IT Management  >   Systems Operations  >   Security  >  

Cybersecurity

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Cyber Security, Cyber Security Enhancement Act of 2002
DEFINITION: Information assurance, including information security, information technology disaster recovery, and information privacy. See Section 225, Cyber Security Enhancement Act of 2002, of the Homeland Security Act.
Cybersecurity Reports
1 - 25 of 735 Matches Previous Page  |  Next Page
How to Minimize the IAM Risks Associated with Third-Party Relationships
sponsored by Identity Automation
EBOOK: According to a Deloitte survey, 94.3% of companies are not confident in the tools used to manage third-party risk. Discovery a variety of ways to increase your IAM approach to mitigate the risks of third-party relationships.
Posted: 22 Jan 2018 | Published: 22 Jan 2018

Identity Automation

Don't Switch To Windows 10 Without An Endpoint Security Plan
sponsored by Thycotic
WHITE PAPER: According to the Thycotic 2017 BlackHat Report, 73% of hackers report that traditional anti-virus tools are irrelevant or obsolete, and don't adapt quickly enough to block emerging threats. This resource offers endpoint and application security strategies as well as tactics to enhance your Windows 7 and 10 security.
Posted: 19 Jan 2018 | Published: 19 Jan 2018

Thycotic

Top 10 Keys to Successful Least Privilege Adoption
sponsored by Thycotic
WHITE PAPER: According to Thycotic, 85% of breaches involve compromised endpoints. Explore this resource to learn about endpoint attacks and strategies for enhanced endpoint and application security.
Posted: 19 Jan 2018 | Published: 19 Jan 2018

Thycotic

Security Obligations for Enterprises Using Cloud Services
sponsored by Oracle Corporation
WHITE PAPER: 77% of organizations have already adopted cloud services and 10% of those companies using cloud services describe themselves as heavy users, according to Oracle. Explore this white paper to gain insight into the shared responsibility model as well as cloud using security techniques.
Posted: 19 Jan 2018 | Published: 19 Jan 2018

Oracle Corporation

What Keeps Me Up At Night?: Concerns of a CISO
sponsored by enSilo
WEBCAST: Watch this webcast to uncover a list of security concerns facing CISOs today as well as pre-infection protection strategies to lessen these concerns.
Posted: 19 Jan 2018 | Premiered: Jan 19, 2018


Security Research Shows AV & NGAV Can Be Evaded
sponsored by enSilo
WEBCAST: Process Doppelganging is a new evasion technique targeting Windows systems. Take a look at this webinar to uncover the history of evasion techniques as well as strategies for attack protection.
Posted: 19 Jan 2018 | Premiered: Jan 19, 2018


Why Mobile Device Event Correlation Matters
sponsored by SyncDog
WHITE PAPER: The report offers 3 key challenges enterprises will deal with as more personal phones and tablets invade the workplace: governance and compliance, mobile device management, and security.
Posted: 18 Jan 2018 | Published: 18 Jan 2018

SyncDog

Mitigate the Top 9 Cloud Threats with a Cloud Access Security Broker (CASB)
sponsored by Oracle Corporation
WHITE PAPER: According to Cloud Computing Trends: 2017 State of the Cloud Survey, today's enterprises run 41% of their workloads in a public cloud, and 38% in a private cloud. This white paper offers strategies for mitigating the top 9 cloud threats with a cloud access security broker (CASB).
Posted: 18 Jan 2018 | Published: 18 Jan 2018

Oracle Corporation

Enabling Healthcare with Trusted Access
sponsored by Duo Security
WEBCAST: Within the healthcare industry there is an immense amount of data that needs to be secured. Take a look at this webcast to learn more about the need for security improvement within the healthcare industry.
Posted: 18 Jan 2018 | Premiered: Jan 18, 2018

Duo Security

Financial Institution Security
sponsored by enSilo
RESOURCE: Reviewing and selecting endpoint products to protect a financial institution's servers and ATM's is an extensive process.This resource offers strategies for improving security and downtime within financial institutions.
Posted: 18 Jan 2018 | Published: 18 Jan 2018


Security within the Financial Services Industry
sponsored by enSilo
RESOURCE: There has been an increase in "file-less malware" as it goes undetected in most organizations. Attackers' motivation is driven by financial gain, so targeting the banking industry with attacks is common. Take a look at this resource to uncover how to improve security within the financial industry to protect against dangerous malware variants.
Posted: 18 Jan 2018 | Published: 18 Jan 2018


Market Guide for Endpoint Detection and Response Solutions
sponsored by enSilo
RESOURCE: The endpoint detection and response (EDR) market is rapidly growing as security and risk management leaders seek adaptive security architecture. Take a look at this Gartner Market Guide to uncover various endpoint detection and response strategies.
Posted: 18 Jan 2018 | Published: 18 Jan 2018


Always on GDPR - The Visibility to Act Like the Pros
sponsored by Nuix
WHITE PAPER: The GDPR is estimated to implement $5.3 billion in fines by 2021, according to Nuix. To avoid the strict fines imposed by the regulation, a successful compliance strategy is critical. This resource offers an approach to effectively securing personal data through a more advanced method than your average cybersecurity strategy.
Posted: 18 Jan 2018 | Published: 18 Jan 2018

Nuix

Contingent Workers
sponsored by Identity Automation
WHITE PAPER: By 2020, approximately 40% of the average company's total workforce is expected to be contingent workers. The rise in contingent workers brings an insider security risk. Insiders are by far the weakest link in most organizations' security model. Take a look at this e-book and learn more about the threats insiders pose to your organization.
Posted: 17 Jan 2018 | Published: 17 Jan 2018

Identity Automation

The 2017 Trusted Access Report
sponsored by Duo Security
WHITE PAPER: The enterprise perimeter has been redefined by new networking models and with new technology, comes new security risks. Take a look at this 29-page report to learn about the evolution of enterprise security and overall device security health.
Posted: 17 Jan 2018 | Published: 17 Jan 2018

Duo Security

The Art of Application Security: Getting Started with DevSecOps
sponsored by Whitehat Securities
WHITE PAPER: According to the Verizon DBIR, 60% of breaches involved web app attacks. Take a look at this white paper to discover best practices for application security as well as a case study example to prove the benefits of the application security best practices.
Posted: 17 Jan 2018 | Published: 17 Jan 2018

Whitehat Securities

The Good Shepherd Model for Cybersecurity, Privacy, And Regulatory Compliance
sponsored by Nuix
WHITE PAPER: Data breaches are inevitable - If you can't prevent hackers or insiders from getting into your organization's network, it's vital to minimize the damage they can cause. This white paper reveals four rules for protecting private data to improve compliance with privacy regulations.
Posted: 17 Jan 2018 | Published: 17 Jan 2018

Nuix

Connected Intelligence: GDPR and Incident Response
sponsored by Nuix
WHITE PAPER: The GDPR will force organizations to reexamine how they handle consumers' personal information. Data breach investigations in just 72 hours —are you prepared? This white paper offers GDPR and incident response preparation strategies to ensure your enterprise is ready for the upcoming regulation.
Posted: 17 Jan 2018 | Published: 17 Jan 2018

Nuix

Unified MTD + MARS is the Best Practice for Mobile Security
sponsored by Lookout
WEBCAST: Download this webcast to understand the full mobile risk matrix and discover how mobile threat defense (MTD) combined with mobile app reputation services (MARS) can protect your organization from mobile threats to apps, devices, networks and more.
Posted: 17 Jan 2018 | Premiered: Jan 17, 2018

Lookout

The Trouble with Phishing
sponsored by Duo Security
WHITE PAPER: Phishing is one of the most common threats hitting organizations and it is only getting worse. This guide offers insight into the problems around phishing, how it happens, and what your organization can do to defend against the damaging attacks.
Posted: 16 Jan 2018 | Published: 16 Jan 2018

Duo Security

Automated Endpoint Security Realized
sponsored by enSilo
RESOURCE: Modern malware is evolving at a rapid rate and most traditional security defenses are failing to detect it in an efficient timeframe. Take a look at this resource to uncover how to leverage endpoint security to protect against damaging malware attacks targeting your enterprise.
Posted: 16 Jan 2018 | Published: 16 Jan 2018


Broadcast Media Case Study
sponsored by enSilo
CASE STUDY: Explore this case study to gain insight into how companies within the broadcast media industry overcame the challenge of phishing campaigns targeting their enterprises.
Posted: 16 Jan 2018 | Published: 16 Jan 2018


3 Types of Rogue Employees and How to Stop Them
sponsored by Identity Automation
WHITE PAPER: Employees pose the greatest threat to any organization and have the capability to cause egregious harm and costs through data breaches, insecure transactions, and cyber theft. This e-book reveals 3 types of employees who pose security risks and offers strategic approaches utilizing IAM for mitigating these risks and improving your security.
Posted: 16 Jan 2018 | Published: 16 Jan 2018

Identity Automation

IAM as a Foundation for Your AWS Migration Strategy
sponsored by Identity Automation
WHITE PAPER: Using IAM as the foundation of your AWS migration can reduce complexity, smooth out the overall process, and help ensure a successful transition to the cloud. This white paper offers strategies for enhancing your AWS deployment with an IAM approach.
Posted: 16 Jan 2018 | Published: 16 Jan 2018

Identity Automation

A Practical Guide for GDPR Compliance
sponsored by Nuix
WHITE PAPER: Most organizations are not yet adequately prepared for compliance with the GDPR. In fact, 64% of organizations are not ready to comply with the requirements. This white paper offers a practical guide for GDPR compliance, including insight into why the GDPR is important and its essential requirements.
Posted: 16 Jan 2018 | Published: 16 Jan 2018

Nuix
1 - 25 of 735 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement