IT Management  >   Systems Operations  >   Security  >  

Cybersecurity

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Cyber Security, Cyber Security Enhancement Act of 2002
DEFINITION: Information assurance, including information security, information technology disaster recovery, and information privacy. See Section 225, Cyber Security Enhancement Act of 2002, of the Homeland Security Act.
Cybersecurity White Papers (View All Report Types)
76 - 100 of 327 Matches Previous Page  |  Next Page
Security Empowers Business
sponsored by Blue Coat Systems
WHITE PAPER: In this white paper, discover a way of creating security systems that are a proactive business asset, not a reactive way to slow the business down.
Posted: 07 Apr 2015 | Published: 31 May 2013

Blue Coat Systems

Security Analytics Moves to Real-Time Protection
sponsored by Blue Coat Systems
WHITE PAPER: In this white paper, discover a security analytics platform that works in real time.
Posted: 07 Apr 2015 | Published: 31 Jul 2014

Blue Coat Systems

Developing a Network Infrsatructure to Support Cloud Computing
sponsored by Level 3 Communications, Inc.
WHITE PAPER: This white paper explains how to develop a network infrastructure that supports your cloud computing efforts.
Posted: 06 Apr 2015 | Published: 31 Dec 2014

Level 3 Communications, Inc.

Revolutionizing Advanced Threat Protection
sponsored by Blue Coat Systems
WHITE PAPER: This white paper suggests ways for you to create a comprehensive security system that works against today's complex threat landscape.
Posted: 06 Apr 2015 | Published: 31 Jul 2014

Blue Coat Systems

TOP 5 CRITICAL CAPABILITIES FOR YOUR MALWARE SANDBOXING STRATEGY
sponsored by Blue Coat Systems
WHITE PAPER: In this white paper, discover the top five criteria of effective malware sandboxing.
Posted: 06 Apr 2015 | Published: 31 Mar 2014

Blue Coat Systems

What's Your Next Security Move?
sponsored by FireEye
WHITE PAPER: This quick self-assessment will help you navigate to your next big security decision and create better protection against advanced attackers.
Posted: 06 Apr 2015 | Published: 31 Dec 2014

FireEye

Next-Gen Security Analytics - 7 Necessary Functions
sponsored by Blue Coat Systems
WHITE PAPER: This white paper examines security analytics in depth and the seven functions a security analytics platform needs to have.
Posted: 03 Apr 2015 | Published: 09 Jul 2014

Blue Coat Systems

Security Reimagined: An Adaptive Approach for the Digital Age
sponsored by FireEye
WHITE PAPER: It's time to reimagine how we do security. This white paper shows you how with tips on creating an integrated, proactive security system designed for the cybercrime of today.
Posted: 03 Apr 2015 | Published: 31 Dec 2014

FireEye

Top Selection Criteria for an Anti-DDoS Solution
sponsored by Radware
WHITE PAPER: Access this white paper now for a comprehensive list of the questions you need to ask potential vendors before choosing their service.
Posted: 02 Apr 2015 | Published: 02 Apr 2015

Radware

Attack Mitigation Service
sponsored by Radware
WHITE PAPER: This comprehensive white paper provides an in-depth explanation of all of the latest cyber threats and explains the benefits of one potential cyber security solution.
Posted: 02 Apr 2015 | Published: 02 Apr 2015

Radware

Prepare Yourself for the Cybercrime of 2015
sponsored by FireEye
WHITE PAPER: This 2015 cybercrime report analyzes the threats of 2014 and makes predictions for what you need to be prepared for in the upcoming year.
Posted: 02 Apr 2015 | Published: 31 Dec 2014

FireEye

A Comprehensive Guide to Network Security in 2014-2015
sponsored by Radware
WHITE PAPER: Access this comprehensive white paper for an in-depth review of what plagued security professionals in 2014, and what will continue to challenge them in 2015.
Posted: 02 Apr 2015 | Published: 26 Dec 2014

Radware

Automating Defenses Against Increasingly Sophisticated Attacks
sponsored by Radware
WHITE PAPER: In this white paper, you'll learn about the recent developments in DDoS attacks and how you can protect your valuable data from sophisticated cyber-criminals.
Posted: 01 Apr 2015 | Published: 21 Nov 2014

Radware

Self-Assessment: Which Steps Should You Take for Better Security?
sponsored by FireEye
WHITE PAPER: This brief self-assessment will help you to determine what the next steps should be for your organization's security strategy.
Posted: 01 Apr 2015 | Published: 31 Dec 2014

FireEye

Cybercrime 101
sponsored by Global Knowledge
WHITE PAPER: Discover the ways in which cybercrime occurs in three realms: individual, business, and governmental. Learn what you can do to protect yourself and your organization.
Posted: 27 Mar 2015 | Published: 27 Mar 2015

Global Knowledge

Markets and Bounties for Cybercrime Tools and Stolen Data
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper examines the fundamental characteristics of black and grey markets to offer understanding of the current and predicted security threat landscape.
Posted: 27 Mar 2015 | Published: 04 Dec 2014

Juniper Networks, Inc.

5 Steps to Designing a Next-Gen Firewall
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper offers a five step program to designing a next-gen firewall to keep out malicious attacks.  View now to learn more.
Posted: 26 Mar 2015 | Published: 20 Oct 2014

Juniper Networks, Inc.

Deploying a Next-Generation IPS Infrastructure
sponsored by F5 Networks
WHITE PAPER: This exclusive white paper explains how deploying an IPS behind and application delivery controller (ADC) can optimize IPS performance, simplify IPS management, increase business agility, and improve overall network security. Read more to learn how you can boost your network security and efficiency with one simple solution.
Posted: 23 Mar 2015 | Published: 19 Dec 2014

F5 Networks

Quarterly Cybercrime Report
sponsored by IBM
WHITE PAPER: This security report will help you stay up to date on changing cybercrime trends.
Posted: 20 Mar 2015 | Published: 30 Nov 2014

IBM

Five Steps For Securing The Data Center
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper presents five essential steps to securing your database without sacrificing the high performance of modern data centers.
Posted: 19 Mar 2015 | Published: 31 Dec 2014

Cisco Systems, Inc.

Stop Advanced Threats Before They Can Hurt You
sponsored by Dell SecureWorks
WHITE PAPER: This white paper reveals how advanced malware sneaks in undetected and how you can stop them.
Posted: 19 Mar 2015 | Published: 30 Apr 2014

Dell SecureWorks

Buyer'€™s Criteria for Advanced Malware Protection
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper gives you a detailed understanding of what controls need to be in place to stop the strongest attacks.
Posted: 19 Mar 2015 | Published: 31 Dec 2014

Cisco Systems, Inc.

Strengthen Desktop Virtualization Security by Minimizing Endpoint Attack Surfaces
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this white paper to explore why IT professionals are increasingly adopting desktop virtualization paired with thin client solutions to significantly reduce risks and improve protection at endpoints. Examine thin client solutions to help you select one that can best support enhanced endpoint security for your organization.
Posted: 19 Mar 2015 | Published: 19 Mar 2015

Dell, Inc. and Intel®

What Makes Two Security Programs Different?
sponsored by Prelert
WHITE PAPER: This blog post compares two anomaly detection programs and discussing their rate of false positives, ability to analyze multiple instances, and more.
Posted: 19 Mar 2015 | Published: 04 Nov 2013

Prelert

A Guide to a Multifaceted Security Strategy
sponsored by Dell SecureWorks
WHITE PAPER: This white paper can help you develop an innovative approach for catching even the most advanced malware.
Posted: 18 Mar 2015 | Published: 01 Jan 2015

Dell SecureWorks
76 - 100 of 327 Matches Previous Page    2 3 4 5 6 7    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement