management techniques can help companies better prepare for, respond to, and detect advanced cybersecurity threats. It also explores how more advanced cybersecurity threat management capabilities can help organizations detect and respond to threats within days instead of months.
Posted: 18 Nov 2013 | Published: 31 Oct 2013

Verizon

System z, x86, UNIX: Which is more secure?
sponsored by IBM
WHITE PAPER: Access this comprehensive survey to explore the business impact of different platform architectures -- in particular, their impact on security. Read now to see how IBM's System z, x86, and UNIX stack up in areas such as reliability, security, and total security cost.
Posted: 15 Nov 2013 | Published: 15 Nov 2013

IBM

Server Security Survey Report
sponsored by Bit9, Inc.
WHITE PAPER: In October 2013, Bit9 conducted a survey on server security designed to analyze challenges in the inability to detect or stop advanced attacks – click now to discover key findings and takeaways.
Posted: 13 Nov 2013 | Published: 13 Nov 2013

Bit9, Inc.

IBM X-Force 2013 Mid-Year Trend and Risk Report
sponsored by IBM
WHITE PAPER: In this detailed white paper, explore this year's report on the latest risks and security challenges organizations are facing today, and offers best practices to boost security fundamentals and policies to meet these advanced persistent threats (APTs).
Posted: 06 Nov 2013 | Published: 30 Sep 2013

IBM

A “How-To” Guide on Using Cloud Services for Security-Rich Data Backup
sponsored by IBM
WHITE PAPER: Access this resource for a cloud solution that uses a collaboration of hardware, software, and services with advanced technologies to ensure data and application security, while allowing you to focus on business priorities.
Posted: 30 Oct 2013 | Published: 30 Sep 2012

IBM

Hidden Lynx: Professional Hackers for Hire
sponsored by Symantec Corporation
WHITE PAPER: In this white paper, uncover the facts behind security's most threatening presence, the Hidden Lynx group, which uses more sophisticated, targeted attacks, and has the ability to adapt to defense methods.
Posted: 28 Oct 2013 | Published: 17 Sep 2013

Symantec Corporation

Longline Phishing: A New Class of Advanced Phishing Attacks
sponsored by Proofpoint, Inc.
WHITE PAPER: In this white paper, gain valuable information about longlining, the newest method in phishing attacks, and key recommendations for how to enhance your email security defense.
Posted: 28 Oct 2013 | Published: 31 Dec 2012

Proofpoint, Inc.

Symantec Intelligence Report - August 2013
sponsored by Symantec Corporation
WHITE PAPER: In this white paper, get the most recent analysis on cybersecurity threats and trends, and gain insight on what to expect in the future.
Posted: 21 Oct 2013 | Published: 31 Aug 2013

Symantec Corporation

Weaponized malware now threatens the private sector
sponsored by Lumension
WHITE PAPER: Access this resource for crucial information about the next class of advanced persistent threats (APT) and uncover how you can boost endpoint security management to reduce the risk of these attacks.
Posted: 15 Oct 2013 | Published: 12 Sep 2012

Lumension

Website Security Threat Report, Part Two
sponsored by Symantec Corporation
WHITE PAPER: This website security threat report focuses on the threats that impact your website and online business. Access this resource to understand the threat landscape and understand how you can protect your company and your infrastructure.
Posted: 14 Oct 2013 | Published: 11 Oct 2013

Symantec Corporation
126 - 150 of 272 Matches Previous Page    4 5 6 7 8 9    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement