IT Management  >   Systems Operations  >   Security  >  

Cyber Security Enhancement Act of 2002

RSS Feed    Add to Google    Add to My Yahoo!
Cyber Security Enhancement Act of 2002Reports
 
Penetration Testing From Your Pocket: New Mobile Testing Tools
sponsored by Pwine Express
WEBCAST: In this in-depth webcast, you'll discover a new mobile penetration testing solution that could help on-the-road pen-testers and on-site security assessments.
Posted: 14 Aug 2014 | Premiered: Aug 14, 2014

Pwine Express

Using the Latest Technology Trends to Stay Secure and Risk Free
sponsored by DLT Solutions
WEBCAST: Access this webcast to get an insider perspective for maintaining security when operating in the public sector.
Posted: 31 Jul 2014 | Premiered: Jul 31, 2014

DLT Solutions

Social Engineering in IT Security
sponsored by ComputerWeekly.com
BOOK: This extract from Sharon Conheady's book, Social Engineering in IT Security, gives an overview of Social Engineering techniques and explains how organisations can protect themselves.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

ComputerWeekly.com

Preventing Today's Mega-DDOS Attacks
sponsored by Solutionary
EGUIDE: In this expert eGuide, get an inside look at the mechanics of DDoS attacks and how organizations can best detect and prevent them.
Posted: 24 Sep 2014 | Published: 24 Sep 2014

Solutionary

Solutions with ROI for Today's Federal Information Assurance Challenges
sponsored by RSA, The Security Division of EMC
WHITE PAPER: This paper illustrates the major challenges faced by today's Federal IA professionals, and offers solutions, along with ROI for each of those challenges.
Posted: 03 Sep 2014 | Published: 31 Dec 2013

RSA, The Security Division of EMC

Managing IT Risk: Trends in Global Information Security
sponsored by Hewlett-Packard Limited
WEBCAST: Tune in to this informative webcast to hear industry veterans explore the top strategies for dealing with cyber threats, meeting compliance, and adapting to the newest developments in the security world, such as mobile device management. Click
Posted: 04 Sep 2014 | Premiered: Jun 30, 2014

Hewlett-Packard Limited

Truly Mobile File and Print Solution Provides Enterprise-Wide Coverage
sponsored by Novell, Inc.
WHITE PAPER: In this informative white paper, discover a new enterprise-class mobile file and print solution that provides file syncing, sharing, and printing to users wherever they are – all without compromising compliance or security standards.
Posted: 15 Sep 2014 | Published: 31 Dec 2012

Novell, Inc.

Effectively Spot Security Threats with New SSL Visibilty Solutions
sponsored by Blue Coat Systems
WHITE PAPER: In this in-depth guide, discover new SSL visibility solutions that can help organization effectively monitor encrypted traffic and detect malicious content.
Posted: 22 Sep 2014 | Published: 31 Dec 2013

Blue Coat Systems

2014 Security Report: How DDoS Attacks Can Mask More Dangerous Malware Threats
sponsored by Neustar®
RESOURCE: In this informative report, discover key findings on the top strategies and techniques for dealing with new DDoS attacks.
Posted: 08 Sep 2014 | Published: 08 Sep 2014

Neustar®

Exposing the Cybersecurity Cracks: Australia
sponsored by Websense, Inc.
WHITE PAPER: The following report learn how better communication and information about cybersecurity, the right investment in skilled personnel, enabling technologies, and the adoption of security measures will minimized the risk of current and emerging cyber threats.
Posted: 28 Jul 2014 | Published: 28 Jul 2014

Websense, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement