IT Management  >   Systems Operations  >   Security  >  

Cybersecurity

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Cyber Security, Cyber Security Enhancement Act of 2002
DEFINITION: Information assurance, including information security, information technology disaster recovery, and information privacy. See Section 225, Cyber Security Enhancement Act of 2002, of the Homeland Security Act.
Cybersecurity White Papers (View All Report Types)
51 - 75 of 355 Matches Previous Page  |  Next Page
Implementing Strong, Comprehensive Authentication
sponsored by Symantec Corporation
WHITE PAPER: This white paper examines the capabilities of a strong, comprehensive authentication system that will keep you safe in today's threat landscape.
Posted: 17 Jul 2015 | Published: 31 Jul 2014

Symantec Corporation

Top 10 Reasons MDM is just a Fad
sponsored by IBM
WHITE PAPER: This white paper debunks the top 10 misconceptions about mobile device management and security.
Posted: 16 Jul 2015 | Published: 16 May 2014

IBM

10 Myths About Cyber Threat Intelligence: Separating Fact from Fiction
sponsored by Cyveillance, Inc.
WHITE PAPER: This white paper clears up 10 common misconceptions surrounding threat intelligence, helping you separate fact from fiction to determine whether or not you could benefit from deploying it in your organization.
Posted: 16 Jul 2015 | Published: 16 Jul 2015

Cyveillance, Inc.

DDoS Extortion and Bitcoin: New Security Threat on the Horizon
sponsored by Neustar®
WHITE PAPER: This white paper profiles DD4BC and how to protect your network and organization from the attack.
Posted: 15 Jul 2015 | Published: 08 Jul 2015

Neustar®

Holiday Ecommerce Security Preparedness: It's Never Too Early
sponsored by Neustar®
WHITE PAPER: This white paper acts a guide for how to ensure retail operations function efficiently and securely through the holiday season.
Posted: 15 Jul 2015 | Published: 08 Jul 2015

Neustar®

2015 Cost of Data Breach Study: United Kingdom
sponsored by IBM
WHITE PAPER: This report analyzes the financial cost of cybercrime in the UK, discussing how much harm a hack can cause and what the implications are for your business.
Posted: 13 Jul 2015 | Published: 31 May 2015

IBM

Device Fingerprinting: A New Tool for Enhanced Application Protection
sponsored by Radware
WHITE PAPER: Access this white paper to learn the five common factors challenging IP-based identification and how device fingerprinting can make it easier.
Posted: 10 Jul 2015 | Published: 29 May 2015

Radware

Create Your Own Private ISAC: Tips for Sharing Threat Intelligence
sponsored by SurfWatch Labs
WHITE PAPER: This white paper discusses how cybersecurity professionals can build an information sharing and analysis center (ISAC) to disseminate security intelligence and insights among partners.
Posted: 10 Jul 2015 | Published: 10 Jul 2015

SurfWatch Labs

Unified Security Management vs. SIEM: A Technical Comparison
sponsored by AlienVault
WHITE PAPER: This white paper explores why SIEM solutions have been proven to be less effective than their vendors claim.
Posted: 10 Jul 2015 | Published: 10 Jul 2015

AlienVault

IBM 2015 Cyber Security Intelligence Index
sponsored by IBM
WHITE PAPER: This cybercrime report provides data on the sources and frequency of cybercrime so you know what to protect yourself from.
Posted: 08 Jul 2015 | Published: 31 May 2015

IBM

Website Security Threat Report Part 2
sponsored by Symantec Corporation
WHITE PAPER: Download part 2 of this Website Security Threat Report for the latest on the fast-evolving world of targeted attacks - from cyber espionage tactics to denial of service, spear-phishing and watering hole attacks.
Posted: 07 Jul 2015 | Published: 07 Jul 2015

Symantec Corporation

Website Security Threat Report Part 1
sponsored by Symantec Corporation
WHITE PAPER: This website security threat report will give enterprises, small businesses and consumers essential information to help secure their systems from threat vulnerabilities. Continue reading to access emerging trends in attacks, malicious code activity, phishing, and spam.
Posted: 07 Jul 2015 | Published: 07 Jul 2015

Symantec Corporation

Countdown to Compromise: The Timeline of a Spear-Phishing Attack
sponsored by Mimecast
WHITE PAPER: This white paper uses a typical spear-phishing scenario to demonstrate the dangers spear-phishing poses.
Posted: 07 Jul 2015 | Published: 07 Jul 2015

Mimecast

IBM 2015 Cyber Security Intelligence Index
sponsored by IBM
WHITE PAPER: This infographic gives you a quick breakdown of just how prevalent cyber breaches are and how much danger your organization may be in.
Posted: 07 Jul 2015 | Published: 07 Jul 2015

IBM

Determining the Right Mobile Security Solution for Your Organization
sponsored by IBM
WHITE PAPER: This helpful white paper presents the steps every organization should take before committing to a mobile security solution, and examines the pros and cons of different potential security strategies.
Posted: 06 Jul 2015 | Published: 07 Aug 2014

IBM

The Changing Face of Security Management
sponsored by Global Knowledge
WHITE PAPER: Access this white paper to learn how you can implement a threat based, network cognizant security system that is prepared for the constantly changing landscape of security.
Posted: 02 Jul 2015 | Published: 02 Jul 2015

Global Knowledge

Network Forensics for Attack Mitigation
sponsored by Global Knowledge
WHITE PAPER: This white paper explains how network forensics are emerging as a key solution to limiting the damage of network malware attacks.
Posted: 01 Jul 2015 | Published: 01 Jul 2015

Global Knowledge

10 Things Security Experts Wish End Users Knew
sponsored by Global Knowledge
WHITE PAPER: In this white paper, you'll learn the 10 concerns that security experts want end users to know about security at work and at home.
Posted: 01 Jul 2015 | Published: 01 Jul 2015

Global Knowledge

Cybercrime Readiness in Europe
sponsored by Hewlett-Packard Limited
WHITE PAPER: This report reveals the results of a survey assessing Europe's cybercrime readiness.
Posted: 25 Jun 2015 | Published: 25 Jun 2015

Hewlett-Packard Limited

How European Enterprises Are Preparing for Cybercrime
sponsored by Hewlett-Packard Limited
WHITE PAPER: This report reveals the results of a survey assessing Europe's cybercrime readiness.
Posted: 24 Jun 2015 | Published: 24 Jun 2015

Hewlett-Packard Limited

Into the Breach: Lessons from Real Security Incidents
sponsored by Varonis
WHITE PAPER: This white paper outlines three devastating security breaches from start to finish, helping you to learn from the mistakes of these compromised businesses and to better keep yourself safe.
Posted: 24 Jun 2015 | Published: 24 Jun 2015

Varonis

Understand the Threat Landscape
sponsored by IBM
WHITE PAPER: This infographic provides you with some essential statistics regarding the rising problem of cybercrime.
Posted: 24 Jun 2015 | Published: 31 Dec 2014

IBM

Data Breach Risk Calculator
sponsored by IBM
WHITE PAPER: With this risk calculator, you can answer a few simple questions to determine how much your organization would lose in a data breach.
Posted: 24 Jun 2015 | Published: 31 Dec 2014

IBM

Take Your Cyber Career to the Next Level
sponsored by Mission Critical Institute
WHITE PAPER: This document describes how the online resources at Concordia St. Paul University can help you take steps to advance your cybersecurity career.
Posted: 23 Jun 2015 | Published: 23 Jun 2015

Mission Critical Institute

Advance Your Cybersecurity Career with Unique Online Cybersecurity Graduate Program
sponsored by Mission Critical Institute
WHITE PAPER: This resource introduces the expert faculty in the online cybersecurity MBA program offered through Concordia St. Paul. Take a look to determine if these staff members could help you reach your further education goals.
Posted: 23 Jun 2015 | Published: 23 Jun 2015

Mission Critical Institute
51 - 75 of 355 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement