IT Management  >   Systems Operations  >   Security  >  

Cybersecurity

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Cyber Security, Cyber Security Enhancement Act of 2002
DEFINITION: Information assurance, including information security, information technology disaster recovery, and information privacy. See Section 225, Cyber Security Enhancement Act of 2002, of the Homeland Security Act.
Cybersecurity White Papers (View All Report Types)
26 - 50 of 287 Matches Previous Page  |  Next Page
Information Protection in the Web and Cloud Era
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Explore a modern approach to data protection in the web and cloud era. Uncover 5 requirements for a modern DLP tool.
Posted: 26 May 2017 | Published: 31 Dec 2016

Symantec & Blue Coat Systems

The Security Benefits of Web Proxies
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: The web is central to the way we work, live, and play – and therefore it is also a focal point for cybercrime. Explore the functionality of web proxies and how you can use them to build a comprehensive defense against advanced web threats.
Posted: 26 May 2017 | Published: 26 May 2017

Symantec & Blue Coat Systems

4 Mobile Security Insights for CISOs
sponsored by Lookout
WHITE PAPER: Discover the four mobile security insights that you must know, about reducing mobile risks and the business value associated with fast remediation of mobile security incidents.
Posted: 12 May 2017 | Published: 12 May 2017

Lookout

Rethinking the Approach to Cybersecurity
sponsored by Fortinet, Inc.
WHITE PAPER: Before an effective network security strategy can be put in place, you need to understand the top cybersecurity challenges putting organizations at risk today. Learn more about these challenges, including cloud adoption, IoT and ransomware.
Posted: 04 May 2017 | Published: 10 Feb 2017

Fortinet, Inc.

Why Cybersecurity's Visibility Gap Matters, and How Organizations Can Solve It
sponsored by Proofpoint, Inc.
WHITE PAPER: This white paper explores how to close the cybersecurity visibility gap in an increasingly mobile world. Learn how to see beyond the confines of your network and endpoints to protect your people, brand, and data better.
Posted: 02 May 2017 | Published: 31 Dec 2015

Proofpoint, Inc.

6 Ways to Use Threat Intelligence Data
sponsored by Splunk
WHITE PAPER: Uncover 6 ways threat intelligence data can help you gain broader perspective of any threat. Discover how it can help you detect malicious activities, provide visibility, save time/resources, and more.
Posted: 02 May 2017 | Published: 31 Dec 2016

Splunk

Mapping the Ransomware Landscape
sponsored by Fortinet, Inc.
WHITE PAPER: This guide to ransomware details what you must know to keep your organization safe from a costly ransomware attack.
Posted: 02 May 2017 | Published: 09 Feb 2017

Fortinet, Inc.

Beware the Beastly Threats of IT security
sponsored by Lenovo
WHITE PAPER: It's essential that IT professionals have the right tools to build safeguards against them as battling threats is more critical for organizations than ever— in dollars and in brand reputation. This eBook explores 6 beastly threats scratching at the perimeter of your company's computers and IT networks, and where these threats are trending.
Posted: 01 May 2017 | Published: 01 May 2017

Lenovo

Case Study: How the Diamond Model of Intrusion Analysis Unveiled Key Details About Malicious Activity
sponsored by ThreatConnect
WHITE PAPER: In the following case study, discover ways to gain a holistic view of threat intelligence and incident response so you can unite your entire security operations around a common defense, make informed business decisions, and more.
Posted: 01 May 2017 | Published: 01 May 2017

ThreatConnect

NSS Labs Advanced Endpoint Protection Test Report
sponsored by McAfee, Inc.
WHITE PAPER: NSS Labs performed an independent and rigorous test of the McAfee Endpoint Security v10.5 product to see how it stacks up against the competition. This report provides detailed information about this endpoint strategy and its security effectiveness.
Posted: 18 Apr 2017 | Published: 14 Feb 2017

McAfee, Inc.

User and Entity Behavior Analytics for McAfee Enterprise Security Manager
sponsored by McAfee, Inc.
WHITE PAPER: This document provides an overview of core UEBA capabilities available in McAfee Enterprise Security Manager and introduces the many partners whose products are tightly integrated and certified with this security platform.
Posted: 11 Apr 2017 | Published: 31 Mar 2017

McAfee, Inc.

Compliance and Beyond: Future-Proofing Your Password Policy
sponsored by Specops Software
WHITE PAPER: This white paper digs down into a variety of password security best practices to determine which established methods are still relevant. Learn how to improve password management with new best practices designed for modern compliance.
Posted: 07 Apr 2017 | Published: 07 Apr 2017

Specops Software

Augmented Intelligence Slashes Mobile and Endpoint Vulnerabilities
sponsored by IBM
WHITE PAPER: Learn how augmented intelligence and cognitive technology, as part of a UEM, can improve mobile security and reduce vulnerabilities, increase workforce productivity, help your organization make more informed decisions, and more.
Posted: 30 Mar 2017 | Published: 30 Mar 2017

IBM

Micro-segmentation: Security for Every Data Center
sponsored by VMware
WHITE PAPER: Firewalls are a security strategy that companies are discovering is wholly inadequate against today's sophisticated cyberattacks. To defend against cyberattacks, today's enterprises need a sophisticated approach to data center security. In this white paper, learn about a new approach to data center security designed for current threats.
Posted: 28 Mar 2017 | Published: 30 Sep 2016

VMware

How Enterprise Security Leaders are Now Forced to Address Top Security Threats
sponsored by Fortinet, Inc.
WHITE PAPER: Today's IT threat landscape is expanding, and new areas are at risk that businesses have never had to worry about before. This white paper identifies 5 cyberthreat areas that are putting organizations at risk today, as well as some steps you can take to minimize the danger they pose.
Posted: 15 Mar 2017 | Published: 15 Mar 2017

Fortinet, Inc.

Best Practices for Enterprise Security
sponsored by Citrix
WHITE PAPER: The modern enterprise workforce calls for deep, comprehensive security to keep data protected no matter how people work. Discover best practices for securing your modern workforce, which include network security, access management, app security, and monitoring and response.
Posted: 21 Dec 2016 | Published: 30 Nov 2016

Citrix

Block Zero-Day Threats Before They Hit Endpoints
sponsored by McAfee, Inc.
WHITE PAPER: Learn how to block 99.5% of malware from the web and drastically reduce the amount of time and resources needed for clean-up. Create a more effective and efficient IT environment with automated intelligence built to detect zero-day malware and other emerging threats.
Posted: 09 Dec 2016 | Published: 30 Nov 2016

McAfee, Inc.

The Threat Lifecycle Management Framework
sponsored by LogRhythm, Inc.
WHITE PAPER: You can lessen your organization's risk of experiencing a damaging cyber incident or data breach by understanding six key phases of threat lifecycle management (TLM). Discover how integrated TLM capabilities can optimally reduce mean time to detect (MTTD) and mean time to respond (MTTR).
Posted: 30 Nov 2016 | Published: 30 Nov 2016

LogRhythm, Inc.

Ultimate Guide to Application Security
sponsored by Veracode, Inc.
WHITE PAPER: Learn how to work with appropriate teams to develop a clear application security strategy with concrete requirements for security policies. This, combined with selecting the right application security partners, can ensure your ability to create an advanced application security program that systemically reduces risk and enables innovation.
Posted: 03 Nov 2016 | Published: 31 Oct 2016

Veracode, Inc.

Cybersecurity as a Growth Advantage
sponsored by Cisco
WHITE PAPER: Learn why the belief that the primary purpose of cybersecurity is growth enablement is starting to take hold among senior finance and line-of-business executives.
Posted: 19 Jan 2017 | Published: 19 Jan 2017

Cisco

Best Practices for Dealing with Phishing and Next-Generation Malware
sponsored by KnowBe4
WHITE PAPER: This Osterman Research study focuses on the current security problems with email and other systems, and offers recommendations about how to improve security. Learn how to combat phishing and next-gen malware threats through a variety of best practices, beginning with user training.
Posted: 14 Dec 2016 | Published: 30 Apr 2015

KnowBe4

How to Transform Employee Worst Practices Into Enterprise Best Practices
sponsored by KnowBe4
WHITE PAPER: Learn 10 best practices that contribute to an effective security awareness training program, and 4 worst practices that can detract from it. Get a clear direction on how to improve your organization's security posture and establish a human firewall to effectively block all manners of cyberattacks.
Posted: 13 Dec 2016 | Published: 30 Nov 2016

KnowBe4

Ransomware: A Hostage Rescue Manual
sponsored by KnowBe4
WHITE PAPER: Learn the different types of ransomware, how to spot them and how to prevent an attack against your files. Should you become infected, learn the steps you must take to best protect your assets and how to avoid future ransomware attacks.
Posted: 09 Dec 2016 | Published: 30 Nov 2016

KnowBe4

Top Three Gaping Holes in Your Data Security
sponsored by Globalscape
WHITE PAPER: Regardless of efforts to secure your network from external threats, data breaches usually begin from inside. In this Globalscape paper, you'll learn: the 3 layers most targeted (the network, data & users), bad security practices, why Managed File Transfer is a critical component to combat bad practices, and more.
Posted: 08 Nov 2016 | Published: 08 Nov 2016

Globalscape

Shadow IT Guide: Protect Data and Avoid Compliance Violations
sponsored by Globalscape
WHITE PAPER: Are you sure that employees are only using IT-sanctioned ways of transferring data? If the answer is "no," then your sensitive data may be vulnerable. In this guide from Globalscape, you'll learn: what shadow IT is and its drawbacks, how to identify signs of a shadow IT problem, how to reduce shadow IT, and more.
Posted: 07 Nov 2016 | Published: 31 Oct 2016

Globalscape
26 - 50 of 287 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement