IT Management  >   Systems Operations  >   Security  >  

Cyber Security Enhancement Act of 2002

RSS Feed    Add to Google    Add to My Yahoo!
Cyber Security Enhancement Act of 2002 Reports
 
An Examination of Web App Security Process Management
sponsored by WhiteHat Security
WEBCAST: In this webcast, you'll learn the hard numbers about security vulnerabilities and how susceptible your organization is to being the next victim of an attack. View now to arm yourself with the knowledge to prepare for the inevitable attacks and reduce the likelihood of a data breach.
Posted: 01 Oct 2015 | Premiered: Jul 1, 2015

WhiteHat Security

How Cybercriminals Exploit the Human Factor
sponsored by Proofpoint, Inc.
WHITE PAPER: This report explores data on end-user behavior and how it contributes to security incidents. Take a look to learn why your users click on malicious links and how you can put a stop to their dangerous behavior.
Posted: 21 Oct 2015 | Published: 21 Oct 2015

Proofpoint, Inc.

Under Attack? 2016 Defenses Escape Compromise
sponsored by SearchSecurity.com
EZINE: In this issue of Information Security magazine, we look at security attack techniques and talk to top security researchers about enterprise threats in 2016.
Posted: 01 Feb 2016 | Published: 01 Feb 2016

SearchSecurity.com

Top 6 Dangers of Not Inspecting SSL Traffic
sponsored by A10 Networks
WHITE PAPER: Encryption can improve message confidentiality and integrity but it may also mask hackers' activities. Access this white paper to learn six additional dangers of not inspecting SSL traffic, and what your business can do to expose threats.
Posted: 25 Jan 2016 | Published: 21 Jan 2016

A10 Networks

Malicious Email Files: The Growing Digital Weapon
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This infographic delivers some fast facts on email-based cyber-risks and how you can defend against them. Discover how advanced hackers are leveraging email against you and what you can do to stop them.
Posted: 17 Nov 2015 | Published: 17 Nov 2015

Check Point Software Technologies Ltd.

Investment bank meets complex compliance requirements
sponsored by Blue Coat Systems
CASE STUDY: Today's compliance requirements have been growing and evolving rapidly over the past few years. Access this case study to find out how Jefferies, an independent investment bank, met these complex, fast-changing compliance requirements while empowering users.
Posted: 22 Oct 2015 | Published: 29 Nov 2013

Blue Coat Systems

New Rules of Data Security Virtual Portal
sponsored by IBM
WHITE PAPER: This portal is your hub for the latest data security strategies and best practices. Watch this series of informative videos to help shed light on the real world implications of data breaches, the importance of ensuring regulatory compliance and how to leverage best breed security solutions.
Posted: 22 Jan 2016 | Published: 09 Dec 2015

IBM

Prevent Cybercriminals from Taking Down your Business
sponsored by Microsoft
WHITE PAPER: This infographic reveals what companies are doing right (and wrong) in their security initiatives, and what it's costing them. Uncover technologies that not only build bigger walls against attacks, but also lock criminals out altogether.
Posted: 02 Feb 2016 | Published: 02 Feb 2016

Microsoft

Advanced Threat Detection with Machine-Generated Intelligence
sponsored by Prelert
RESEARCH CONTENT: In this resource, you will discover the research results from a survey of 614 IT security practitioners in the U.S., revealing a lack of confidence in their IT security team's ability to defend their organization. Read on to learn why adoption of a machine-generated intelligence will bolster your cyberdefense.
Posted: 29 Jan 2016 | Published: 31 Oct 2015

Prelert

Multi-Layered Defense for an Evolving Threat Landscape
sponsored by Check Point Software Technologies Ltd.
WEBCAST: Access this webcast to learn how you can protect against both known and unknown malware and to make today's difficult cybersecurity landscape just a little bit easier.
Posted: 16 Nov 2015 | Premiered: Oct 13, 2015

Check Point Software Technologies Ltd.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement