IT Management  >   Systems Operations  >   Security  >  

Cyber Security

RSS Feed    Add to Google    Add to My Yahoo!
Cyber Security Reports
 
Multifactor Authentication Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: In this virtual security classroom, Michael Cobb, a renowned security author with over 20 years of experience in the IT industry, surveys the latest authentication methods and technologies coming onto the market.
Posted: 16 Dec 2014 | Premiered: 15 Dec 2014

SearchSecurity.com

Enhancing Network Security: 205 Network Security Pros Weigh In
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper explores the challenges faced by 205 network security professionals in the United States, including their major concerns, their experience with cyber threats, and their current and planned use of network security technologies.
Posted: 01 Feb 2015 | Published: 19 Nov 2014

Hewlett-Packard Company

Enterprises Reveal Significant Room for Improvement In Their Security Defenses
sponsored by Hewlett-Packard Company
WHITE PAPER: This resource explores the results of a survey that depicts that lack of confidence that organizations have in their security defenses, and also presents an approach to detecting malware to prevent it from spreading throughout the network.
Posted: 01 Feb 2015 | Published: 01 Feb 2015

Hewlett-Packard Company

Six Essential Elements of Web Application Security
sponsored by Qualys
WHITE PAPER: This white paper discusses the most common classes of web application vulnerabilities, and how hackers most often take advantage of these weaknesses. Read on to learn the 6 essential elements of web application security that are the most valuable places for IT teams to invest their time and resources.
Posted: 26 Jan 2015 | Published: 31 Oct 2013

Qualys

Realize the Serious Economic Impact of Advanced Persistent Threats
sponsored by IBM
WHITE PAPER: View this informative report to learn how detrimental APTs can be for your organization, particularly pertaining to your finances.
Posted: 03 Mar 2015 | Published: 01 May 2014

IBM

Infographic: Is Your DNS Really Protected?
sponsored by Cloudmark
RESOURCE: View this informative infographic now to learn more about the consequences of DNS attacks, and how you can prevent them within your enterprise.
Posted: 22 Jan 2015 | Published: 22 Jan 2015

Cloudmark

A Quick Guide to SSL for Apps
sponsored by Symantec Corporation
WHITE PAPER: This white paper lists the steps that your enterprise needs to take in order to create a stronger, more trustworthy SSL implementation.
Posted: 20 Jan 2015 | Published: 28 Feb 2014

Symantec Corporation

IBM InfoSphere Guardium: Manage the Entire Data Security and Compliance Lifecycle
sponsored by IBM
WHITE PAPER: This white paper introduces a robust solution from IBM capable of safeguarding your enterprise's data across all enterprise systems and data center environments.
Posted: 03 Feb 2015 | Published: 31 Oct 2013

IBM

Insider Strategies for Application Layer Security
sponsored by Veracode, Inc.
WEBCAST: Join in this webcast to learn how a testing strategy can secure all of your apps and how one cloud-based service can help.
Posted: 27 Feb 2015 | Premiered: Feb 25, 2015

Veracode, Inc.

Information Security ASEAN November 2014
sponsored by SearchSecurity.com
EZINE: High profile Cyber security breaches in Singapore and Malaysia have focused minds and budgets on developing IT security skills.
Posted: 03 Nov 2014 | Published: 03 Nov 2014

SearchSecurity.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement