IT Management  >   Systems Operations  >   Security  >  

Cybersecurity

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Cyber Security, Cyber Security Enhancement Act of 2002
DEFINITION: Information assurance, including information security, information technology disaster recovery, and information privacy. See Section 225, Cyber Security Enhancement Act of 2002, of the Homeland Security Act.
Cybersecurity White Papers (View All Report Types)
51 - 75 of 394 Matches Previous Page  |  Next Page
Next-Generation Anti-Malware Testing for Dummies
sponsored by Cylance
WHITE PAPER: Inside this Next-Generation Anti-Malware Testing for Dummies e-book, learn about next-generation endpoint security techniques and how you can use machine learning and AI to protect against advanced persistent threats.
Posted: 31 Oct 2017 | Published: 31 Oct 2017

Cylance

Vendor Landscape: Vulnerability Management, 2017
sponsored by Tenable, Inc.
WHITE PAPER: According to a Forrester security survey, software vulnerabilities are the leading method of external intrusion in a breach. Explore this Forrester report to learn more about the vulnerability management vendor landscape and security trends that directly affect and enable business operations.
Posted: 30 Oct 2017 | Published: 30 Oct 2017

Tenable, Inc.

5 Steps to Building a Successful Vulnerability Management Program
sponsored by Tenable, Inc.
WHITE PAPER: Vulnerability management is something that will never end and will need to be improved and worked on periodically to ensure the security of your enterprise.Explore this white paper to learn more about successful vulnerability management programs to protect your enterprise.
Posted: 30 Oct 2017 | Published: 27 Apr 2017

Tenable, Inc.

The Critical Elements of IoT Security
sponsored by Fortinet, Inc.
WHITE PAPER: IoT devices are on the rise. Read this white paper to gain a stronger understanding of how to build an IoT security strategy to help increase your network performance and reliability.
Posted: 27 Oct 2017 | Published: 27 Oct 2017

Fortinet, Inc.

Strategies for the Enterprise to Address Today's Top Security Vulnerabilities
sponsored by Fortinet, Inc.
WHITE PAPER: In this white paper, learn the network security challenges organizations still need to overcome and methods for overcoming them.
Posted: 26 Oct 2017 | Published: 26 Oct 2017

Fortinet, Inc.

6 Key Use Cases for Securing Your Organization’s Cloud Workloads
sponsored by CyberArk Software, Inc
WHITE PAPER: According to CyberArk Software, total worldwide spending on cloud services will reach $266 billion by 2021 and SaaS will consume nearly 60% of cloud spending by then. Explore this white paper to gain insight into how you can ensure your cloud workloads and infrastructures are secure.
Posted: 26 Oct 2017 | Published: 26 Oct 2017

CyberArk Software, Inc

KuppingerCole Report Leadership Compass
sponsored by CyberArk Software, Inc and KuppingerCole
WHITE PAPER: Privilege management is among the most relevant areas of IAM and cybersecurity, given that privileged users are a primary target of attackers. Explore this 55 page market report to learn more about privilege management and how you can protect your enterprise to the fullest extent against attackers.
Posted: 25 Oct 2017 | Published: 25 Oct 2017

CyberArk Software, Inc and KuppingerCole

New Security Challenges Redefine Risk and Vulnerability
sponsored by Fortinet, Inc.
WHITE PAPER: In this white paper, gain a stronger understanding of the network security challenges organizations still need to overcome.
Posted: 25 Oct 2017 | Published: 25 Oct 2017

Fortinet, Inc.

Advantages of a Fabric vs. Platform Approach to Enterprise Security
sponsored by Fortinet, Inc.
WHITE PAPER: It is challenging to know which strategy is best for your enterprise protection. This white paper explores the differences between a fabric and a platform approach to your security framework, and reveals how you can protect your enterprise from security threats.
Posted: 24 Oct 2017 | Published: 24 Oct 2017

Fortinet, Inc.

A Secure, IT-Approved File Sharing Alternative to Shadow IT
sponsored by Citrix
WHITE PAPER: Discover how to mitigate the security risks and Shadow IT issues associated with online file sharing services. Find out how to protect your data while still enabling employees to be productive, and uncover 5 ways to identify and eliminate Shadow IT that results from unauthorized file sharing accounts.
Posted: 24 Oct 2017 | Published: 24 Oct 2017

Citrix

New Cybersecurity Regulations Adopted to Protect Financial Systems & Information
sponsored by HID Global
WHITE PAPER: According to the Symantec Internet Security Threat Report, the United States is at the top of the list for both the number of breaches by country and the number of identities stolen by country. Explore this white paper to discover how to protect your organization from data breaches.
Posted: 23 Oct 2017 | Published: 13 Oct 2017

HID Global

Research Report: IoT DDoS Attacks Show the Stakes Have Changed
sponsored by Arbor Networks
WHITE PAPER: How can IT network pros defend against DDoS attacks on IoT devices? In this white paper, uncover the recommendations on how to design your DNS infrastructure for stronger security against botnets. Then find out how Forrester Research believes the business technology ecosystem is changing.
Posted: 19 Oct 2017 | Published: 19 Oct 2017

Arbor Networks

From HummingBad to Worse: The History of the Yingmob
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Inside, learn about the malware known as HummingBad, the main tool of the Chinese cybercriminal group Yingmob. Find out what damage this malware can do, how it went global, and more.
Posted: 18 Oct 2017 | Published: 30 Dec 2016

Check Point Software Technologies Ltd.

Threat Intelligence Evaluator's Guide
sponsored by AlienVault
WHITE PAPER: One of the most critical weapons that can be used in cyber defense is threat intelligence. This white paper reveals a threat intelligence guide to help you evaluate service providers, so that you can pick which is best for you in preventing, detecting, and responding to emerging threats.
Posted: 18 Oct 2017 | Published: 18 Oct 2017

AlienVault

Anti-Virus Comparative
sponsored by Symantec
WHITE PAPER: Malicious software poses an ever-increasing threat, not only because the number of malware programs are increasing, but also due to the continuously changing threat-landscape. Uncover results from the Malware Protection Test and the Exploit Test to compare 7 endpoint security vendors.
Posted: 16 Oct 2017 | Published: 31 Oct 2016

Symantec

Endpoint Security - Market Quadrant 2016
sponsored by Symantec
WHITE PAPER: By 2020, the endpoint security market is expected to grow over $5.8 billion. This report offers an analysis of the market for endpoint security.
Posted: 11 Oct 2017 | Published: 30 Nov 2016

Symantec

Proofpoint Threat Response
sponsored by Proofpoint, Inc.
WHITE PAPER: How can you prevent security alerts and incidents from escalating into full-blown breaches? In this white paper, gain insight into the benefits of a threat response platform, and see how you can use it to prioritize and execute response actions.
Posted: 10 Oct 2017 | Published: 10 Oct 2017

Proofpoint, Inc.

Strategies for API Security
sponsored by Akamai Technologies
WHITE PAPER: APIs provide transparency to the internal structure of applications and provide granular access to an application's backend, making online businesses more vulnerable than ever before to cyberattack threats. This white paper outlines the most common types of cyberattacks and offers strategies for protecting APIs.
Posted: 09 Oct 2017 | Published: 31 Dec 2016

Akamai Technologies

Next Generation Secure Web Gateway: The Cornerstone of Your Security Architecture
sponsored by Symantec
WHITE PAPER: Explore this white paper to uncover whether a web proxy would be beneficial in protecting your organization from sophisticated web-based attacks.
Posted: 06 Oct 2017 | Published: 06 Oct 2017

Symantec

Best Practices of Third-Party Software Security
sponsored by Veracode, Inc.
WHITE PAPER: This white paper offers best practices for improving software security across your entire application landscape. Uncover best practices and approaches for securing third-party applications, open source components, and outsourced code.
Posted: 04 Oct 2017 | Published: 04 Oct 2017

Veracode, Inc.

Your Path to a Mature AppSec Program
sponsored by Veracode, Inc.
WHITE PAPER: In a recent Verizon study, there were 2,260 confirmed data breaches in 82 countries with 40% resulting directly from web app attacks. Gain a deeper understanding about app security and uncover 3 steps to reach AppSec maturity.
Posted: 04 Oct 2017 | Published: 04 Oct 2017

Veracode, Inc.

From the Top: What Executives Need to Know About Cybersecurity
sponsored by Kaspersky Lab
WHITE PAPER: $117,000 is the average financial impact of a data breach for SMBs in North America and $1.3 million is the average impact for a large enterprise in North America. This paper identifies 6 myths about enterprise security to help you strengthen your approach, so you do not fall victim to data breach's large financial impact.
Posted: 04 Oct 2017 | Published: 04 Oct 2017

Kaspersky Lab

Sophos Phish Threat
sponsored by Sophos
WHITE PAPER: Look at this white paper to learn how to automate defense education for your users with routine campaigns, training, follow-up and reporting.
Posted: 03 Oct 2017 | Published: 03 Oct 2017

Sophos

The Human Factor in IT Security: How Employees Are Making Businesses Vulnerable from Within
sponsored by Kaspersky Lab
WHITE PAPER: 52% of businesses admit that employees are their biggest weakness in IT security, with their careless actions putting data and networks at risk. In this white paper gain insight into how to address the "human factor" dilemma and eliminate employee irresponsibility by following the right steps forward.
Posted: 03 Oct 2017 | Published: 03 Oct 2017

Kaspersky Lab

Cloud Solution Enables Security for Highly Regulated Industries
sponsored by TeraGo Networks
WHITE PAPER: Explore this case study to uncover how Virtual StrongBox was able to implement a technology to revolutionize cloud security and protect its customers.
Posted: 03 Oct 2017 | Published: 03 Oct 2017

TeraGo Networks
51 - 75 of 394 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement