IT Management  >   Systems Operations  >   Security  >  

Cybersecurity

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Cyber Security, Cyber Security Enhancement Act of 2002
DEFINITION: Information assurance, including information security, information technology disaster recovery, and information privacy. See Section 225, Cyber Security Enhancement Act of 2002, of the Homeland Security Act.
Cybersecurity Reports
1 - 25 of 746 Matches Previous Page  |  Next Page
Organizations Worldwide Fear GDPR Non-Compliance Could Put Them Out of Business
sponsored by Veritas
RESOURCE: On average, firms are forecasting spending in excess of €1.3m ($1.4M) on GDPR readiness initiatives. Take a look at this infographic to reveal statistics regarding the GDPR deadline, including potential GDPR fallout, lack of technology hindering GDPR compliance, and more.
Posted: 25 Sep 2017 | Published: 25 Sep 2017

Veritas

The Truth about Single Sign-on
sponsored by One Identity
WHITE PAPER: Single sign-on (SSO) is the most visible part of identity and access management (IAM). Take a look at this white paper to tackle common myths about SSO, and identify key questions you should ask in order to find the best approach to IAM and SSO for your organization.
Posted: 25 Sep 2017 | Published: 25 Sep 2017

One Identity

Ransomware: All Locked Up and No Place to Go
sponsored by Kaspersky Lab
WHITE PAPER: Ransomware is the digital version of extortion. It uses age-old tactics to carry out a modern day crime, but the elements behind it are as old as human criminal activity itself. Explore this white paper to discover recommendations and expert tips to protect against ransomware.
Posted: 25 Sep 2017 | Published: 31 Dec 2016

Kaspersky Lab

The Dangers of Phishing: Help Employees Avoid the Lure of Cybercrime
sponsored by Kaspersky Lab
WHITE PAPER: According to the Anti-Phishing Work Group Q1 report, the number of phishing websites increased 250% from the last quarter of 2015 through the first quarter of 2016. Explore this white paper to reveal how to identify a phishing attack and how to protect your business from being targeted by phishing attacks.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

Kaspersky Lab

The 12 Critical Questions you Need to Ask when Choosing an AD Bridge Solution
sponsored by One Identity
WHITE PAPER: Most enterprises today have heterogeneous IT environments, with Microsoft Active Directory (AD) providing Windows access for most users. Read this white paper to identify a number of key questions to ask when evaluating which AD bridge solution is right for you.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

One Identity

When Cryptors Attack: Timeline of a Ransomware Infection
sponsored by Kaspersky Lab
WHITE PAPER: The average amount of damage to SMBs caused by one cryptomalware attack is $99,000, according to a survey from Kaspersky Lab and B2B International. Take a closer look at this white paper to learn about cryptomalware attacks and how to prevent your company from being targeted with cryptomalware.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

Kaspersky Lab

Security Orchestration and Micro-Segmentation for Public and Private Cloud
sponsored by Cloudvisory
WHITE PAPER: According to Gartner, misconfiguration and mistakes are the leading causes of operations incidents and successful security attacks. Explore this white paper to uncover a cloud security platform that can provide you with protection your organization lacks.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

Cloudvisory

Encryption Hiding Malware in Half of Cyber Attacks
sponsored by A10 Networks
EGUIDE: A Ponemon study has revealed, malware in nearly half of cyberattacks in the past 12 months has been sneaked into organizations under the cover of encryption. Explore in more detail this expert e-guide and uncover statistics regarding encryption attacks.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

A10 Networks

How to Address Key SSL Security Issues and Vulnerabilities
sponsored by A10 Networks
EGUIDE: Don't compromise your website security. Explore this expert e-guide to reveal the new SSL security landscape and uncover emerging security issues within SSL technology.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

A10 Networks

SWIFT Security Controls to be Mandatory by 2018
sponsored by CyberArk Software, Inc
EGUIDE: Take a look at this e-guide to uncover experts' perspectives about the SWIFT security control mandate with inspections and enforcement beginning January 1, 2018.
Posted: 22 Sep 2017 | Published: 19 Sep 2017

CyberArk Software, Inc

Privileged Account Security
sponsored by CyberArk Software, Inc
EGUIDE: 55% of insider misuse is tracked to privileged account abuse, according to Verizon's Data Breach Investigations Report. Take a look at this expert e-guide to discover how to improve your security by limiting privileged accounts.
Posted: 22 Sep 2017 | Published: 19 Sep 2017

CyberArk Software, Inc

How Ransomware Attacks have Changed
sponsored by CyberArk Software, Inc
EGUIDE: Take a look at this e-guide to uncover an expert perspective that reveals a different kind of ransomware, how ransomware has changed, and how to prevent destruction of service attacks.
Posted: 22 Sep 2017 | Published: 20 Sep 2017

CyberArk Software, Inc

Securely Managing your UNIX Environment
sponsored by One Identity
WHITE PAPER: Take a look at this white paper to uncover how IAM challenges within UNIX can be overcome with the right practices and tools.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

One Identity

VPN Access Made Easier Without Sacrificing Security
sponsored by HID
JOURNAL ARTICLE: Carrying more than one device can be a burden. Take a closer look at this white paper to reveal an authentication platform on your mobile device that would provide users with security while being easy to use.
Posted: 21 Sep 2017 | Published: 15 Aug 2017

HID

Extending Native Active Directory Capabilities to Unix and Linux
sponsored by One Identity
WHITE PAPER: As enterprises become more complex, involving multiple operating systems, the challenges of identity management also become greater. Take a closer look at this white paper to explore how you can simplify identity management across multiple operating systems.
Posted: 21 Sep 2017 | Published: 21 Sep 2017

One Identity

Top 6 Things Small Businesses Need to Know about Cybersecurity
sponsored by Kaspersky Lab
WHITE PAPER: According to a Kaspersky Lab survey, just one cybersecurity incident can cost small- and medium-sized businesses an average of $86,500. Read this white paper to reveal a list of the top things startups and small businesses need to know about cybersecurity.
Posted: 21 Sep 2017 | Published: 21 Sep 2017

Kaspersky Lab

2017 Midyear Security Roundup: The Cost of Compromise
sponsored by TrendMicro
WHITE PAPER: In the first half of 2017 there have been 83 million total ransomware threats detected, and an average of 28 new families detected. Read this white paper to reveal ransomware attack costs and a review of the current threat landscape. Use this information to move forward to protect your enterprise against WannaCry, Petya and more.
Posted: 21 Sep 2017 | Published: 21 Sep 2017

TrendMicro

Agile Development to Transform Your Application Testing Program
sponsored by IBM
WEBCAST: Watch this webinar to reveal how Cisco has transformed their application testing program to improve their application security.
Posted: 21 Sep 2017 | Premiered: May 18, 2017

IBM

Worldwide Email Security Vendor Assessment
sponsored by TrendMicro
WHITE PAPER: The email security market is a mature market that is experiencing an influx of new features to deal with adapting threats. Take a look at this IDC email security vendor assessment so that your company can choose a vendor that fits your specific needs.
Posted: 21 Sep 2017 | Published: 31 Dec 2016

TrendMicro

Top 6 Reasons to Choose DNA
sponsored by Cisco Systems, Inc.
RESOURCE: This resource explores the top 6 reasons to consider an intent-based networking provider like Cisco's Digital Network Architecture to help deliver added security protection and automation of your network.
Posted: 20 Sep 2017 | Published: 20 Sep 2017

Cisco Systems, Inc.

AWS Security Fitness Guide
sponsored by evident.io
WHITE PAPER: Strengthen your cloud and combat the criminals. Read this white paper to reveal how to make your AWS environment less vulnerable to cyberattacks and threats.
Posted: 20 Sep 2017 | Published: 20 Sep 2017

evident.io

What's on Your Network?
sponsored by Aruba Networks
RESOURCE: In this resource, find out how the closed-loop approach to network security allows IT professionals to deploy and retain control of IoT and BTOD devices to protect against security breaches.
Posted: 20 Sep 2017 | Published: 20 Sep 2017

Aruba Networks

Logrythm's Security Analytics Platform: Product Overview
sponsored by LogRhythm, Inc.
EGUIDE: In this e-guide, expert Dan Sullivan examines LogRhythm's Security Analytics Platform, a tool that leverages big data analytics and machine learning to help protect enterprises. Learn how this platform works, as well as insights on its support, cost, and deployment.
Posted: 20 Sep 2017 | Published: 14 Sep 2017

LogRhythm, Inc.

The 6 Essentials for DevOps Team Excellence
sponsored by evident.io
WHITE PAPER: A recent Enterprise Strategy Group survey found that 45% of organizations currently report having a "problematic shortage" of cybersecurity skills. Take an in-depth look at this white paper to reveal essentials that can help your enterprise form a smart framework for running a secure DevOps organization.
Posted: 20 Sep 2017 | Published: 20 Sep 2017

evident.io

SIEM Analysis for Security Professionals
sponsored by LogRhythm, Inc.
EDITORIAL RESOURCE GUIDE: This expert e-guide explores why it's important that SIEM systems have an analysis interface for security professionals, as well as how advanced security analytics can safeguard your enterprise.
Posted: 20 Sep 2017 | Published: 14 Sep 2017

LogRhythm, Inc.
1 - 25 of 746 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement