IT Management  >   Systems Operations  >   Security  >  

Cybersecurity

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Cyber Security, Cyber Security Enhancement Act of 2002
DEFINITION: Information assurance, including information security, information technology disaster recovery, and information privacy. See Section 225, Cyber Security Enhancement Act of 2002, of the Homeland Security Act.
Cybersecurity Reports
126 - 150 of 514 Matches Previous Page  |  Next Page
Deploying a Next-Generation IPS Infrastructure
sponsored by F5 Networks
WHITE PAPER: This exclusive white paper explains how deploying an IPS behind and application delivery controller (ADC) can optimize IPS performance, simplify IPS management, increase business agility, and improve overall network security. Read more to learn how you can boost your network security and efficiency with one simple solution.
Posted: 23 Mar 2015 | Published: 19 Dec 2014

F5 Networks

Quarterly Cybercrime Report
sponsored by IBM
WHITE PAPER: This security report will help you stay up to date on changing cybercrime trends.
Posted: 20 Mar 2015 | Published: 30 Nov 2014

IBM

Five Steps For Securing The Data Center
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper presents five essential steps to securing your database without sacrificing the high performance of modern data centers.
Posted: 19 Mar 2015 | Published: 31 Dec 2014

Cisco Systems, Inc.

Stop Advanced Threats Before They Can Hurt You
sponsored by Dell SecureWorks
WHITE PAPER: This white paper reveals how advanced malware sneaks in undetected and how you can stop them.
Posted: 19 Mar 2015 | Published: 30 Apr 2014

Dell SecureWorks

Buyer'€™s Criteria for Advanced Malware Protection
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper gives you a detailed understanding of what controls need to be in place to stop the strongest attacks.
Posted: 19 Mar 2015 | Published: 31 Dec 2014

Cisco Systems, Inc.

Strengthen Desktop Virtualization Security by Minimizing Endpoint Attack Surfaces
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this white paper to explore why IT professionals are increasingly adopting desktop virtualization paired with thin client solutions to significantly reduce risks and improve protection at endpoints. Examine thin client solutions to help you select one that can best support enhanced endpoint security for your organization.
Posted: 19 Mar 2015 | Published: 19 Mar 2015

Dell, Inc. and Intel®

What Makes Two Security Programs Different?
sponsored by Prelert
WHITE PAPER: This blog post compares two anomaly detection programs and discussing their rate of false positives, ability to analyze multiple instances, and more.
Posted: 19 Mar 2015 | Published: 04 Nov 2013

Prelert

A Guide to a Multifaceted Security Strategy
sponsored by Dell SecureWorks
WHITE PAPER: This white paper can help you develop an innovative approach for catching even the most advanced malware.
Posted: 18 Mar 2015 | Published: 01 Jan 2015

Dell SecureWorks

Addressing unique security concerns within the Healthcare Industry
sponsored by Alert Logic
WHITE PAPER: Download this resource to discover how hackers are attacking the healthcare industry and what you can do to combat them.
Posted: 16 Mar 2015 | Published: 16 Mar 2015

Alert Logic

The Truth About Cloud Security Threats
sponsored by Alert Logic
WHITE PAPER: Download this white paper to discover what types of threats are growing, how often they attack, and what you can do to better secure your organization.
Posted: 16 Mar 2015 | Published: 31 May 2014

Alert Logic

Trends in packing and obfuscation
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security Thesis Series looks at how two modern malware methods fit into today's landscape of advanced persistent threat and cyber crime as a service, and what the security industry can do to defend against them.
Posted: 12 Mar 2015 | Published: 12 Mar 2015

ComputerWeekly.com

Business risks of software vulnerabilities
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security Thesis Series looks at how four sources of risk are relevant for evaluating the influence of software vulnerabilities on businesses.
Posted: 12 Mar 2015 | Published: 12 Mar 2015

ComputerWeekly.com

Clustering to counter Android malware
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security Thesis Series looks at how the rapid growth of new Android malware calls for automated tools to help malware analysts.
Posted: 11 Mar 2015 | Published: 11 Mar 2015

ComputerWeekly.com

Mac OS X persistent evidences for forensic purposes
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security Thesis Series provides a technical explanation of how Mac OS X persistence evidences can be extracted for forensic investigation.
Posted: 11 Mar 2015 | Published: 11 Mar 2015

ComputerWeekly.com

Accurate, Effective Fraud Prevention
sponsored by IBM
WHITE PAPER: This white paper describes an example of an airtight fraud prevention system.
Posted: 06 Mar 2015 | Published: 31 Aug 2014

IBM

Enhance Your Malware Protection
sponsored by IBM
WHITE PAPER: This white paper describes a malware protection that can accurately identify even the most advanced malware.
Posted: 06 Mar 2015 | Published: 31 Aug 2014

IBM

Case Study: A Global 1000 Enterprise Adapts Its Security
sponsored by IBM
WHITE PAPER: Read this exclusive report to discover how a global 1000 company successfully adapted their security for the BYOD era.
Posted: 06 Mar 2015 | Published: 31 Aug 2014

IBM

Stepping up the battle against advanced threats
sponsored by IBM
WHITE PAPER: This white paper examines how and why enterprises have failed to protect themselves against advanced threats and gives suggestions for better security.
Posted: 06 Mar 2015 | Published: 31 Jan 2015

IBM

The Financial Impact of Advanced Persistent Threats
sponsored by IBM
WHITE PAPER: This detailed report shows you just how detrimental APTs can be.
Posted: 03 Mar 2015 | Published: 01 May 2014

IBM

The Four Key Elements of Fraud Prevention
sponsored by IBM
WHITE PAPER: This white paper helps you stop fraud by outlining the four key elements of holistic fraud prevention.
Posted: 02 Mar 2015 | Published: 31 Aug 2014

IBM

Global Threat Intelligence Report
sponsored by Dimension Data
WHITE PAPER: This in-depth white paper can help you discover the latest security threats and how to stop them.
Posted: 26 Feb 2015 | Published: 31 Dec 2014

Dimension Data

10 Ways Everyone Should Approach Cybersecurity in 2015
sponsored by Global Knowledge
WHITE PAPER: This paper reviews key security issues and focuses attention on 10 responses that we all need to adopt in our approach to security in 2015.
Posted: 25 Feb 2015 | Published: 25 Feb 2015

Global Knowledge

Information Security ASEAN March 2015
sponsored by SearchSecurity.com
EZINE: Organizations are faced with the double challenge of having to secure a growing volume of endpoints, and dealing with an increasing number of security threats.
Posted: 05 Mar 2015 | Published: 05 Mar 2015

SearchSecurity.com

Information Security ANZ March 2015
sponsored by SearchSecurity.com
EZINE: Experts at Dell and Dimension data in Australia discuss the challenge of securing the end point.
Posted: 05 Mar 2015 | Published: 05 Mar 2015

SearchSecurity.com

Mobile App Security: All You Need to Know
sponsored by Maas360 by IBM
WEBCAST: This webcast helps mobile application developers embed enterprise-grade security in their applications.
Posted: 25 Feb 2015 | Premiered: Feb 25, 2015

Maas360 by IBM
126 - 150 of 514 Matches Previous Page    4 5 6 7 8 9    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement