IT Management  >   Systems Operations  >   Security  >  

Cyber Security Enhancement Act of 2002

RSS Feed    Add to Google    Add to My Yahoo!
Cyber Security Enhancement Act of 2002 Reports
 
CIO Trend #3 ANZ
sponsored by ComputerWeekly.com
EGUIDE: Computer Weekly talks to more IT leaders than any other publication, giving us in-depth insights into the challenges facing CIOs, CTOs and CDOs. In this final installment of CIO Trends for 2016, we look at what's influencing IT decision-makers in Australia/New Zealand and explore the trends you can expect to see more of in the coming year.
Posted: 12 Dec 2016 | Published: 13 Dec 2016

ComputerWeekly.com

Policing cyber crime
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security series considers the duties of the police in the UK and asks whether these roles remain realistic and achievable in cyber space
Posted: 23 Sep 2016 | Published: 23 Sep 2016

ComputerWeekly.com

Best Practices for Enterprise Security
sponsored by Citrix
WHITE PAPER: The modern enterprise workforce calls for deep, comprehensive security to keep data protected no matter how people work. Discover best practices for securing your mobile workforce, which include network security, access management, app security, and monitoring and response.
Posted: 21 Dec 2016 | Published: 30 Nov 2016

Citrix

Anatomy of a Hack Disrupted
sponsored by LogRhythm, Inc.
WHITE PAPER: What if there was a way to solve these potentially devastating problems before they occurred in the first place? Access this paper to uncover a real-life situation, in which a malware attack took place but was mitigated before any damage took place.
Posted: 31 Aug 2016 | Published: 31 Aug 2016

LogRhythm, Inc.

Mitigating DNS Zero-Day Exploits With Hybrid Network Architecture
sponsored by EfficientIP
WHITE PAPER: Discover the key benefits of hybrid DNS, and learn how to leverage DNS to mitigate zero-day exploits by eliminating single point of failure (SPoF) and enhancing upgrade agility. Read on to deploy a reliable hybrid DNS architecture that gives network admins the ability to enact rapid vulnerability remediation.
Posted: 15 Sep 2016 | Published: 15 Sep 2016

EfficientIP

Trends and Tactics: How IT Professionals are Approaching AppSec Today
sponsored by Veracode, Inc.
WHITE PAPER: Discover the strategies and tactics being implemented by IT professionals to ensure the security of their applications. Learn the obstacles they're working everyday to overcome and devise a plan of your own to mitigate your app security hardships.
Posted: 03 Nov 2016 | Published: 31 Oct 2016

Veracode, Inc.

Log Management and Automation for NIST Cyber Security Framework
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper explores how a comprehensive log management and analysis system can help your organization meet or exceed NIST-CSF guidelines and compliance regulations. Access now to learn more about NIST-CSF requirements and find out how to automate log collection, archiving, and recovery across your IT infrastructure.
Posted: 07 Oct 2016 | Published: 30 Nov 2014

LogRhythm, Inc.

DDoS Prevention For Attacks That Bypass DNS Rerouting
sponsored by Radware
EGUIDE: In this e-guide, you'll uncover ways organizations can stay protected when using cloud-based DDoS prevention services. Read on to learn expert strategies from emerging business and technology director Ed Moyle.
Posted: 19 Oct 2016 | Published: 18 Oct 2016

Radware

Malware Analysis: How Some Strains 'Adapt' to Virtual Machines
sponsored by Kaspersky Lab
EGUIDE: Server-oriented malware is actually more likely to infect a virtual system than a physical one in many organizations. Now what? This expert e-guide provides the real story of how malware is adapting to virtual environments, so you can ensure protection going forward.
Posted: 01 Nov 2016 | Published: 27 Oct 2016

Kaspersky Lab

Cyberhunting: A Critical Component of Enterprise Security
sponsored by Infocyte
EGUIDE: Cyberhunting – actively looking for signs of compromise in an organization and controlling and minimizing the overall damage – must be a part of your security program. Learn more about this proactive security approach, and how to implement it within your organization, in this e-guide.
Posted: 20 Jun 2016 | Published: 15 Jun 2016

Infocyte
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement