IT Management  >   Systems Operations  >   Security  >  

Cyber Security Enhancement Act of 2002

RSS Feed    Add to Google    Add to My Yahoo!
Cyber Security Enhancement Act of 2002 Reports
 
Privileged Account Security
sponsored by CyberArk Software, Inc
EGUIDE: 55% of insider misuse is tracked to privileged account abuse, according to Verizon's Data Breach Investigations Report. Take a look at this expert e-guide to discover how to improve your security by limiting privileged accounts.
Posted: 22 Sep 2017 | Published: 19 Sep 2017

CyberArk Software, Inc

Worldwide Email Security Vendor Assessment
sponsored by TrendMicro
WHITE PAPER: The email security market is a mature market that is experiencing an influx of new features to deal with the adapting threats. Take a look at this white paper to uncover an email security vendor assessment, so that your company can choose which vendor fits your specific needs.
Posted: 21 Sep 2017 | Published: 31 Dec 2016

TrendMicro

Security Orchestration and Micro-Segmentation for Public and Private Cloud
sponsored by Cloudvisory
WHITE PAPER: According to Gartner, misconfiguration and mistakes are the leading causes of operations incidents and successful security attacks. Explore this white paper to uncover a cloud security platform that can provide you with protection your organization lacks.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

Cloudvisory

The Total Economic Impact Of xMatters
sponsored by xMatters, Inc.
RESEARCH CONTENT: In this research report, Forrester Consulting shares the ROI from organizations that used xMatters as their communications and notifications platform.
Posted: 15 Sep 2017 | Published: 31 Jan 2017

xMatters, Inc.

360 Data Management for GDPR
sponsored by Avnet
WHITE PAPER: The GDPR is one of the most comprehensive global privacy regulation ever developed. Read this whitepaper to reveal approaches you can take to prepare for the GDPR.
Posted: 19 Sep 2017 | Published: 19 Sep 2017

Avnet

Mass Transit Agency Hunts Down Cybersecurity Threats with Infocyte
sponsored by Infocyte
CASE STUDY: Read this case study to discover how a mass transit agency overcame the issue of vulnerable IT infrastructure by implementing a threat hunting platform. Discover the threats they uncovered.
Posted: 18 Sep 2017 | Published: 31 Dec 2016

Infocyte

How Ransomware Attacks have Changed
sponsored by CyberArk Software, Inc
EGUIDE: Take a look at this e-guide to uncover an expert perspective that reveals a different kind of ransomware, how ransomware has changed, and how to prevent destruction of service attacks.
Posted: 22 Sep 2017 | Published: 20 Sep 2017

CyberArk Software, Inc

Ransomware Recovery Cases: Rebounding After an Attack and the Value of Data Backups
sponsored by Commvault
EGUIDE: In this expert guide, learn how to verify the integrity of your backups in order to thwart, and recover from, potential ransomware attacks. Inside, our writers provide 4 case studies of organizations that were hit then executed a successful ransomware recovery, as well as vendors fighting on the front line of the outbreak.
Posted: 23 Aug 2017 | Published: 22 Aug 2017

Commvault

Spain: Internet Security Threat Profile in Numbers
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Which industries in Spain receive the most malware, phishing and spam attacks?
Posted: 14 Sep 2017 | Published: 31 Mar 2017

Symantec & Blue Coat Systems

How to Enhance AWS Security
sponsored by Splunk
WHITE PAPER: Here, you'll uncover guidance on enhancing AWS platform security, to quell data protection concerns. Access now to see how AWS can deliver top-notch security, as well as facilitate an adaptive environment armed with the actionable insights needed to help thwart and prevent future threats.
Posted: 30 Aug 2017 | Published: 28 Jul 2017

Splunk
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement