IT Management  >   Systems Operations  >   Security  >  

Cybersecurity

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Cyber Security, Cyber Security Enhancement Act of 2002
DEFINITION: Information assurance, including information security, information technology disaster recovery, and information privacy. See Section 225, Cyber Security Enhancement Act of 2002, of the Homeland Security Act.
Cybersecurity Reports
176 - 200 of 699 Matches Previous Page  |  Next Page
Endpoint Security: Solving the Anti-virus Problem
sponsored by Sentinel Labs, Inc.
WHITE PAPER: With endpoints equating to a particularly juicy target for hackers, your organization must be prepared to counter the malicious attack techniques they utilize today, as well as into the future.
Posted: 06 Jul 2017 | Published: 06 Jul 2017

Sentinel Labs, Inc.

Ransomware Is Here: What Can You Do About It?
sponsored by Sentinel Labs, Inc.
WHITE PAPER: Ransomware is profitable and growing in popularity among hackers. Learn how to protect your enterprise by examining ransomware techniques and real-life examples.
Posted: 05 Jul 2017 | Published: 05 Jul 2017

Sentinel Labs, Inc.

How to Upgrade Your Endpoint Protection
sponsored by Sentinel Labs, Inc.
WHITE PAPER: 91% of successful data breaches start with attackers infecting an endpoint via a phishing attack. Learn why malicious actors are targeting endpoints, why they are particularly vulnerable, and how to stop your enterprise from falling prey.
Posted: 05 Jul 2017 | Published: 05 Jul 2017

Sentinel Labs, Inc.

What can CIOs do about the skills shortage in ASEAN?
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, read more about the issues that IT leaders are grappling with, and what efforts are being made to plug the talent gap. Plus, learn how one company has successfully transformed its HR operations using cloud-based software.
Posted: 03 Jul 2017 | Published: 04 Jul 2017

ComputerWeekly.com

Advanced Endpoint Protection Test Report
sponsored by Sentinel Labs, Inc.
WHITE PAPER: Join experts Thomas Skybakmoen and Morgan Dhanraj as they reveal independent test results of advanced endpoint protection with simulated malware, exploits, and blended threats.
Posted: 30 Jun 2017 | Published: 14 Feb 2017

Sentinel Labs, Inc.

Cybersecurity in the Age of Agile, DevOps, and AppDev
sponsored by Veracode, Inc.
WHITE PAPER: With cybersecurity becoming a chief issue among enterprises with high-profile attacks like WannaCry in the news, many enterprises are looking to shore up their defenses and mitigate vulnerabilities. Discover why app security (AppSec) is one of the leading issues.
Posted: 27 Jun 2017 | Published: 27 Jun 2017

Veracode, Inc.

Ransomware: Disaster-proof Your Data With an API
sponsored by Rubrik
WHITE PAPER: Many enterprises look to disaster recovery and backup to protect them (they can't ransom data you have a secure copy of), but that's easier said than done. Discover 6 backup tips to help protect your company from ransomware.
Posted: 27 Jun 2017 | Published: 27 Jun 2017

Rubrik

Protecting Sensitive Corporate Data Against the Full Spectrum of Mobile Risk
sponsored by Lookout
WEBCAST: Download this webcast to discover a full EMM platform that will protect sensitive corporate data against the full spectrum of mobile risks, from software vulnerabilities to behavior and configuration threats.
Posted: 26 Jun 2017 | Premiered: Jun 6, 2017

Lookout

Computer Weekly – 27 June 2017: Will mobile networks cope with the end of roaming charges?
sponsored by ComputerWeekly.com
EZINE: Download this issue of Computer Weekly to discover how the industry must face up to the challenges of implementing the new rules, around mobile roaming charges.
Posted: 26 Jun 2017 | Published: 26 Jun 2017

ComputerWeekly.com

IoT & the Enterprise: Exploring Opportunities and Challenges in Asia
sponsored by ComputerWeekly.com
EGUIDE: Going by some industry estimates, the world will connect up 8.4 billion IoT devices by the end of 2017, a momentum that will continue through 2020 when 20.4 billion devices will be in use. Asia, home to two-thirds of the world's population, is expected to be the powerhouse driving global IoT developments.
Posted: 26 Jun 2017 | Published: 26 Jun 2017

ComputerWeekly.com

The Mobile Risk Matrix
sponsored by Lookout
RESOURCE: Download this mobile risk matrix to gain a deeper understanding of the prevalence and impact of mobile threats and vulnerabilities to your organizations' apps, devices, network, web and content.
Posted: 23 Jun 2017 | Published: 23 Jun 2017

Lookout

The Spectrum of Mobile Risk: Understanding the Full Range of Risks to Enterprise Data From Mobility
sponsored by Lookout
WHITE PAPER: Download this white paper to discover a mobile risk matrix that will help organizations understand the prevalence of mobile risk surrounding software vulnerabilities, mobile app threats, behavior and configurations and more.
Posted: 23 Jun 2017 | Published: 23 Jun 2017

Lookout

Key Issues for E-Discovery and Legal Compliance
sponsored by Smarsh
WHITE PAPER: Managers are often worried their organizations will be sued at some point, but most aren't adequately prepared to deal with e-discovery issues. In this Osterman Research report, uncover insight from the results of an in-depth survey of decision makers and influencers at mid-sized and large organizations.
Posted: 22 Jun 2017 | Published: 22 Jun 2017

Smarsh

5 Steps to Eradicate Text Messaging Risk
sponsored by Smarsh
WHITE PAPER: Prohibiting the use of text messages in your organization does not protect you from risk - it simply hides it. Discover 5 steps on how to leverage text messaging more in your organization as a legitimate communication channel while reducing your organization's compliance, legal and reputational risk.
Posted: 21 Jun 2017 | Published: 21 Jun 2017

Smarsh

2017 Electronic Communications Compliance Survey Report
sponsored by Smarsh
WHITE PAPER: With the growth in the number of allowed communication channels and the sheer volume of messages, compliance is struggling to keep up. Access this survey report to discover the top concerns about mobile communication, what compliance benefits improved archival methods can provide and more.
Posted: 21 Jun 2017 | Published: 21 Jun 2017

Smarsh

Gain Visibility into the Cloud with This Free Trial
sponsored by AlienVault
TRIAL SOFTWARE: Visibility into the cloud can be a challenge for businesses. Uncover how to detect threats in the cloud environment and access a 14-day free trial of AlienVault's USM Anywhere Sensor.
Posted: 21 Jun 2017 | Premiered: 21 Jun 2017

AlienVault

3 Ways Text Messaging Exposes Your Company to Massive Risk
sponsored by Smarsh
WHITE PAPER: Organizations often don't consider retention and oversight of texts, which exposes them to significant risk for compliance and litigation. Discover 3 massive risks for your enterprise carried by texting, and how to mitigate.
Posted: 20 Jun 2017 | Published: 20 Jun 2017

Smarsh

Digital Certificates: Ensure Security with This 2-step Process
sponsored by Blue Cedar
WHITE PAPER: Digital certificates can provide a secure second factor for authenticating connected mobile apps. Uncover how to leverage them to secure your mobile devices.
Posted: 19 Jun 2017 | Published: 19 Jun 2017

Blue Cedar

5 Steps to Take Backup from Good to Great
sponsored by SolarWinds, Inc.
WHITE PAPER: Faulty or inefficient backup strategies and technology can hamper your business dramatically. Access this resource to discover 5 steps to improve your backup strategy today.
Posted: 19 Jun 2017 | Published: 19 Jun 2017

SolarWinds, Inc.

Why Businesses Need a More Enlightened Approach to Phishing Attacks
sponsored by PhishMe
EGUIDE: Discover why your enterprise needs to take phishing seriously, 6 tactics these types of attacks utilize, how to teach your employees to recognize phishing, and security measures to take after an employee clicks on a malicious link.
Posted: 19 Jun 2017 | Published: 14 Jun 2017

PhishMe

Your expert guide to the highlights of Infosecurity Europe 2017
sponsored by ComputerWeekly.com
EGUIDE: Security technologist Bruce Schneier's insights and warnings around the regulation of IoT security and forensic cyber psychologist Mary Aiken's comments around the tensions between encryption and state security were the top highlights of the keynote presentations at Infosecurity Europe 2017 in London.
Posted: 19 Jun 2017 | Published: 19 Jun 2017

ComputerWeekly.com

What can CIOs do about the IT skills shortage in ANZ?
sponsored by ComputerWeekly.com
EGUIDE: CIOs in Australia and New Zealand, like their counterparts in other parts of the world, have been facing shortages in IT talent that have become more acute in recent years. In this e-guide, read more about IT talent issues in Oceania.
Posted: 19 Jun 2017 | Published: 19 Jun 2017

ComputerWeekly.com

What Should Happen after an Employee Clicks on a Malicious Link?
sponsored by Vircom
EGUIDE: What do you do if an employee clicks on a malicious link? The clock is already ticking. Inside this e-guide, expert Matthew Pascucci discusses how to handle the aftermath of an attack.
Posted: 30 Jun 2017 | Published: 28 Jun 2017

Vircom

EU GDPR Compliance puts Focus on Data Tracking, Encryption
sponsored by The Media Trust
EGUIDE: GDPR compliance is mandatory by May 25, 2018. Discover how encryption will be an overlooked but key part in compliance, as well as how to reduce risk by avoiding keeping more personal data than is necessary for business/legal needs.
Posted: 26 Jun 2017 | Published: 22 Jun 2017

The Media Trust

Study on the Cyber Resilient Organization: United Arab Emirates
sponsored by IBM Resilient
RESEARCH CONTENT: The Ponemon Institute takes a look at what 203 UAE IT security professionals have to say about their alignment of prevention, detection, and response capabilities to manage, mitigate, and move on from cyberattacks.
Posted: 22 Jun 2017 | Published: 22 Jun 2017

IBM Resilient
176 - 200 of 699 Matches Previous Page    6 7 8 9 10 11    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement