IT Management  >   Systems Operations  >   Security  >  

Cybersecurity

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Cyber Security, Cyber Security Enhancement Act of 2002
DEFINITION: Information assurance, including information security, information technology disaster recovery, and information privacy. See Section 225, Cyber Security Enhancement Act of 2002, of the Homeland Security Act.
Cybersecurity White Papers (View All Report Types)
76 - 100 of 381 Matches Previous Page  |  Next Page
AWS Security Fitness Guide
sponsored by evident.io
WHITE PAPER: Strengthen your cloud and combat the criminals. Read this white paper to reveal how to make your AWS environment less vulnerable to cyberattacks and threats.
Posted: 20 Sep 2017 | Published: 20 Sep 2017

evident.io

The 6 Essentials for DevOps Team Excellence
sponsored by evident.io
WHITE PAPER: A recent Enterprise Strategy Group survey found that 45% of organizations currently report having a "problematic shortage" of cybersecurity skills. Take an in-depth look at this white paper to reveal essentials that can help your enterprise form a smart framework for running a secure DevOps organization.
Posted: 20 Sep 2017 | Published: 20 Sep 2017

evident.io

5 Ways to Ensure Digital Business Success
sponsored by Entrust, Inc.
WHITE PAPER: Analysts predict that 40% of all digital initiatives will fail due to mismanagement of identity-related requirements. Read this white paper to uncover 5 ways to ensure stronger authentication and identity management within your business.
Posted: 20 Sep 2017 | Published: 31 Dec 2016

Entrust, Inc.

IHS Technology: Network Monitoring Equipment
sponsored by Gigamon
WHITE PAPER: In this report, gain a stronger understanding of the top tools on the network monitoring market to help improve overall security and reliability.
Posted: 20 Sep 2017 | Published: 19 May 2017

Gigamon

Market Trends: Automation and Integration Critical to Application Security Tool Adoption
sponsored by IBM
WHITE PAPER: Take a closer look at this market trend report to reveal findings from Gartner research surveys regarding organizations' use of DevOps and security.
Posted: 20 Sep 2017 | Published: 17 Jan 2017

IBM

Disrupt the Machine-to-Human Fight with a New Defender Lifecycle Model in Security Operations
sponsored by Gigamon
WHITE PAPER: In this white paper, learn how Gigamon's security delivery platform combats breaches and cyberattacks by integrating machine learning, artificial intelligence (AI) and security workflow automation.
Posted: 20 Sep 2017 | Published: 31 Jul 2017

Gigamon

Get your Enterprise Ready for GDPR
sponsored by CyberArk Software, Inc
WHITE PAPER: Take a closer look at this white paper to reveal a checklist for securing personal data to prepare for the GDPR.
Posted: 19 Sep 2017 | Published: 19 Sep 2017

CyberArk Software, Inc

Top 10 AWS Cloud Security Risks and how to Resolve them
sponsored by evident.io
WHITE PAPER: While AWS ensures the security of the cloud, you have a responsibility to manage the security of your data and systems in the cloud. Uncover 10 security risks found in AWS deployments, why they are important, and how they are remediated.
Posted: 19 Sep 2017 | Published: 19 Sep 2017

evident.io

Automate Log Management to Meet NIST 800-53 Compliance
sponsored by LogRhythm, Inc.
WHITE PAPER: The collection, management, and analysis of log data is integral to meeting many NIST 800-53 requirements. Explore how a log management and analysis platform can help your company meet or exceed these guidelines.
Posted: 15 Sep 2017 | Published: 31 Dec 2014

LogRhythm, Inc.

How to Build a SOC with Limited Resources
sponsored by LogRhythm, Inc.
WHITE PAPER: Read this white paper to discover the knowledge needed to successfully build your own security operations center (SOC).
Posted: 15 Sep 2017 | Published: 15 Sep 2017

LogRhythm, Inc.

11 Security Analytics Providers Slug it Out
sponsored by LogRhythm, Inc.
WHITE PAPER: Forrester surveys indicate that 74% of global enterprise security technology decision makers rate improving security monitoring as a high or critical priority. In this Forrester report, discover an in-depth look at 11 security analytics vendors: where they excel, fall short, and how they compare to one another.
Posted: 14 Sep 2017 | Published: 06 Mar 2017

LogRhythm, Inc.

The Case Against ISP DNS
sponsored by Oracle + Dyn
WHITE PAPER: In this white paper, understand the challenges that can occur with Internet Service Provider (ISP)-based DNS and how to better prevent outages and DDoS attacks.
Posted: 11 Sep 2017 | Published: 08 Sep 2017

Oracle + Dyn

How to Implement NIST CSF : A 4-Step Journey to Cybersecurity Maturity
sponsored by Rsam
WHITE PAPER: Read this white paper to discover how a NIST Cybersecurity Framework platform provides users like you with strong security and threat protection against possible attackers.
Posted: 07 Sep 2017 | Published: 11 Sep 2017

Rsam

WhoDunIt? The Mystery of the Advanced Persistent Threat (APT)
sponsored by Kaspersky Lab
WHITE PAPER: For companies that experienced a targeted cyberattack, 68% report data loss or exposure as a direct result of the attack. Advanced Persistent Threats (APTs) are even more disconcerting. Learn how to protect your company's sensitive information from APT attacks, and discover real-world examples of companies who used Kaspersky for attribution.
Posted: 01 Sep 2017 | Published: 01 Sep 2017

Kaspersky Lab

The Dawn of the DDoS of Things & 1 Tbps Attacks
sponsored by A10 Networks
WHITE PAPER: In this white paper learn how to prevent Mirai maleware, a type of DDoS attacks hackers use to compromise unsecured IoT devices.
Posted: 01 Sep 2017 | Published: 30 Jun 2017

A10 Networks

Hybrid AI Takes on Cybersecurity
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Will hybrid AI disrupt your information security team? Experts agree that AI is the next step in identifying threats, but are we facing Westworld or just an evolutionary advancement? 7 security experts weigh in, inside this special report.
Posted: 28 Aug 2017 | Published: 28 Aug 2017

Arctic Wolf Networks, Inc.

Strengthen Your Defenses Against Cybercrime
sponsored by Mimecast
WHITE PAPER: Despite the fact that email-borne attacks are a real threat, many organizations aren't confident in their ability to spot or stop one. Read this whitepaper to discover how build a cybersecurity plan that will enhance your email security.
Posted: 15 Aug 2017 | Published: 15 Aug 2017

Mimecast

How 3 Companies Leverage Machine Data to Improve Security, Solve Business & IT Challenges
sponsored by Splunk
WHITE PAPER: One of the most important – and often, most overlooked – resources that an organization can tap into to protect from cyberattacks is machine data. Learn how 3 companies are leveraging machine data to protect themselves against the latest cyberthreats and to address IT operations, IoT and business analytics challenges as well.
Posted: 14 Aug 2017 | Published: 14 Aug 2017

Splunk

Cybersecurity Readiness: 2017 Survey Results
sponsored by Solarwinds MSP
WHITE PAPER: Survey results suggest that IT providers are confident of their cybersecurity preparedness. But is this confidence misplaced? Learn the results in the report and uncover why overconfidence may be leading to more data security breaches.
Posted: 09 Aug 2017 | Published: 09 Aug 2017

Solarwinds MSP

Big Data Analytics Can Help You Manage Cybersecurity Threats
sponsored by Splunk
WHITE PAPER: Government organizations are facing a tidal wave of cybersecurity threats – from phishing to SQL injection. While cybersecurity is a priority, agencies are still missing the opportunity of big data analytics. Learn how big data analytics can help you sail the wave of security threats.
Posted: 09 Aug 2017 | Published: 09 Aug 2017

Splunk

How to Create a Cybersecurity Policy for Your Organization
sponsored by HelpSystems
WHITE PAPER: Discover a 4-step plan to build a cybersecurity policy for your organization. As a bonus, uncover additional resources to create a data breach response plan.
Posted: 04 Aug 2017 | Published: 04 Aug 2017

HelpSystems

Securing Industrial IoT Technology: 4 Key Considerations
sponsored by Bayshore Networks
WHITE PAPER: Learn how to stop cyberthreats before they can damage critical industrial assets and systems by going inside one cyberattack launched against energy organization Consolidated Power. See how they used an industrial cyber protection platform and uncover 4 considerations for IIoT security.
Posted: 02 Aug 2017 | Published: 02 Aug 2017

Bayshore Networks

How to Detect Unknown Malware and Ransomware
sponsored by Splunk
WHITE PAPER: Explore two analytical strategies that can help you detect unknown malware activity and early signs of compromise in a Windows environment. Discover how these approaches work in real-time to detect advanced threats faster.
Posted: 02 Aug 2017 | Published: 02 Aug 2017

Splunk

4 Key Considerations for Securing Operation Technology in the Oil & Gas Industry
sponsored by Bayshore Networks
WHITE PAPER: The Industrial Internet of Things (IIoT) is revolutionizing the manufacturing industry – but also opens the door to cyber threats. Learn about the opportunities and risks created, and the need for securing the operation technology environment. Plus, discover 4 key considerations to protect industrial assets against cyber threats.
Posted: 27 Jul 2017 | Published: 02 Jul 2017

Bayshore Networks

Product Overview: 30 Minutes to a More Secure Enterprise
sponsored by Cisco Umbrella
WHITE PAPER: DNS-layer security offers a first line of defense for your company – DNS request proceed internet activity, after all. But which DNS security is right for you? In this product overview, discover how implementing Cisco Umbrella can help you improve your company's security.
Posted: 26 Jul 2017 | Published: 26 Jul 2017

Cisco Umbrella
76 - 100 of 381 Matches Previous Page    2 3 4 5 6 7    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement