IT Management  >   Systems Operations  >   Security  >  

Cybersecurity

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Cyber Security, Cyber Security Enhancement Act of 2002
DEFINITION: Information assurance, including information security, information technology disaster recovery, and information privacy. See Section 225, Cyber Security Enhancement Act of 2002, of the Homeland Security Act.
Cybersecurity Reports
1 - 25 of 516 Matches Previous Page  |  Next Page
Facing Network Breach Threats, Visibility Is Key
sponsored by Intel
EGUIDE: If the past three years have taught network managers anything, it's that everyone is vulnerable to a network breach by cybercriminals. Andy McInerney, data network and voice manager at Penn Mutual, one of the oldest mutual life insurance companies in the US, reveals what his business is doing to stop it.
Posted: 26 May 2016 | Published: 17 May 2016

Intel

Building a Cloud Network: What Does It Mean?
sponsored by MASERGY
EGUIDE: Building a network that supports cloud computing appears, for many engineers, to be a path paved by fat pipes. But that's not always the case. Find out what it means – and what it will take – to build a cloud network for your business.
Posted: 25 May 2016 | Published: 19 May 2016

MASERGY

Cloud Security Requires Shared Responsibility Model
sponsored by CloudPassage
EGUIDE: When enterprises move data to the cloud, they can't brush their hands of security responsibility entirely. Learn how securing data in the cloud requires organizations to use a shared responsibility model, one where both the cloud provider and the organization are accountable for certain aspects of security.
Posted: 25 May 2016 | Published: 17 May 2016

CloudPassage

What's Driving the State of Cybersecurity
sponsored by Unisys
WHITE PAPER: The higher the demand for data and devices, the more you need protection against hackers. Discover how managed security services (MSS) can deliver advanced threat management.
Posted: 23 May 2016 | Published: 23 May 2016

Unisys

Making the Case for SMB Security Services
sponsored by CDW
EGUIDE: In this exclusive e-guide, Associate Editor Spencer Smith looks into the 3 main types of cyberthreats SMBs need to watch out for. Learn how SMBs can create a strong security strategy to prevent and mitigate attacks.
Posted: 20 May 2016 | Published: 19 May 2016

CDW

Builders vs. Breakers: 10 Preventable Online Attacks
sponsored by Pluralsight
VIDEO: Discover 10 examples of recent online attacks that could have been easily prevented, including problems with SQL injection, XSS, password hashing, and more. Learn how you can protect your data with two factor authentication.
Posted: 20 May 2016 | Premiered: 05 May 2014

Pluralsight

Anatomy of a Cyber-Attack
sponsored by Dell Software
WHITE PAPER: You need to understand the enemy -- and their malware -- before you can defeat them. Discover a comprehensive strategy to counter every stage of cyber-attacks and eliminate every type of malware from disrupting your network.
Posted: 20 May 2016 | Published: 20 May 2016

Dell Software

Why Visibility Is More Important Than Stopping an Attack
sponsored by Intel
EGUIDE: Visibility into what is happening on your network may matter more than stopping an attack. Can technology keep up with advanced threats? Find out in this expert resource from searchSecurity.com.
Posted: 18 May 2016 | Published: 13 May 2016

Intel

Why IT Leaders Are Buying into Mobile Security
sponsored by Lookout
WHITE PAPER: As mobile devices continue to play a major role in productivity, the likelihood for targeted cyber-attacks will continue to intensify. Discover how CIOs prioritize their mobile security investments today, and ensure mobility doesn't become a liability to your organization—even with the risk of data breach.
Posted: 17 May 2016 | Published: 17 May 2016

Lookout

Securing Office 365 with Symantec
sponsored by Symantec Corporation
PRODUCT OVERVIEW: How can you embrace the benefits of cloud-based email without compromising security or adding risk? Learn how to fill in the security gaps found in Office 365 with a comprehensive security solution that seamlessly integrates with and enhances its built-in security.
Posted: 13 May 2016 | Published: 29 Feb 2016

Symantec Corporation

Cybersecurity in Healthcare: Why It’s Not Enough, Why It Can’t Wait
sponsored by Symantec Corporation
WHITE PAPER: Find out the hazards of not keeping cybersecurity up-to-date within your healthcare organization and uncover ways you can safeguard yourself against attack in this essential infographic.
Posted: 12 May 2016 | Published: 12 May 2016

Symantec Corporation

Threat Defense Isn't Just About Detection: It's How Your Respond
sponsored by Intel Security
WHITE PAPER: Discover how to leverage endpoint detection and response (EDR) to create truly intelligent endpoints that automatically detect and respond to threats before they do their damage. Additionally, read on to see 5 criteria to look for when researching EDR solutions so you can determine which are most proactive in helping to prevent attacks.
Posted: 10 May 2016 | Published: 31 Dec 2015

Intel Security

Case Study: Global Security Management Made Easier for Leading IT Service Provider
sponsored by Intel Security
CASE STUDY: Discover how to unify endpoint management with a centralized security platform thanks to this case study. Read on to learn how a leading IT service provider tamed their endpoint chaos, and see how you can boost the efficiency of your security operations with a unified security platform that eliminates centralized management pain points.
Posted: 10 May 2016 | Published: 10 May 2016

Intel Security

Operationalizing Threat Intelligence
sponsored by Intel Security
PRODUCT OVERVIEW: Learn how to leverage a collaborative platform for operationalizing threat intelligence—including real-time sharing of threat information across the IT infrastructure and delivery of adaptive protection. Discover how to interrupt the cyberattack chain and arming your enterprise with the latest cyberthreat intelligence insights.
Posted: 09 May 2016 | Published: 31 Dec 2015

Intel Security

Transcript: Eliminating Cyber Security Blind Spots with Application Awareness
sponsored by Ipoque
RESOURCE: This webinar will review the hidden cyber security threats that Service Providers and Enterprises need to combat.
Posted: 06 May 2016 | Published: 01 Apr 2016

TOPICS:  Cybersecurity
Ipoque

Podcast: ELIMINATING CYBERSECURITY BLIND SPOTS WITH APPLICATION AWARENESS
sponsored by Ipoque
PODCAST: This webinar will review the hidden cyber security threats that Service Providers and Enterprises need to combat.
Posted: 06 May 2016 | Premiered: Apr 26, 2016

TOPICS:  Cybersecurity
Ipoque

Think Like an Attacker: Six Steps Toward Better Security
sponsored by Intel Security
WHITE PAPER: Discover why piecemeal endpoint defenses are not sufficient to protect against today's threat vectors as we take you inside the mind of an attacker to help you bolster your defenses. Read on to learn six ways to think like a hacker and why new threats require more than strategies and tools to keep the bad guys at bay.
Posted: 06 May 2016 | Published: 06 May 2016

Intel Security

Security that Plays Well with Others
sponsored by Intel Security
WHITE PAPER: As cyberattacks increase in volume and sophistication, organizations need to present a unified coordinated defense. Discover how an open, integrated security architecture can help you coordinate your siloed legacy security products and simplify the threat defense lifecycle.
Posted: 06 May 2016 | Published: 31 Dec 2015

Intel Security

Understanding Cyberthreat Motivations to Improve Defense
sponsored by Intel Security
WHITE PAPER: Find out why you must add cyber-criminal motivation to your threat taxonomy in order to understand what causes a threat agent to commit harmful acts. Read on to discover in detail the elements of this new parameter and how this crucial understating of the hacker's mind can help protect your entire infrastructure.
Posted: 06 May 2016 | Published: 06 May 2016

Intel Security

ELIMINATING CYBERSECURITY BLIND SPOTS WITH APPLICATION AWARENESS
sponsored by Ipoque
WEBCAST: This webinar will review the hidden cyber security threats that Service Provides and Enterprises need to combat.
Posted: 04 May 2016 | Premiered: Apr 26, 2016

Ipoque

Beware the Invisible Cybercriminals: Cyberespionage and Your Business
sponsored by Kaspersky Lab
WHITE PAPER: Cybercriminals today are launching attacks against businesses by copying sophisticated malware and techniques used to target governments and high-profile organizations. Don't get caught in the crossfire, read our special report and find out more on cybercriminal techniques, common exploited vulnerabilities and more.
Posted: 28 Apr 2016 | Published: 31 Dec 2015

Kaspersky Lab

2016 Cyberthreat Defense Report
sponsored by Citrix
ANALYST REPORT: This detailed 2016 cyberthreat defense examines the current and planned deployment of countermeasures across the globe to give you a better understanding of how your security perceptions, concerns, and defenses stack up against your peers.
Posted: 22 Apr 2016 | Published: 22 Apr 2016

Citrix

Cyber Security 2016 and beyond
sponsored by ComputerWeekly.com
EGUIDE: Cyber risks to businesses increasingly feature in the news as a growing number of companies are targeted by attacks aimed at stealing personal and intellectual property data, but despite this coverage, studies show many companies are still ill-equipped to deal with these attacks.
Posted: 18 Apr 2016 | Published: 18 Apr 2016

ComputerWeekly.com

The Key to Protecting Your Business Amid Cybercrime’s Current Boom
sponsored by CA Technologies
WHITE PAPER: This white paper invites you to explore new vulnerabilities in our application-centric culture. Find relief as you uncover a simple-to-deploy, automated, proven strategy for privileged access management delivered in a single appliance protecting physical, virtual and cloud environments.
Posted: 12 Apr 2016 | Published: 12 Apr 2016

CA Technologies

Your Legal Liability Following a Cybersecurity Breach
sponsored by SurfWatch Labs
WHITE PAPER: This resource explores recent legal rulings that put more pressure on organizations to develop a comprehensive cyber risk management program. Read on to discover how an effective threat intelligence strategy can enable you to defend against the growing litigation that inevitably results from being the victim of a cyberattack.
Posted: 01 Apr 2016 | Published: 01 Apr 2016

SurfWatch Labs
1 - 25 of 516 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement