IT Management  >   Systems Operations  >   Security  >  

Cybersecurity

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Cyber Security, Cyber Security Enhancement Act of 2002
DEFINITION: Information assurance, including information security, information technology disaster recovery, and information privacy. See Section 225, Cyber Security Enhancement Act of 2002, of the Homeland Security Act.
Cybersecurity White Papers (View All Report Types)
51 - 75 of 334 Matches Previous Page  |  Next Page
The C-Suite Battle Plan for Cyber Security Attacks in Healthcare
sponsored by Imprivata
WHITE PAPER: This white paper examines why passwords are the top vulnerability that healthcare hackers exploit . Uncover what techniques and tools your enemies are using and how to defend yourself by improving your key management strategy. Read on now to learn more.
Posted: 27 Apr 2015 | Published: 15 Apr 2015

Imprivata

A New Aproach to Payment Verification
sponsored by Nexmo
WHITE PAPER: This white paper explores how to use phone number verification to ensure security and compliance in a simple process. Access now to learn why this technology is rising in prominence and uncover the seven key components to look for in a third-party service.
Posted: 27 Apr 2015 | Published: 11 Mar 2015

Nexmo

Evolve or Die: Security Adaptation in a Virtual World
sponsored by BitDefender
WHITE PAPER: This white paper describes and suggests solutions for some of the biggest issues in virtualization security.
Posted: 27 Apr 2015 | Published: 31 Dec 2014

BitDefender

Addressing NIST and DOD Requirements for Mobile Device Management
sponsored by IBM
WHITE PAPER: Read this exclusive white paper to gain key insights on the security risks associated with mobile device policies, as well as how to drive rock-solid security without risking network performance and end-user satisfaction. Read on to learn more.
Posted: 24 Apr 2015 | Published: 11 Nov 2014

IBM

The Key to Smarter Enterprise Code Signing
sponsored by Symantec
WHITE PAPER: This white paper explores several alternative approaches to enterpise code signing to minimize mismanagement of keys. View now to learn more.
Posted: 24 Apr 2015 | Published: 04 Dec 2013

Symantec

Improving the Effectiveness of Log Analysis
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper acts as a buyer's guide for log monitoring and management solutions and points out the five key features you need to ensure data protection.
Posted: 24 Apr 2015 | Published: 01 Apr 2015

Hewlett-Packard Company

It's Time to Identify and Confront Today's Data Center Security Challenges
sponsored by VMware
WHITE PAPER: In this white paper, you will learn how to detect, isolate, and block dynamic threats with a granular security approach from inside your data center. Access now to learn why network security is a good start and how to enhance it.
Posted: 23 Apr 2015 | Published: 29 Dec 2014

VMware

Layered Cyber Defenses for Better Security
sponsored by Hewlett-Packard Company
WHITE PAPER: View this webcast to learn how to evolve your cyber security strategy into a four phase process to stop APT attacks. Read on now to learn the 12 critical capabilities of an adaptive protection process and how to move beyond a reactive architecture to an always-on monitoring model.
Posted: 22 Apr 2015 | Published: 04 Jun 2014

Hewlett-Packard Company

How a Security Operations Center Can Better Safeguard Your Business
sponsored by IBM
WHITE PAPER: This white paper suggests a new, innovative strategy for building security operations centers (SOCs) that streamline your security by focusing all security operations one central place.
Posted: 22 Apr 2015 | Published: 31 Dec 2013

IBM

Not All Certificate Authorities Are Created Equal
sponsored by Symantec
WHITE PAPER: Making the right CA choice can ensure your online security. In this white paper, discover what a secure CA looks like.
Posted: 22 Apr 2015 | Published: 22 Apr 2015

Symantec

Extend Security and Control from the Data Center Edge to the core
sponsored by VMware
WHITE PAPER: This white paper explores how to enable comprehensive data center security through network virtualization. Access now to learn how to overcome the three major issues with traditional network security and how to defend your data center from within.
Posted: 21 Apr 2015 | Published: 04 Mar 2015

VMware

The Secret Ingredient in Mobile ROI
sponsored by BlackBerry
WHITE PAPER: In this white paper, you'll learn why security doesn't have to be a barrier to your business goals, but rather enable business decision-makers, end users and daily operations.
Posted: 21 Apr 2015 | Published: 21 Apr 2015

BlackBerry

How You Can Protect Your Organization from Advanced Attacks
sponsored by IBM
WHITE PAPER: This white paper introduces a strategy that can reduce the rate of APTs and targeted attacks, and that can help you mitigate them when they do occur.
Posted: 21 Apr 2015 | Published: 31 Mar 2015

IBM

4 Steps to A Proactive Big Data Security and Privacy Strategy
sponsored by IBM
WHITE PAPER: This white paper outlines four steps to develop a proactive approach to data security and privacy that will help you keep big data safe without hindering user performance.
Posted: 21 Apr 2015 | Published: 18 Jun 2014

IBM

Manage Identities & Access for Continuous Compliance & Reduced Risk
sponsored by IBM
WHITE PAPER: Access this white paper to explore how to improve visibility into who has access to what as well as policies and controls.
Posted: 17 Apr 2015 | Published: 09 Apr 2014

IBM

The State of Mobile Application Insecurity
sponsored by IBM
WHITE PAPER: This white paper examines why mobile app security eludes many organizations and offers steps to strengthen your security policies and minimize vulnerabilities. Read on to learn more.
Posted: 17 Apr 2015 | Published: 25 Feb 2015

IBM

Quarterly Cyberthreat Report
sponsored by IBM
WHITE PAPER: In this quarterly security report, discover what lessons have been learned in 2014 and how cybersecurity needs to evolve in 2015.
Posted: 17 Apr 2015 | Published: 31 Mar 2015

IBM

Securing Apps from the First Line of Code
sponsored by White Hat Security
WHITE PAPER: This white paper teaches you how to integrate security analysis into apps from the moment the first line of code is written to reduce risks. View now to learn how to discover and remedy vulnerabilities during the development process in real-time.
Posted: 16 Apr 2015 | Published: 28 Oct 2014

White Hat Security

Evaluating the Total Cost of Ownership for Protecting Web Applications
sponsored by White Hat Security
WHITE PAPER: This white paper breaks down the tocal cost of web app security in the three major risk categories associated with sucessful attacks. Access now to learn how to quantify the costs of web app security compared to the costs of a breach.
Posted: 16 Apr 2015 | Published: 14 Oct 2013

White Hat Security

5 Days to Setting Up an Application Security Program
sponsored by White Hat Security
WHITE PAPER: This white paper outlines a five day guide to bolstering your app security strategy.  Access now to learn more.
Posted: 15 Apr 2015 | Published: 12 Jan 2015

White Hat Security

Programmatically Identifying Multi-Page Flaws in Web Apps
sponsored by White Hat Security
WHITE PAPER: This white paper details the pros and cons of several web app scanning approaches. View now to learn learn more.
Posted: 15 Apr 2015 | Published: 31 Dec 2013

White Hat Security

Rules Of Engagement: A Call To Action To Automate Breach Response
sponsored by Digital Guardian
WHITE PAPER: This white paper delves into why security teams need to automate incident response (IR) plans to defend against dynamic cybercriminal attacks. View now to learn the four steps to developing an automated rules of engagement workflow to combat hackers.
Posted: 14 Apr 2015 | Published: 02 Dec 2014

Digital Guardian

Cybersecurity Strategies for the Midsize Businesses
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper examines the steps and technologies security managers for small- to mid-size organizations can leverage at each stage of an attack - before, during and after - in order to effectively secure endpoints and crucial data effectively.
Posted: 14 Apr 2015 | Published: 14 Apr 2015

Cisco Systems, Inc.

A Much Needed Cybersecurity Paradigm Shift
sponsored by UnitedLex
WHITE PAPER: This white paper explores why hackers have the upper hand in the battle for data and why organizations need to ramp up security measures, regardless of their current status. View now to gain insight into today's threat landscape.
Posted: 13 Apr 2015 | Published: 08 Oct 2014

UnitedLex

Eliminating Virtual Network Security Blindspots
sponsored by Gigamon
WHITE PAPER: This white paper examines a holistic security approach using NPM, DLP, and SSL decryption to mitigate malware threats on virtualized networks. View now to learn more.
Posted: 13 Apr 2015 | Published: 29 Oct 2014

Gigamon
51 - 75 of 334 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement