IT Management  >   Systems Operations  >   Security  >  

Cybersecurity

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Cyber Security, Cyber Security Enhancement Act of 2002
DEFINITION: Information assurance, including information security, information technology disaster recovery, and information privacy. See Section 225, Cyber Security Enhancement Act of 2002, of the Homeland Security Act.
Cybersecurity White Papers (View All Report Types)
26 - 50 of 396 Matches Previous Page  |  Next Page
Keeping PACE with the Changing Threat
sponsored by BT
WHITE PAPER: It's no longer enough to follow cybercrime trends and react to them, you need to constantly monitor and anticipate threats due to how serious the results can be. This paper provides a proactive, adaptive, collaborative, and experienced (PACE) approach to securing your organization against looming security threats.
Posted: 27 Nov 2017 | Published: 27 Nov 2017

BT

Dealing With EU Data-Protection Regulation
sponsored by BT
WHITE PAPER: As the digital world continues to grow, more people are paying close attention to what happens to their data. This resource offers insight into securing data for the upcoming GDPR as well as recommendations to help you prepare for compliance.
Posted: 27 Nov 2017 | Published: 28 Feb 2017

BT

The Evolving Role of CISOs and their Importance to the Business
sponsored by F5 Networks
WHITE PAPER: Explore this 67 page Ponemon Institute Security Report to gain insight into the evolution and influence of CISOs through interviews with 184 companies regarding insights, challenges and approaches to security in today's global threat landscape.
Posted: 21 Nov 2017 | Published: 21 Nov 2017

F5 Networks

A Matchmaker's Guide to UBA Solutions
sponsored by Rapid 7
WHITE PAPER: Gartner predicts that by 2020, less than 5 stand-alone user behavior analytics (UBA) solutions will remain in the market, with most vendors focusing on specific use cases and outcomes. This paper offers 13 questions to help you evaluate the right UBA strategy and confirm your company's protection far into the future.
Posted: 21 Nov 2017 | Published: 21 Nov 2017

Rapid 7

DDoS: Strategies for Dealing With a Growing Threat
sponsored by A10 Networks
WHITE PAPER: In 2015, 10% of average DDoS attacks were above 50 Gbps. Today the average size of attacks greater than 50 Gbps quadrupled to 42%. This IDG paper provides research on recent DDoS attacks and compares the data to a similar study conducted a few years ago to discover what measures organizations need to take now to prevent the attacks.
Posted: 21 Nov 2017 | Published: 21 Nov 2017

A10 Networks

Achieve SIEM Solution Success
sponsored by Rapid 7
WHITE PAPER: Looking to unify data, detect attacks, and identify risks across your organization? SIEM can help. This white paper offers 6 challenges Gartner has identified as the main causes behind failed SIEM deployments and suggests an approach to implementing a successful SIEM platform while keeping these challenges in mind.
Posted: 20 Nov 2017 | Published: 20 Nov 2017

Rapid 7

The Evolving Risk Landscape
sponsored by F5 Networks
WHITE PAPER: There was nearly a 22% increase in attacks on web applications from 2016 to 2017. While apps have increased productivity, they have also opened the door to unprecedented threats, expanding the risk landscape and putting corporate data at risk. This e-book offers a guide to protecting against web fraud, credential stuffing, ransomware, and phishing.
Posted: 20 Nov 2017 | Published: 20 Nov 2017

F5 Networks

Damage Control: The Impact of Critical IT Incidents
sponsored by Splunk
WHITE PAPER: IT incidents result in annual costs running into millions of dollars, while the average organization is dealing with hundreds of incidents every week. This Quocirca research report analyzes the impact critical IT incidents have on organizations, which halt business processes and impact users.
Posted: 20 Nov 2017 | Published: 20 Nov 2017

Splunk

The Clock is Ticking on GDPR Obligations
sponsored by IBM
WHITE PAPER: GDPR gives organizations 72 hours to report a data breach, while discovery usually takes a company 150 days. Take a look at this article to discover ways your organization can prepare for GDPR to ensure you are compliance ready by May 2018.
Posted: 20 Nov 2017 | Published: 20 Nov 2017

IBM

The Hunt for IoT
sponsored by F5 Networks
WHITE PAPER: 30.6 million IoT brute force attacks were launched from January 1 to June 30 2017, according to F5 Labs. This report provides an analysis of data collected pertaining to the rise of thingbots in Europe, specifically focusing on the Mirai and Persirai bots containing destructive malware.
Posted: 20 Nov 2017 | Published: 20 Nov 2017

F5 Networks

Auto Scaling Security on AWS: Maintaining a Dynamic Security Posture on the Cloud
sponsored by AWS - Fortinet
WHITE PAPER: Don't be intimidated by the cloud migration process. This white paper explores how you can confidently move business-critical applications to the cloud while maintaining security and availability with Amazon Web Services (AWS) auto scaling and NGFWs.
Posted: 17 Nov 2017 | Published: 30 Apr 2017

AWS - Fortinet

Top Cyber Threats to the Technology Sector
sponsored by Digital Shadows
WHITE PAPER: Technology providers collect sensitive customer data, causing them to be popular targets for cyberattacks. Explore this white paper to learn about the top 4 threats facing technology companies today, and learn from recent attacks to ensure your data is secured.
Posted: 14 Nov 2017 | Published: 14 Nov 2017

Digital Shadows

Top Cyber Threats to The Retail Sector
sponsored by Digital Shadows
WHITE PAPER: Given the frequent number of transactions taking place using payment cards, retail companies are frequently the target of financially-motivated threats. Explore this white paper to uncover the top 3 cyber threats to the retail sector to help you monitor and manage digital risks.
Posted: 14 Nov 2017 | Published: 14 Nov 2017

Digital Shadows

The Pressing Need for Digital Risk Management
sponsored by Digital Shadows
WHITE PAPER: According to ESG research, 69% of organizations are increasing their cybersecurity budgets. This ESP report reveals how CISOs and risk officers can adopt a thorough risk management strategy to protect their enterprise from pressing cyber threats.
Posted: 14 Nov 2017 | Published: 14 Nov 2017

Digital Shadows

Inside Online Carding Courses Designed for Cybercriminals
sponsored by Digital Shadows
WHITE PAPER: Experts project a loss of $24 billion to payment card fraud by the end of 2018. This paper looks at an online course designed for bad actors in order to shed light on the latest fraud tactics and tools, allowing consumers, merchants and credit card companies to better understand the threat and protect themselves from becoming the next fraud victim.
Posted: 14 Nov 2017 | Published: 14 Nov 2017

Digital Shadows

Top Cyber Threats to the Legal Sector
sponsored by Digital Shadows
WHITE PAPER: Legal firms can be attractive targets for cybercriminals, especially firms working on mergers and acquisitions (M&A), possessing a large amount of sensitive, non-public information. This paper highlights 3 security risks for legal firms to focus on and how to mitigate them.
Posted: 13 Nov 2017 | Published: 13 Nov 2017

Digital Shadows

Top Cybercrime Threats to Financial Institutions
sponsored by Digital Shadows
WHITE PAPER: The most prevalent cybercrime threats against financial institutions are: the use or sale of ATM malware, targeted network intrusions, data breaches and the use of banking Trojans. Take a look at this white paper to learn more about these financial threats that stem from cybercriminals.
Posted: 13 Nov 2017 | Published: 13 Nov 2017

Digital Shadows

Protect Your Customer and Employee Accounts
sponsored by Digital Shadows
WHITE PAPER: Digital Shadows found that 97% of the largest companies in the world had their credentials exposed. Explore this white paper to learn how to mitigate the growing risks of account takeovers and the measures you can take to ensure your organization is better protected.
Posted: 13 Nov 2017 | Published: 13 Nov 2017

Digital Shadows

The Complete Guide to Building a Security Culture
sponsored by Trustwave
WHITE PAPER: IT is driving fundamental changes in the way organizations operate, compete, and engage with customers and partners. In this guide, uncover 6 chapters to help you build out a stronger security culture. You'll identify the security challenges you must confront and the reasons why you need to engage with colleagues across your enterprise.
Posted: 13 Nov 2017 | Published: 13 Nov 2017

Trustwave

Equifax Breach: Lessons Learned for your Organization
sponsored by Digital Shadows
WHITE PAPER: The Equifax data breach potentially affected 143 million individuals in the US, Canada and the UK. Inside, gain insight into the impacts of the Equifax Breach, 6 lessons learned from the breach, and how your enterprise can mitigate the risks of falling victim to such a devastating data breach.
Posted: 10 Nov 2017 | Published: 10 Nov 2017

Digital Shadows

The Need for Automotive Cybersecurity Testing Standards
sponsored by Synopsys
WHITE PAPER: Most organizations creating connected systems and devices today spend a considerable amount of time looking at security issues, but often lack a standard framework for testing security. Uncover the importance of developing standards for validating and verifying security.
Posted: 08 Nov 2017 | Published: 08 Nov 2017

Synopsys

Peak Retail Season Threats to Look for
sponsored by Booz Allen Hamilton
WHITE PAPER: During the holiday season, cybercriminals prepare attacks on retailers everywhere in the hopes the retailers will pay ransom to ensure their websites are running smoothly for peak holiday hours. This threat report reveals the top threats ranked by security and likelihood that websites will face during peak retail season.
Posted: 06 Nov 2017 | Published: 06 Nov 2017

Booz Allen Hamilton

Outsmarting Malware
sponsored by Juniper Networks, Inc.
WHITE PAPER: Learn about how you can combine adaptable machine learning algorithms with anti-malware technologies to give you the edge over evolving cyber-threats.
Posted: 06 Nov 2017 | Published: 30 Nov 2016

Juniper Networks, Inc.

Artificial Intelligence in the Enterprise: The AI Race is on
sponsored by Cylance
WHITE PAPER: 81% of organizations say AI was detecting threats before their security teams could. Explore this white paper to discover an overview of AI and how it can give your company a competitive advantage in cybersecurity.
Posted: 02 Nov 2017 | Published: 02 Nov 2017

Cylance

Top-of-Mind Threats and Their Impact on Endpoint Security Decisions
sponsored by Cylance
WHITE PAPER: According to this ESG report, 91% of cybersecurity professionals express the greatest concern over the threat posed by email phishing. Explore this report to learn how to protect your organization's endpoints against cyberattacks with specific defense strategies, including machine learning.
Posted: 01 Nov 2017 | Published: 01 Nov 2017

Cylance
26 - 50 of 396 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement