IT Management  >   Systems Operations  >   Security  >  

Cybersecurity

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Cyber Security, Cyber Security Enhancement Act of 2002
DEFINITION: Information assurance, including information security, information technology disaster recovery, and information privacy. See Section 225, Cyber Security Enhancement Act of 2002, of the Homeland Security Act.
Cybersecurity Reports
1 - 25 of 511 Matches Previous Page  |  Next Page
Manage Identities & Access for Continuous Compliance & Reduced Risk
sponsored by IBM
WHITE PAPER: Access this white paper to explore how to improve visibility into who has access to what as well as policies and controls.
Posted: 17 Apr 2015 | Published: 09 Apr 2014

IBM

The State of Mobile Application Insecurity
sponsored by IBM
WHITE PAPER: This white paper examines why mobile app security eludes many organizations and offers steps to strengthen your security policies and minimize vulnerabilities. Read on to learn more.
Posted: 17 Apr 2015 | Published: 25 Feb 2015

IBM

Tips for Successful Private Cloud Planning and IP Address Management
sponsored by Infoblox
EGUIDE: This expert e-guide teaches you the five questions to ask to ensure optimal performance and security.  Read on to uncover the answers in this helpful guide.
Posted: 17 Apr 2015 | Published: 14 Jan 2015

Infoblox

Quarterly Cyberthreat Report
sponsored by IBM
WHITE PAPER: In this quarterly security report, discover what lessons have been learned in 2014 and how cybersecurity needs to evolve in 2015.
Posted: 17 Apr 2015 | Published: 31 Mar 2015

IBM

Securing Apps from the First Line of Code
sponsored by White Hat Security
WHITE PAPER: This white paper teaches you how to integrate security analysis into apps from the moment the first line of code is written to reduce risks. View now to learn how to discover and remedy vulnerabilities during the development process in real-time.
Posted: 16 Apr 2015 | Published: 28 Oct 2014

White Hat Security

Evaluating the Total Cost of Ownership for Protecting Web Applications
sponsored by White Hat Security
WHITE PAPER: This white paper breaks down the tocal cost of web app security in the three major risk categories associated with sucessful attacks. Access now to learn how to quantify the costs of web app security compared to the costs of a breach.
Posted: 16 Apr 2015 | Published: 14 Oct 2013

White Hat Security

5 Days to Setting Up an Application Security Program
sponsored by White Hat Security
WHITE PAPER: This white paper outlines a five day guide to bolstering your app security strategy.  Access now to learn more.
Posted: 15 Apr 2015 | Published: 12 Jan 2015

White Hat Security

Programmatically Identifying Multi-Page Flaws in Web Apps
sponsored by White Hat Security
WHITE PAPER: This white paper details the pros and cons of several web app scanning approaches. View now to learn learn more.
Posted: 15 Apr 2015 | Published: 31 Dec 2013

White Hat Security

Integrating Security Across the Software Development Lifecycle (SDLC)
sponsored by White Hat Security
CASE STUDY: In this white paper, you will learn how to not only identify and remediate web app vulnerabilities, but to integrate security into the software development lifecycle (SDLC). Access now to learn more.
Posted: 15 Apr 2015 | Published: 03 Jan 2014

White Hat Security

Explaining How Trusted SSL Certificates and Forged SSL Certificates Work
sponsored by GeoTrust, Inc.
EGUIDE: This expert e-guide walks you through the importance of trusted certificates and the roles that Certificate Authorities (CAs) play. View now to explore the web security threat landscape and to learn the fine print about SSL and certificates.
Posted: 15 Apr 2015 | Published: 10 Dec 2014

GeoTrust, Inc.

Rules Of Engagement: A Call To Action To Automate Breach Response
sponsored by Digital Guardian
WHITE PAPER: This white paper delves into why security teams need to automate incident response (IR) plans to defend against dynamic cybercriminal attacks. View now to learn the four steps to developing an automated rules of engagement workflow to combat hackers.
Posted: 14 Apr 2015 | Published: 02 Dec 2014

Digital Guardian

Encrypted Traffic Management for Dummies
sponsored by Blue Coat Systems
EBOOK: In this eBook, learn all about the world of encrypted traffic management, an easy solution to all of these SSL traffic headaches.
Posted: 14 Apr 2015 | Published: 14 Apr 2015

Blue Coat Systems

Cybersecurity Strategies for the Midsize Businesses
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper examines the steps and technologies security managers for small- to mid-size organizations can leverage at each stage of an attack - before, during and after - in order to effectively secure endpoints and crucial data effectively.
Posted: 14 Apr 2015 | Published: 14 Apr 2015

Cisco Systems, Inc.

A Much Needed Cybersecurity Paradigm Shift
sponsored by UnitedLex
WHITE PAPER: This white paper explores why hackers have the upper hand in the battle for data and why organizations need to ramp up security measures, regardless of their current status. View now to gain insight into today's threat landscape.
Posted: 13 Apr 2015 | Published: 08 Oct 2014

UnitedLex

Eliminating Virtual Network Security Blindspots
sponsored by Gigamon
WHITE PAPER: This white paper examines a holistic security approach using NPM, DLP, and SSL decryption to mitigate malware threats on virtualized networks. View now to learn more.
Posted: 13 Apr 2015 | Published: 29 Oct 2014

Gigamon

Point of Sale (POS) Systems and Security
sponsored by Bit9 + Carbon Black
WHITE PAPER: Access this white paper to learn about another perspective in POS system security. Read on for an overview of payment card systems and attack methods, as well as how to leverage the Council on CyberSecurity's 20 critical controls to your system's advantage.
Posted: 13 Apr 2015 | Published: 31 Oct 2014

Bit9 + Carbon Black

Vulnerability Remediation: If you Ranked It, You Should Have Put a Patch on It
sponsored by White Hat Security
WEBCAST: Access this webcast now for an in-depth review of the various web security vulnerabilities you need to protect yourself from, and also discover a step-by-step guide for remediating these threats. View it now to uncover the truth about web security.
Posted: 13 Apr 2015 | Premiered: Apr 13, 2015

White Hat Security

Web Security: Revenge of the Vuln
sponsored by White Hat Security
WEBCAST: Join web security guru Robert "RSnake" Hansen in this webinar for an in-depth explanation of the many vulnerabilities you may not have considered, and discover how you can better protect your new creation. View it now and learn how to stop attacks like Heartbleed, SQL injection, command injection and more.
Posted: 13 Apr 2015 | Premiered: Apr 13, 2015

White Hat Security

5 Steps to SSL Decryption
sponsored by Gigamon
WHITE PAPER: This white paper explores an alternative, five step SSL decrpytion strategy.  View now to learn more
Posted: 13 Apr 2015 | Published: 15 Oct 2014

Gigamon

Enterprise Security Must Move Beyond Building Protective Walls
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper outlines and explores the six steps of the Attack Life Cycle and takes you into the minds of hackers and cybercriminal teams to help you better craft your security strategy. Read on now to learn how to allocate resources so defenses are most appropriate to the risks.
Posted: 13 Apr 2015 | Published: 08 Apr 2015

Hewlett-Packard Company

The Evolution of Enterprise Application Security
sponsored by Prevoty
WHITE PAPER: This white paper examines the emergence of application self-protection technologies and why WAFs can't offer true app security despite common perception.
Posted: 13 Apr 2015 | Published: 14 Jan 2015

Prevoty

Don’t let crime rule your network – building an efficient cyber crime strategy
sponsored by Hewlett-Packard Limited
WHITE PAPER: Featuring input from expert analysts with years of experience, this white paper presents a series of guidelines for creating security that can survive the modern threat landscape.
Posted: 13 Apr 2015 | Published: 13 Apr 2015

Hewlett-Packard Limited

Enabling Comprehensive Visibility and Real-Time Threat Protection
sponsored by Gigamon
WHITE PAPER: This white paper explains how one potential security solution is capable of providing comprehensive visibility, protecting you from malware and more.
Posted: 13 Apr 2015 | Published: 25 Jul 2014

Gigamon

Online Retailers: Get Specific When Defending Against Price-Scraping Bots
sponsored by Distil Networks
WHITE PAPER: This white paper explains the fine print details about bots and strategies to mitigate them. Access now to learn more.
Posted: 10 Apr 2015 | Published: 11 Mar 2015

Distil Networks

The Real Cost of Driverless Cars for Cybersecurity and Reliability
sponsored by Rogue Wave Software
WHITE PAPER: Several car manufacturers predict that self-driving cars will be on the road by 2020. What are the implications of the rapid increase in automotive software complexity for cybersecurity and reliability as development teams race to deliver this content?
Posted: 10 Apr 2015 | Published: 10 Apr 2015

Rogue Wave Software
1 - 25 of 511 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement