IT Management  >   Systems Operations  >   Security  >  

Cyber Security

RSS Feed    Add to Google    Add to My Yahoo!
Cyber Security Reports
 
How European Enterprises Are Preparing for Cybercrime
sponsored by Hewlett-Packard Limited
WHITE PAPER: This report reveals the results of a survey assessing Europe's cybercrime readiness.
Posted: 24 Jun 2015 | Published: 24 Jun 2015

Hewlett-Packard Limited

10 Steps for Protecting Executives Using Cyber Threat Intelligence
sponsored by Cyveillance, Inc.
WHITE PAPER: This white paper analyzes how social engineering and other technologies can help criminals to target your business's executives and assets, and it suggests ten ways you can protect them.
Posted: 17 Jul 2015 | Published: 17 Jul 2015

Cyveillance, Inc.

Increase Security Effectiveness with Threat Intelligence
sponsored by Cyveillance, Inc.
WEBCAST: This webcast explains the benefits of implementing an effective threat intelligence system.
Posted: 13 Jul 2015 | Premiered: Jun 30, 2015

Cyveillance, Inc.

Navigating the Pitfalls of Attack Prevention: A Look at Employee Perception
sponsored by BAE Systems Applied Intelligence (formerly SilverSky)
WHITE PAPER: This report takes a look at an employee's perspective on why enterprise security measures are not where they should be, and what could be done to advance them.
Posted: 08 Jul 2015 | Published: 31 Dec 2014

BAE Systems Applied Intelligence (formerly SilverSky)

Global Information Security Workforce Study
sponsored by ComputerWeekly.com
RESEARCH CONTENT: There will be an estimated shortall of 1.5 million in the global information security workforce within five years, this study from (ISC)² predicts.
Posted: 27 Apr 2015 | Published: 27 Apr 2015

ComputerWeekly.com

An Examination of Web App Security Process Management
sponsored by White Hat Security
WEBCAST: In this webcast, you'll learn the hard numbers about security vulnerabilities and how susceptible your organization is to being the next victim of an attack. View now to arm yourself with the knowledge to prepare for the inevitable attacks and reduce the likelihood of a data breach.
Posted: 30 Jul 2015 | Premiered: Jul 1, 2015

White Hat Security

It’s Time to Refresh Your Organization’s Laptop Fleet
sponsored by Dell and Microsoft
WHITE PAPER: Access this white paper to explore top tips to help maintain optimal data security as it moves from device to device, without affecting employee productivity. Also, learn the benefits of refreshing client operating systems and how this can be key to keeping your system secure.
Posted: 22 Jun 2015 | Published: 22 Jun 2015

Dell and Microsoft

The Right Services for Strong Incident Response
sponsored by CrowdStrike
WHITE PAPER: This white paper discusses how, with the right combination of security services and technology, you can be able to quickly mitigate a security breach and get your business operations back to normal.
Posted: 04 Aug 2015 | Published: 04 Aug 2015

CrowdStrike

The 5 Essential Functions of an Enterprise Security Operations Center
sponsored by IBM
WHITE PAPER: This infographic describes the five ways a dedicated security operations center can help you develop smarter and more efficient responses to threats.
Posted: 29 May 2015 | Published: 29 May 2015

IBM

Bridging the BYOD security and UX gap
sponsored by HID
WHITE PAPER: This white paper explores the top security challenges of today and presents a holistic strategy to bridge the gap between mobile data security and user experience.
Posted: 21 Jul 2015 | Published: 24 Jun 2015

HID
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement