IT Management  >   Systems Operations  >   Security  >  

Cybersecurity

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Cyber Security, Cyber Security Enhancement Act of 2002
DEFINITION: Information assurance, including information security, information technology disaster recovery, and information privacy. See Section 225, Cyber Security Enhancement Act of 2002, of the Homeland Security Act.
Cybersecurity Reports
151 - 175 of 516 Matches Previous Page  |  Next Page
The 5 Questions Mobile Businesses Are Asking
sponsored by Lookout
WHITE PAPER: In this white paper, you'll discover the 5 key questions that are most concerning to the lack of visibility in a mobile business.
Posted: 23 Jun 2015 | Published: 23 Jun 2015

Lookout

UK 2015 Cyber Risk Survey Report
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Many UK firms are failing to adequately assess their customers and trading partners for cyber risk, Marsh's UK Cyber Risk Survey reveals.
Posted: 23 Jun 2015 | Published: 23 Jun 2015

ComputerWeekly.com

Practical Threat Management for Educational Institutions
sponsored by AlienVault
WHITE PAPER: This white paper provides security tips and suggestions designed to work with the needs – and the budget – of an educational institution.
Posted: 09 Jun 2015 | Published: 31 May 2015

AlienVault

Fortinet Threat Trends in 2015
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper presents today's four most significant cyber-security threats from the hacker's perspective. Access this resource to learn the steps that you need to take to protect your organization from being the next breach victim, as well as how to shift from a reactive to a proactive security approach.
Posted: 05 Jun 2015 | Published: 25 Feb 2015

Fortinet, Inc.

2015 Cyberthreat Defense Report
sponsored by Citrix
WHITE PAPER: In this report, discover what security professionals had to say about mobile security, endpoint security, and other important trends in the cybersecurity landscape.
Posted: 12 May 2015 | Published: 12 May 2015

Citrix

Mitigating Legal and Business Risks of Cyber Breaches
sponsored by UnitedLex
WEBCAST: Discover legal dangers to look out for and begin preparing a proactive strategy to avoid them. Experts discuss real case studies illustrating how legal and IT can collaborate to mitigate the liabilities of a cyber-breach.
Posted: 30 Apr 2015 | Premiered: Apr 1, 2015

UnitedLex

The C-Suite Battle Plan for Cyber Security Attacks in Healthcare
sponsored by Imprivata
WHITE PAPER: This white paper examines why passwords are the top vulnerability that healthcare hackers exploit . Uncover what techniques and tools your enemies are using and how to defend yourself by improving your key management strategy. Read on now to learn more.
Posted: 27 Apr 2015 | Published: 15 Apr 2015

Imprivata

Global Information Security Workforce Study
sponsored by ComputerWeekly.com
RESEARCH CONTENT: There will be an estimated shortall of 1.5 million in the global information security workforce within five years, this study from (ISC)² predicts.
Posted: 27 Apr 2015 | Published: 27 Apr 2015

ComputerWeekly.com

It's Time to Identify and Confront Today's Data Center Security Challenges
sponsored by VMware
WHITE PAPER: In this white paper, you will learn how to detect, isolate, and block dynamic threats with a granular security approach from inside your data center. Access now to learn why network security is a good start and how to enhance it.
Posted: 23 Apr 2015 | Published: 29 Dec 2014

VMware

Strategy Considerations for Enhancing Your Enterprise Security
sponsored by IBM
WHITE PAPER: This white paper suggests building a security operations center (SOC) for a more innovative and effective approach to enterprise security.
Posted: 22 Apr 2015 | Published: 31 Dec 2013

IBM

Extend Security and Control from the Data Center Edge to the Core
sponsored by VMware
WHITE PAPER: This white paper explores how to enable comprehensive data center security through network virtualization. Access now to learn how to overcome the three major issues with traditional network security and how to defend your data center from within.
Posted: 21 Apr 2015 | Published: 04 Mar 2015

VMware

Advancing Cyber-Security Measures Inside
sponsored by VMware
RESOURCE: In this infographic, discover how to secure your network and data center from the inside and bolster your existing perimeter defenses.
Posted: 20 Apr 2015 | Published: 11 Dec 2014

VMware

The Paradigm Shift in Cybersecurity
sponsored by UnitedLex
WHITE PAPER: This white paper explores why hackers have the upper hand and why organizations need to ramp up security measures regardless of their current status.
Posted: 13 Apr 2015 | Published: 08 Oct 2014

UnitedLex

Online Retailers: Get Specific When Defending Against Price-Scraping Bots
sponsored by Distil Networks
WHITE PAPER: This white paper explains the fine print details about bots and strategies to mitigate them. Access now to learn more.
Posted: 10 Apr 2015 | Published: 11 Mar 2015

Distil Networks

It’s Not Just an IT Affair: Understanding the Risks of Cyber Breaches
sponsored by UnitedLex
WHITE PAPER: This white paper explains why today's cyber threats and compliance regulations require multi-disciplinary expertise and a strategic mindset that extends across the entire enterprise.
Posted: 09 Apr 2015 | Published: 31 Dec 2014

UnitedLex

Using Threat Intelligence to Manage Risk
sponsored by Anomali
EGUIDE: As threats and attackers continue to advance at a rapid pace, threat intelligence has become crucial. Discover the benefits of adding threat intelligence to an established information security program.
Posted: 09 Apr 2015 | Published: 09 Apr 2015

Anomali

Cyberthreat Defense Report
sponsored by Blue Coat Systems
WHITE PAPER: This report, which focuses specifically on IT security management, uses research to reveal what areas of security you should turn your attention to.
Posted: 08 Apr 2015 | Published: 08 Apr 2015

Blue Coat Systems

Cybercrime 101
sponsored by Global Knowledge
WHITE PAPER: Discover the ways in which cybercrime occurs in three realms: individual, business, and governmental. Learn what you can do to protect yourself and your organization.
Posted: 27 Mar 2015 | Published: 27 Mar 2015

Global Knowledge

Markets and Bounties for Cybercrime Tools and Stolen Data
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper examines the fundamental characteristics of black and grey markets to offer understanding of the current and predicted security threat landscape.
Posted: 27 Mar 2015 | Published: 04 Dec 2014

Juniper Networks, Inc.

5 Steps to Designing a Next-Gen Firewall
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper offers a five step program to designing a next-gen firewall to keep out malicious attacks.  View now to learn more.
Posted: 26 Mar 2015 | Published: 20 Oct 2014

Juniper Networks, Inc.

Strengthen Desktop Virtualization Security by Minimizing Endpoint Attack Surfaces
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this white paper to explore why IT professionals are increasingly adopting desktop virtualization paired with thin client solutions to significantly reduce risks and improve protection at endpoints. Examine thin client solutions to help you select one that can best support enhanced endpoint security for your organization.
Posted: 19 Mar 2015 | Published: 19 Mar 2015

Dell, Inc. and Intel®

What Makes Two Security Programs Different?
sponsored by Prelert
WHITE PAPER: This blog post compares two anomaly detection programs and discussing their rate of false positives, ability to analyze multiple instances, and more. Read it now to discover how these two programs compare.
Posted: 19 Mar 2015 | Published: 04 Nov 2013

Prelert

Information Security Magazine: June Issue
sponsored by SearchSecurity.com
EZINE: In this issue of Information Security magazine, we look at how malware is adapting to virtual machines and strategies that can help organizations secure these environments.
Posted: 01 Jun 2015 | Published: 01 Jun 2015

SearchSecurity.com

Cybersecurity Lessons from 2014
sponsored by IBM
WHITE PAPER: In this special security report, discover what lessons can be learned from 2014's cyber-breaches to improve cybersecurity in 2015.
Posted: 17 Apr 2015 | Published: 31 Mar 2015

IBM

April Information Security - Defending Against the Digital Invasion
sponsored by SearchSecurity.com
EZINE: In this issue of Information Security magazine, we cover top cyberthreats and countermeasures to help organizations defend against new and evolving attack techniques.
Posted: 01 Apr 2015 | Published: 25 Mar 2015

SearchSecurity.com
151 - 175 of 516 Matches Previous Page    5 6 7 8 9 10    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement