IT Management  >   Systems Operations  >   Security  >  

Cybersecurity

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Cyber Security, Cyber Security Enhancement Act of 2002
DEFINITION: Information assurance, including information security, information technology disaster recovery, and information privacy. See Section 225, Cyber Security Enhancement Act of 2002, of the Homeland Security Act.
Cybersecurity Reports
1 - 25 of 524 Matches Previous Page  |  Next Page
Safeguarding Vital Data Is a Battle You Can Win
sponsored by Intel Security
WHITE PAPER: In this resource, uncover what it means to develop data management and protection policies that reach from the core of the business out to mobile devices, the cloud and beyond. Also, learn how to be ready for whatever security challenges the world sends your way.
Posted: 24 Sep 2016 | Published: 24 Sep 2016

Intel Security

GigaSECURE Security Delivery Platform
sponsored by Gigamon
VIDEO: Discover how to shift your security strategy from perimeter defenses towards a detect and protect frameworkm gaining greater visibility in the process. Learn how to extend the reach of your security applications everywhere on your network by giving them the right traffic at the right time.
Posted: 23 Sep 2016 | Premiered: 04 Aug 2015

Gigamon

Policing cyber crime
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security series considers the duties of the police in the UK and asks whether these roles remain realistic and achievable in cyber space
Posted: 23 Sep 2016 | Published: 23 Sep 2016

ComputerWeekly.com

The Power of Precise Threat Intelligence: Which SecureWorks service is right for me?
sponsored by SecureWorks
WHITE PAPER: Creating meaningful threat intelligence requires specialized tools and expertise that go well beyond simple alerts and content searches. Discover hot to achieve this level of expertise within this short white paper. You'll gain a greater visibility into the deepest part of your network and better understand malware and the actors behind it.
Posted: 22 Sep 2016 | Published: 31 Aug 2016

SecureWorks

Penetration Testing Services Data Sheet
sponsored by IBM
DATA SHEET: Because high-profile data breaches have become routine, a programmatic approach to security testing and vulnerability management is clearly required. This data sheet details one group of security professionals whose goal is to help you discover vulnerabilities in your computer networks, hardware, and software applications before criminals do.
Posted: 22 Sep 2016 | Published: 29 Jul 2016

IBM

Ransomware: Threats, Motivations, and Tools of the Trade
sponsored by Radware
WHITE PAPER: Today's hackers require less money and time than ever before to start their campaign. Learn more about how marketplace dynamics are shifting the scale of the modern attack landscape, and uncover access to a valuable resource for security professionals.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Radware

NSS Labs 2016 Breach Detection System (BDS) Group Test Results
sponsored by Fortinet, Inc.
RESEARCH CONTENT: Expert independent testing has emerged as a critical shortlisting and decision-making tool for IT security teams. In this year's NSS Labs BDS testing, products were tested over a month-long period and subjected to more than 600 attacks. Learn what BDS provides your enterprise with the best protection.
Posted: 21 Sep 2016 | Published: 01 Aug 2016

Fortinet, Inc.

Cyber Security Recommendations from the C-Suite
sponsored by Radware
WHITE PAPER: From this resource, garner the top 5 cybersecurity best practices for enterprise leaders, as illustrated by a survey conducted of over 200 C-level security executives. Read on now to access detailed insight on their expert recommendations for cybersecurity in 2016.
Posted: 19 Sep 2016 | Published: 19 Sep 2016

Radware

Securing Microsoft Office 365 - The Inside Track To Threat Protection
sponsored by Proofpoint, Inc.
WHITE PAPER: This report explores Office 365 adoption concerns around issues such as threat protection, intelligence and response. Find out what additional security measures your organization can take to securely deploy Office 365 and reap its full benefits.
Posted: 19 Sep 2016 | Published: 31 Aug 2016

Proofpoint, Inc.

Nucleus Research Guidebook: IBM QRadar on Cloud
sponsored by IBM
RESOURCE: Learn how to eliminate the need for expensive hardware and IT personnel oversight by utilizing the cloud. Deploy quickly and achieve faster time to value with a growing range of additional cloud security services. Realize the benefits of a managed cloud infrastructure and more through this brief resource.
Posted: 19 Sep 2016 | Published: 31 Aug 2016

IBM

The Definitive Buyer's Guide for Evaluating Enterprise Network Firewalls
sponsored by Palo Alto Networks
WHITE PAPER: This essential guide demonstrates how to reduce your attack surface by making an informed decision on the right firewall for your business. To do so, discover the fundamentals of modern firewall technology, 10 critical business requirements your next firewall must address, and more.
Posted: 19 Sep 2016 | Published: 19 Sep 2016

Palo Alto Networks

Security Framework: A Guide for Business Leaders
sponsored by Palo Alto Networks
WHITE PAPER: Don't satisfy yourself with the status quo. In this guide, access an extensive security framework which will analyze, detect, prevent, and respond to all known and unknown cyber threats. Learn how to formulate a strategy that will rapidly automate protection, extend network visibility, and more.
Posted: 16 Sep 2016 | Published: 16 Sep 2016

Palo Alto Networks

Mitigating DNS Zero-Day Exploits With Hybrid Network Architecture
sponsored by EfficientIP
WHITE PAPER: Discover the key benefits of hybrid DNS, and learn how to leverage DNS to mitigate zero-day exploits by eliminating single point of failure (SPoF) and enhancing upgrade agility. Read on to deploy a reliable hybrid DNS architecture that gives network admins the ability to enact rapid vulnerability remediation.
Posted: 15 Sep 2016 | Published: 15 Sep 2016

EfficientIP

The Insider Threats: Be Protected with Advanced DNS Security
sponsored by EfficientIP
WHITE PAPER: See first-hand how to implement a secure DNS architecture—such as high performance cache and real time DNS traffic analysis tools capable of adaptive countermeasures—to enhance your organization's ability to stand against internal attacks, and ensure continuity of mission-critical DNS services.
Posted: 15 Sep 2016 | Published: 15 Sep 2016

EfficientIP

Optimize High-Performing DNS Infrastructures for Greater Security
sponsored by EfficientIP
WHITE PAPER: In this white paper, you will examine three methods of optimizing DNS infrastructure to achieve greater security, performance, simplicity, and a drastic reduction in TCO. Access now to learn how to eliminate useless server farms to reduce energy costs and improve protection against furtive attacks.
Posted: 15 Sep 2016 | Published: 15 Sep 2016

EfficientIP

Outsmarting Ransomware: Protect Your Money and Assets
sponsored by arcserve
WEBCAST: Watch this highly informative webinar from featuring IT security leaders as they teach you how to defeat those ransomware hackers lurking in the dark of cyberspace. You'll discover preventative measure and remediation strategies to keep your organization safe.
Posted: 14 Sep 2016 | Premiered: Aug 1, 2016

arcserve

Protecting Web Services for Grand Slam Roland-Garros
sponsored by EfficientIP
CASE STUDY: Learn how to strengthen your network foundation to support critical business imperatives—as well as improve business continuity—by unifying network management and bolstering defenses against debilitating DNS attacks. Access now to analyze real-time network traffic to gain global visibility.
Posted: 13 Sep 2016 | Published: 13 Sep 2016

EfficientIP

4 Countermeasures to Protect Against Ransomware
sponsored by TrendMicro
WHITE PAPER: Learn not only why ransomware is one of the favored tools of the cybercriminal, but also how enterprises fall prey to it, how it attacks their systems, and how to prevent it. Also learn common pitfalls when preparing to combat this threat, and four countermeasures to keep your data safe.
Posted: 12 Sep 2016 | Published: 12 Sep 2016

TrendMicro

Buying Criteria for Next-Generation Network Security
sponsored by Cisco Systems, Inc.
WHITE PAPER: Discover an in-depth explanation of the factors that compel organizations to look at next-generation solutions. This buyer's guide offers an analysis of the most important capabilities you should look for (and demand) from your network security gear, and will arm you with the information you need to be an educated buyer.
Posted: 12 Sep 2016 | Published: 12 Sep 2016

Cisco Systems, Inc.

Miercom Report - Cisco Catalyst 3650
sponsored by Cisco Systems, Inc.
PRODUCT OVERVIEW: The Cisco Catalyst 3650 is an enterprise access switch – ideal for branch-office deployments. Models in this versatile switch series deliver a spectrum of capabilities. This Miercom report details some of the clear business benefits that the Cisco Catalyst 3650 delivers supported by the results of hands-on testing.
Posted: 12 Sep 2016 | Published: 27 Feb 2015

Cisco Systems, Inc.

Next-Generation Firewalls: An Investment Checklist
sponsored by Cisco Systems, Inc.
WHITE PAPER: What should you look for in a next-generation firewall? This paper includes a checklist against which you evaluate NGFWs; read on now to determine the benefits a truly effective NGFW can deliver, and find a NGFW that will provide actionable indications of compromise to identify malicious activity, and more.
Posted: 12 Sep 2016 | Published: 12 Sep 2016

Cisco Systems, Inc.

Cloud-Based Security and Compliance Trials and Demos
sponsored by Proofpoint, Inc.
PRODUCT DEMO: Whether you seek email protection, mobile defense, threat intelligence, or another type of tool to bolster your security posture, how can you be sure these investments will deliver? Uncover free, limited-time evaluations, trial versions, and demos of cloud-based security and compliance solutions.
Posted: 09 Sep 2016 | Premiered: 01 Aug 2016

Proofpoint, Inc.

Here's What Your Personal Data is Going for on the Dark Web
sponsored by BMC
ANALYST REPORT: How much is your data worth? Take a good look at this underground marketplace to better understand the need for a proactive security strategy in your organization.
Posted: 09 Sep 2016 | Published: 22 Jul 2016

BMC

IDC: Rethinking the Network as a Security Sensor and Enforcer
sponsored by Cisco Systems, Inc.
RESEARCH CONTENT: Given the amount of sensitive data traveling across enterprise networks, cybercriminals will look to use networks to accomplish their goal of data breach. This IDC technology spotlight details how to embed security tools in your network by way of a network security platform.
Posted: 08 Sep 2016 | Published: 30 Oct 2015

Cisco Systems, Inc.

Understanding Account Takeover Attacks
sponsored by IMMUNIO, Inc.
PODCAST: Discover the necessary steps to prevent hacking via stolen credentials on your web applications. Learn how to protect your online accounts and get to the bottom of why hackers want to take over these accounts.
Posted: 08 Sep 2016 | Premiered: Aug 24, 2016

TOPICS:  Cybersecurity
IMMUNIO, Inc.
1 - 25 of 524 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement