IT Management  >   Systems Operations  >   Security  >  

Cybersecurity

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Cyber Security, Cyber Security Enhancement Act of 2002
DEFINITION: Information assurance, including information security, information technology disaster recovery, and information privacy. See Section 225, Cyber Security Enhancement Act of 2002, of the Homeland Security Act.
Cybersecurity White Papers (View All Report Types)
76 - 100 of 370 Matches Previous Page  |  Next Page
8 Best Practices to Ensure Compliance When Adopting Cloud Apps and Services
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Mitigating the risk shadow IT poses to your company is essential to ensuring compliance when adopting cloud apps and services. Discover 8 best practices that can help you avoid remediation costs, compliance fines, and more.
Posted: 17 Jul 2017 | Published: 17 Jul 2017

Symantec & Blue Coat Systems

Your Shadow IT Discovery Best Practices Guide
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Learn how to guide your organization through the process of safely adopting cloud apps and services, mitigating the influence of shadow IT and reducing your security risk.
Posted: 14 Jul 2017 | Published: 14 Jul 2017

Symantec & Blue Coat Systems

How to Ensure Secure and Compliant Cloud App Use
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Cloud applications are becoming more vital to business, but securing them can be tricky. Discover 6 key guidelines to maximize the effectiveness of your CASB to help you remain secure and compliant with cloud apps.
Posted: 14 Jul 2017 | Published: 14 Jul 2017

Symantec & Blue Coat Systems

Improve Your Cloud Security Without Adding Complexity
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Discover how to improve your cloud security without adding complexity by learning how to selectively encrypt or tokenize field-level information in SaaS apps like Salesforce, ServiceNow, and Oracle.
Posted: 14 Jul 2017 | Published: 14 Jul 2017

Symantec & Blue Coat Systems

Cloud Security: 6 Tips to Ensure Critical Data is Secure
sponsored by WinMagic
WHITE PAPER: With new legislation such as the EU's GDPR putting demands on your organization, how can you gain the visibility, efficiency, and real-time control to secure data in the cloud? Uncover 6 tips to improve cloud security and compliance.
Posted: 13 Jul 2017 | Published: 06 Jul 2017

WinMagic

Top Trends Shaping IAM in 2017
sponsored by OneLogin
WHITE PAPER: With the 9% of their overall IT security budgets already spent on IAM, many organizations are predicted to continue investing more of their money. Discover what factors are shaping IAM for near future in this Forrester report.
Posted: 13 Jul 2017 | Published: 21 Nov 2016

OneLogin

How to Gain Complete Protection for Cloud Workloads
sponsored by TrendMicro
WHITE PAPER: According to the Ponemon Institute, 36% of organizations' total IT and data processing requirements are met using cloud resources. Learn how to gain clear control over your cloud security and complete protection for cloud workloads.
Posted: 13 Jul 2017 | Published: 13 Jul 2017

TrendMicro

Encryption in the Cloud. Rewriting the Rules of Data Security
sponsored by WinMagic
WHITE PAPER: Keeping compliant and secure on the cloud are major concerns for enterprises today. Learn how to protect all of your virtualized and cloud IaaS workloads against major threats with encryption.
Posted: 11 Jul 2017 | Published: 07 Jul 2017

WinMagic

Cloud Encryption: Whose Responsibility Is It Really?
sponsored by WinMagic
WHITE PAPER: In this white paper, learn how you can confidently keep enjoying the unrivalled TCO and flex that cloud encryption offers while keeping your critical corporate data secure and compliant.
Posted: 11 Jul 2017 | Published: 07 Jul 2017

WinMagic

CEO Fraud Prevention Manual
sponsored by KnowBe4
WHITE PAPER: This CEO Fraud Prevention Manual provides an overview of how to deal with this exponentially growing wave of cybercrime in email security. Inside this two-part guide you'll uncover how companies are compromised, the methods of attack and how to prevent an attack. You'll also have access to a checklist to CEO fraud prevention and response.
Posted: 11 Jul 2017 | Published: 11 Jul 2017

KnowBe4

4 Major Threats to Mobile Security
sponsored by MobileIron
WHITE PAPER: Learn about 4 top malware threats to mobile security, how they work, what impact they could have on your business if you're infected, and how to detect and mitigate each strain.
Posted: 07 Jul 2017 | Published: 07 Jul 2017

MobileIron

Endpoint Security: Solving the Anti-virus Problem
sponsored by Sentinel Labs, Inc.
WHITE PAPER: With endpoints equating to a particularly juicy target for hackers, your organization must be prepared to counter the malicious attack techniques they utilize today, as well as into the future.
Posted: 06 Jul 2017 | Published: 06 Jul 2017

Sentinel Labs, Inc.

How to Combat Exploits to Secure Your System
sponsored by Sophos, Inc.
WHITE PAPER: By blocking the limited number of exploit techniques, you can block a massive number of malware samples in one stroke. Learn about software exploits and how to intercept them before they wreak havoc on your enterprise.
Posted: 06 Jul 2017 | Published: 06 Jul 2017

Sophos, Inc.

Reduce App Risk During Mergers and Acquisitions
sponsored by Flexera Software
WHITE PAPER: With the prevalence of open source software in app code nowadays, organizations must be vigilant if they wish to mitigate the risk associated with it during a merger or acquisition. Learn how to ensure that your enterprise isn't at risk of financial and legal pitfalls during mergers and acquisitions stemming from non-compliant software code.
Posted: 06 Jul 2017 | Published: 06 Jul 2017

Flexera Software

Ransomware Is Here: What Can You Do About It?
sponsored by Sentinel Labs, Inc.
WHITE PAPER: Ransomware is profitable and growing in popularity among hackers. Learn how to protect your enterprise by examining ransomware techniques and real-life examples.
Posted: 05 Jul 2017 | Published: 05 Jul 2017

Sentinel Labs, Inc.

How to Upgrade Your Endpoint Protection
sponsored by Sentinel Labs, Inc.
WHITE PAPER: 91% of successful data breaches start with attackers infecting an endpoint via a phishing attack. Learn why malicious actors are targeting endpoints, why they are particularly vulnerable, and how to stop your enterprise from falling prey.
Posted: 05 Jul 2017 | Published: 05 Jul 2017

Sentinel Labs, Inc.

How to Ensure You're Not Part of the Next Botnet
sponsored by Sophos, Inc.
WHITE PAPER: Botnets are a near limitless resource of computing power for hackers. In this white paper learn how to avoid your machines and devices from falling prey to these types of manipulations and shut down this avenue of attack.
Posted: 05 Jul 2017 | Published: 05 Jul 2017

Sophos, Inc.

How to Protect Against Ransomware
sponsored by Sophos, Inc.
WHITE PAPER: What does a typical ransomware attack look like? What security solutions should be in place to give the best possible defense? Discover the critical security technologies that every IT setup should include to thwart today's ransomware.
Posted: 05 Jul 2017 | Published: 05 Jul 2017

Sophos, Inc.

Advanced Endpoint Protection Test Report
sponsored by Sentinel Labs, Inc.
WHITE PAPER: Join experts Thomas Skybakmoen and Morgan Dhanraj as they reveal independent test results of advanced endpoint protection with simulated malware, exploits, and blended threats.
Posted: 30 Jun 2017 | Published: 14 Feb 2017

Sentinel Labs, Inc.

What Every CSO Must Know About Open Source Software
sponsored by Flexera Software
WHITE PAPER: Using open source software (OSS) without careful oversight is a potential for risk to every organization. Application security for open source strategy requires processes, training and tools. Access this resource to uncover everything your security team needs know about OSS.
Posted: 30 Jun 2017 | Published: 30 Jun 2017

Flexera Software

Don't Settle for a Patchwork: Synch-up your Security Solutions
sponsored by Sophos, Inc.
WHITE PAPER: Patchwork solutions working in isolation can't keep up with coordinated, complex attacks. Discover how endpoint and network security can work in concert to protect your enterprise from today's threats.
Posted: 29 Jun 2017 | Published: 29 Jun 2017

Sophos, Inc.

Phishing is Big Business. Don't Get Hooked.
sponsored by Sophos, Inc.
WHITE PAPER: 91% of cyberattacks and their resulting data breaches now begin with a spear phishing email. Dive into the evolution of phishing, how it works, and what it looks like. Discover the importance of combining advanced security technologies with educated, phishing-aware employees.
Posted: 29 Jun 2017 | Published: 29 Jun 2017

Sophos, Inc.

6 Risks and Opportunities to Strengthen Security using IaaS
sponsored by Centrify Corporation
WHITE PAPER: The idea of a secure perimeter has moved beyond the data center. Organizations must create the secure perimeter around the users and their devices. Examine six common risks of the modern "perimeter-less" network, and uncover six opportunities to strengthen security using IaaS.
Posted: 28 Jun 2017 | Published: 28 Jun 2017

Centrify Corporation

5 Way to Manage Mobility and IoT Risks
sponsored by Aruba Networks
WHITE PAPER: While organizations today recognize that to stay competitive they must embrace BYOD, many still struggle with security. Uncover 5 ways to manage mobility and IoT risks.
Posted: 28 Jun 2017 | Published: 28 Jun 2017

Aruba Networks

The Argument for a New IT Security Architecture
sponsored by Citrix
WHITE PAPER: Disruptive technologies, cybercrime and compliance are creating risks enterprises have never encountered before. In this Ponemon Institute report, discover how to rethink your IT security framework to improve your security posture and reduce risk.
Posted: 11 Jul 2017 | Published: 31 May 2017

Citrix
76 - 100 of 370 Matches Previous Page    2 3 4 5 6 7    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement