IT Management  >   Systems Operations  >   Security  >  

Cybersecurity

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Cyber Security, Cyber Security Enhancement Act of 2002
DEFINITION: Information assurance, including information security, information technology disaster recovery, and information privacy. See Section 225, Cyber Security Enhancement Act of 2002, of the Homeland Security Act.
CybersecurityReports
1 - 25 of 437 Matches Previous Page  | Next Page
Secure Identity and Smart Employee ID Solutions
sponsored by Bull
VIDEO: This short video introduces HID Global's innovative approach to access management, in which one single ID credential provides fast, convenient access to doors, data, and cloud applications.
Posted: 17 Oct 2014 | Premiered: 17 Oct 2014

Bull

10 Things Every IT Manager Must Know About the Enemy Within
sponsored by Clearswift
WHITE PAPER: This white paper contains critical information on where insider threats originate and explores one company's innovative tools for preventing data breaches within your enterprise.
Posted: 16 Oct 2014 | Published: 16 Oct 2014

Clearswift

The Cyber Resilience Blueprint: A New Perspective on Security
sponsored by Symantec Corporation
WHITE PAPER: This exclusive whitepaper offers up best practices for creating a cyber-resilient enterprise.
Posted: 14 Oct 2014 | Published: 12 Aug 2014

Symantec Corporation

Data Breaches in Europe
sponsored by ComputerWeekly.com
RESEARCH CONTENT: The personal data of millions of Europeans have been compromised with 89% of the breaches the fault of corporations, according to this investigation by the Central European University.
Posted: 14 Oct 2014 | Published: 14 Oct 2014

ComputerWeekly.com

An Incident Response Playbook: From Monitoring to Operations
sponsored by AlienVault
WEBCAST: This exclusive webcast examines how to improve incident detection and response capabilities to match the vast array of cyber-attacks that exist today.
Posted: 10 Oct 2014 | Premiered: Oct 10, 2014

AlienVault

What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware?
sponsored by IBM
WHITE PAPER: Mobile security is about more than the device: It's also about protecting apps on the device. Learn how IBM can help.
Posted: 09 Oct 2014 | Published: 31 Jan 2014

IBM

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

Defending Against Application Denial of Service Attacks
sponsored by Akamai Technologies
WHITE PAPER: This paper will dig into application DoS attacks, offering both an overview of common attack tactics and possible mitigations for each. By the end of the paper you should have a guide and an understanding of how your application availability will be attacked, and what you can do about it.
Posted: 08 Oct 2014 | Published: 08 Oct 2014

Akamai Technologies

Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk
sponsored by SurfWatch Labs
WHITE PAPER: This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk information, and what cyber insurance options make the most sense for your business.
Posted: 08 Oct 2014 | Published: 08 Oct 2014

SurfWatch Labs

Extending Security Intelligence with Big Data
sponsored by IBM
WHITE PAPER: Learn how IBM Security Intelligence with Big Data can help organizations gain insights into advanced data threats.
Posted: 08 Oct 2014 | Published: 31 Jan 2013

IBM

Protect People, Processes and Technology from Web Application Threats
sponsored by IBM
WHITE PAPER: Securing externally facing applications is an important step toward safeguarding your critical assets. Find out why.
Posted: 08 Oct 2014 | Published: 29 Nov 2013

IBM

Five Critical Steps to Achieving an Effective Application Security Program
sponsored by IBM
WHITE PAPER: Discover steps you can incorporate into every phase of the development process to improve your application security, and get an overview of application threats and the types of risks to prioritize and remediate.
Posted: 08 Oct 2014 | Published: 31 Dec 2013

IBM

The adoption of cloud-based services
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Bob Tarzey and Bernt Østergaard look at the issues around the adoption of cloud-based services, security technology that is being deployed by enthusiasts and looks at the reasons why the avoiders are holding back.
Posted: 03 Oct 2014 | Published: 03 Oct 2014

ComputerWeekly.com

How Executives Can Understand Cyber Risks and Ensure Governance
sponsored by SurfWatch Labs
WHITE PAPER: Learn about today's cyber security risks and how to incorporate a sound cyber risk framework based on a business intelligence approach.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

SurfWatch Labs

Outsider Threat Protection: Building a Kill Chain Defense
sponsored by Digital Guardian
WHITE PAPER: This white paper reveals the story behind outsider threats and how to defend against these attacks that steal sensitive data.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Digital Guardian

DDos Survival Handbook
sponsored by Singlehop
WHITE PAPER: This handbook is the survival guide to fight off cyber attackers and mitigate the risk of DDoS attacks.
Posted: 29 Sep 2014 | Published: 31 Dec 2013

Singlehop

Webcast: How Much Cybersecurity is Enough?
sponsored by CDW Corporation
WEBCAST: In this webcast, Kathleen Richards, the features editor of Information Security Magazine and searchSecurity.com, seeks to answer a key question: How much cybersecurity is enough?
Posted: 29 Sep 2014 | Premiered: Sep 16, 2014

CDW Corporation

Podcast: How Much Cybersecurity is Enough?
sponsored by CDW Corporation
PODCAST: In this podcast, Kathleen Richards, the features editor of Information Security Magazine and searchSecurity.com, seeks to answer a key question: How much cybersecurity is enough?
Posted: 29 Sep 2014 | Premiered: Sep 16, 2014

CDW Corporation

Social Engineering in IT Security
sponsored by ComputerWeekly.com
BOOK: This extract from Sharon Conheady's book, Social Engineering in IT Security, gives an overview of Social Engineering techniques and explains how organisations can protect themselves.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

ComputerWeekly.com

Managing SSL Certificates in Pan-Asia Pacific Enterprises
sponsored by Symantec Corporation
WHITE PAPER: Businesses around the world face an array of threats to information security.  Enterprised in Pan-Asia face the same threats while contending with region-specific challenges associated with trade across diverse cultures.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

Symantec Corporation

How to Mitigate the Risk of Insider Threats
sponsored by Digital Guardian
WHITE PAPER: This white paper explains how to successfully ward off insider threats by altering the operating environment.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

Digital Guardian

How Much Cybersecurity is Enough?
sponsored by CDW Corporation
TRANSCRIPT: In this presentation, Kathleen Richards, the features editor of Information Security Magazine and searchSecurity.com, seeks to answer a key question: How much cybersecurity is enough?
Posted: 25 Sep 2014 | Published: 25 Sep 2014

CDW Corporation

Fight Cyber Crime with Splunk, Cisco, and Red Hat
sponsored by Red Hat
WHITE PAPER: Consult the following brief white paper to examine the current state of cyber crime and how Splunk, Cisco, and Red Hat have come together to scale-out cyber security analytics built on affordable, industry-standard infrastructure to help thwart and predict threats.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

Red Hat

Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords
sponsored by CA Technologies.
WHITE PAPER: In this in-depth report, explore new authentication security solutions that can eliminate weak password files and end the storage of passwords on the server – meaning there are no credentials for cyber criminals to steal.
Posted: 25 Sep 2014 | Published: 31 Aug 2014

CA Technologies.

Get the Network Protection You Need with Next Generation Firewalls
sponsored by CDW Corporation
WHITE PAPER: In this white paper, discover what a next-generation firewall can do for your organization in terms of network security.
Posted: 03 Oct 2014 | Published: 03 Oct 2014

CDW Corporation
1 - 25 of 437 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement