IT Management  >   Systems Operations  >   Security  >  

Cybersecurity

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Cyber Security, Cyber Security Enhancement Act of 2002
DEFINITION: Information assurance, including information security, information technology disaster recovery, and information privacy. See Section 225, Cyber Security Enhancement Act of 2002, of the Homeland Security Act.
Cybersecurity Reports
1 - 25 of 531 Matches Previous Page  |  Next Page
The C-Suite Battle Plan for Cyber Security Attacks in Healthcare
sponsored by Imprivata
WHITE PAPER: This white paper examines why passwords are the top vulnerability that healthcare hackers exploit . Uncover what techniques and tools your enemies are using and how to defend yourself by improving your key management strategy. Read on now to learn more.
Posted: 27 Apr 2015 | Published: 15 Apr 2015

Imprivata

Keep Software Secure Using RASP
sponsored by Prevoty
EGUIDE: This expert e-guide explores if RASP is the savior of security officers or if it's just the new flavor of the week. View now to learn about the two approaches to RASP and the potential red flags of using this technology.
Posted: 27 Apr 2015 | Published: 01 Apr 2015

Prevoty

Evolve or Die: Security Adaptation in a Virtual World
sponsored by BitDefender
WHITE PAPER: This white paper describes and suggests solutions for some of the biggest issues in virtualization security.
Posted: 27 Apr 2015 | Published: 31 Dec 2014

BitDefender

Global Information Security Workforce Study
sponsored by ComputerWeekly.com
RESEARCH CONTENT: There will be an estimated shortall of 1.5 million in the global information security workforce within five years, this study from (ISC)² predicts.
Posted: 27 Apr 2015 | Published: 27 Apr 2015

ComputerWeekly.com

Addressing NIST and DOD Requirements for Mobile Device Management
sponsored by IBM
WHITE PAPER: Read this exclusive white paper to gain key insights on the security risks associated with mobile device policies, as well as how to drive rock-solid security without risking network performance and end-user satisfaction. Read on to learn more.
Posted: 24 Apr 2015 | Published: 11 Nov 2014

IBM

The Key to Smarter Enterprise Code Signing
sponsored by Symantec
WHITE PAPER: This white paper explores several alternative approaches to enterpise code signing to minimize mismanagement of keys. View now to learn more.
Posted: 24 Apr 2015 | Published: 04 Dec 2013

Symantec

Phone Number Verification Done Right
sponsored by Nexmo
WEBCAST: This webcast offers 6 best practices for phone number verification to ensure maximum conversion rates and spam/fraud mitigation. View now to learn more.
Posted: 24 Apr 2015 | Premiered: Nov 5, 2014

Nexmo

Avoiding the Headlines: 5 Critical Security Practices to Implement Now
sponsored by CloudPassage
VIDEO: Inside this webinar, join Adrian Sanabria, Senior Security Analyst at 451 Research, and Amrit Williams, CTO of CloudPassage to learn five best practices to put in place in order to avoid a security breach within your organization.
Posted: 24 Apr 2015 | Premiered: 24 Apr 2015

CloudPassage

Best Practices for Securing Your Citrix Remote Access Against Hacker Intrusions
sponsored by Citrix Ready and SMS Passcode
WEBCAST: Join this live webcast on May 21, 2015 to learn the best practices for securing your remote access against sophisticated hackers.
Posted: 24 Apr 2015 | Premiered: Apr 24, 2015

Citrix Ready and SMS Passcode

Device and Data Protection - Part 3
sponsored by Dell, Inc. and Intel®
WEBCAST: This webcast outlines how to protect workspaces with three easy steps to malware prevention. Learn about security tools that are designed to keep unauthorized users out of your data and business by combining leading software and hardware protection.
Posted: 24 Apr 2015 | Premiered: Apr 24, 2015

Dell, Inc. and Intel®

It's Time to Identify and Confront Today's Data Center Security Challenges
sponsored by VMware
WHITE PAPER: In this white paper, you will learn how to detect, isolate, and block dynamic threats with a granular security approach from inside your data center. Access now to learn why network security is a good start and how to enhance it.
Posted: 23 Apr 2015 | Published: 29 Dec 2014

VMware

Layered Cyber Defenses for Better Security
sponsored by Hewlett-Packard Company
WHITE PAPER: View this webcast to learn how to evolve your cyber security strategy into a four phase process to stop APT attacks. Read on now to learn the 12 critical capabilities of an adaptive protection process and how to move beyond a reactive architecture to an always-on monitoring model.
Posted: 22 Apr 2015 | Published: 04 Jun 2014

Hewlett-Packard Company

5 Best Practices to Reduce Incident Response Time
sponsored by Great Bay
WEBCAST: Join security guru Ty Powers as he explains the 5 best practices for reducing incident response (IR) time.
Posted: 22 Apr 2015 | Premiered: Apr 22, 2015

Great Bay

How a Security Operations Center Can Better Safeguard Your Business
sponsored by IBM
WHITE PAPER: This white paper suggests a new, innovative strategy for building security operations centers (SOCs) that streamline your security by focusing all security operations one central place.
Posted: 22 Apr 2015 | Published: 31 Dec 2013

IBM

Not All Certificate Authorities Are Created Equal
sponsored by Symantec
WHITE PAPER: Making the right CA choice can ensure your online security. In this white paper, discover what a secure CA looks like.
Posted: 22 Apr 2015 | Published: 22 Apr 2015

Symantec

Extend Security and Control from the Data Center Edge to the core
sponsored by VMware
WHITE PAPER: This white paper explores how to enable comprehensive data center security through network virtualization. Access now to learn how to overcome the three major issues with traditional network security and how to defend your data center from within.
Posted: 21 Apr 2015 | Published: 04 Mar 2015

VMware

The Secret Ingredient in Mobile ROI
sponsored by BlackBerry
WHITE PAPER: In this white paper, you'll learn why security doesn't have to be a barrier to your business goals, but rather enable business decision-makers, end users and daily operations.
Posted: 21 Apr 2015 | Published: 21 Apr 2015

BlackBerry

How You Can Protect Your Organization from Advanced Attacks
sponsored by IBM
WHITE PAPER: This white paper introduces a strategy that can reduce the rate of APTs and targeted attacks, and that can help you mitigate them when they do occur.
Posted: 21 Apr 2015 | Published: 31 Mar 2015

IBM

4 Steps to A Proactive Big Data Security and Privacy Strategy
sponsored by IBM
WHITE PAPER: This white paper outlines four steps to develop a proactive approach to data security and privacy that will help you keep big data safe without hindering user performance.
Posted: 21 Apr 2015 | Published: 18 Jun 2014

IBM

Advancing Cyber-security Measures from the Inside
sponsored by VMware
RESOURCE: This infographic teaches you how to secure your network and data center from the inside and add to your perimeter defenses.
Posted: 20 Apr 2015 | Published: 11 Dec 2014

VMware

Manage Identities & Access for Continuous Compliance & Reduced Risk
sponsored by IBM
WHITE PAPER: Access this white paper to explore how to improve visibility into who has access to what as well as policies and controls.
Posted: 17 Apr 2015 | Published: 09 Apr 2014

IBM

The State of Mobile Application Insecurity
sponsored by IBM
WHITE PAPER: This white paper examines why mobile app security eludes many organizations and offers steps to strengthen your security policies and minimize vulnerabilities. Read on to learn more.
Posted: 17 Apr 2015 | Published: 25 Feb 2015

IBM

Tips for Successful Private Cloud Planning and IP Address Management
sponsored by Infoblox
EGUIDE: This expert e-guide teaches you the five questions to ask to ensure optimal performance and security.  Read on to uncover the answers in this helpful guide.
Posted: 17 Apr 2015 | Published: 14 Jan 2015

Infoblox

Quarterly Cyberthreat Report
sponsored by IBM
WHITE PAPER: In this quarterly security report, discover what lessons have been learned in 2014 and how cybersecurity needs to evolve in 2015.
Posted: 17 Apr 2015 | Published: 31 Mar 2015

IBM

A New Aproach to Payment Verification
sponsored by Nexmo
WHITE PAPER: This white paper explores how to use phone number verification to ensure security and compliance in a simple process. Access now to learn why this technology is rising in prominence and uncover the seven key components to look for in a third-party service.
Posted: 27 Apr 2015 | Published: 11 Mar 2015

Nexmo
1 - 25 of 531 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement