IT Management  >   Systems Operations  >   Security  >  

Cyber Security Enhancement Act of 2002

RSS Feed    Add to Google    Add to My Yahoo!
Cyber Security Enhancement Act of 2002 Reports
 
What Keeps Me Up At Night?: Concerns of a CISO
sponsored by enSilo
WEBCAST: Watch this webcast to uncover a list of security concerns facing CISOs today as well as pre-infection protection strategies to lessen these concerns.
Posted: 19 Jan 2018 | Premiered: Jan 19, 2018


Contingent Workers
sponsored by Identity Automation
WHITE PAPER: By 2020, approximately 40% of the average company's total workforce is expected to be contingent workers. The rise in contingent workers brings an insider security risk. Insiders are by far the weakest link in most organizations' security model. Take a look at this e-book and learn more about the threats insiders pose to your organization.
Posted: 17 Jan 2018 | Published: 17 Jan 2018

Identity Automation

The 3 Keys to Faster Threat Response
sponsored by RSA
WHITE PAPER: According to the latest RSA study rating organizations' cybersecurity maturity, 74% of those surveyed have inadequate systems to quickly recover from an attack. Explore this e-book to uncover a deeper understanding into 3 keys to a faster threat response.
Posted: 04 Jan 2018 | Published: 04 Jan 2018

RSA

Cloud Essentials: Better Security Within the Cloud
sponsored by Oracle Corporation UK Ltd
WHITE PAPER: According to Crowd Research Partners, 91% of organizations have security concerns about adopting the cloud and only 14% believe traditional security is enough. Explore this white paper to uncover strategies for implementing a secure cloud platform by safeguarding all aspects of the cloud including technology, processes and people.
Posted: 04 Dec 2017 | Published: 04 Dec 2017

Oracle Corporation UK Ltd

The Anatomy of a Data Breach
sponsored by SailPoint Technologies
WHITE PAPER: 43% of the time data breaches are directly caused by insiders, according to SailPoint Technologies. Explore this white paper to gain insight into the anatomy of data breaches through 4 phases to help protect your organization against falling victim to such attacks.
Posted: 12 Dec 2017 | Published: 12 Dec 2017

SailPoint Technologies

Finding GDPR noncompliance in a mobile first world
sponsored by Lookout
WHITE PAPER: With the proliferation of mobile devices in the workplace, whether company or employee owned, there is a greater risk of data loss or leakage. Whether they know it or not, your employees are putting your company's data--and GDPR compliance--at risk. This white paper is your guide to laying out the mobile portion of your GDPR strategy.
Posted: 15 Jan 2018 | Published: 26 Oct 2017

Lookout

25 Simple Yet Overlooked Ways to Boost Your Ethics & Compliance Program
sponsored by Navex Global
EBOOK: Access this e-book to uncover a 25-step guide to boosting your compliance and ethics program by improving culture, getting better connected with employees and boosting program awareness.
Posted: 05 Dec 2017 | Published: 05 Dec 2017

Navex Global

Don't Switch To Windows 10 Without An Endpoint Security Plan
sponsored by Thycotic
WHITE PAPER: According to the Thycotic 2017 BlackHat Report, 73% of hackers report that traditional anti-virus tools are irrelevant or obsolete, and don't adapt quickly enough to block emerging threats. This resource offers endpoint and application security strategies as well as tactics to enhance your Windows 7 and 10 security.
Posted: 19 Jan 2018 | Published: 19 Jan 2018

Thycotic

Connected Intelligence: GDPR and Incident Response
sponsored by Nuix
WHITE PAPER: The GDPR will force organizations to reexamine how they handle consumers' personal information. Data breach investigations in just 72 hours —are you prepared? This white paper offers GDPR and incident response preparation strategies to ensure your enterprise is ready for the upcoming regulation.
Posted: 17 Jan 2018 | Published: 17 Jan 2018

Nuix

CIO Trends #6: Nordics
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, read how the High North and Baltic Sea collaboration is about to undergo a serious and redefining makeover to counter possible threats posed by a military-resurgent Russia. Read how pooling technologies and competencies was a focal point during summit meetings between Nordic and Baltic government leaders and defence leaders.
Posted: 15 Dec 2017 | Published: 15 Dec 2017

ComputerWeekly.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement