IT Management  >   Systems Operations  >   Security  >  

Cybersecurity

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Cyber Security, Cyber Security Enhancement Act of 2002
DEFINITION: Information assurance, including information security, information technology disaster recovery, and information privacy. See Section 225, Cyber Security Enhancement Act of 2002, of the Homeland Security Act.
Cybersecurity Reports
201 - 225 of 565 Matches Previous Page  |  Next Page
City of Lewiston Improves Threat Detection
sponsored by AlienVault
WHITE PAPER: This white paper tells the story of how the IT managers for the City of Lewiston found a security intelligence tool that worked for them, keeping their network secure without incurring additional costs or requiring additional manpower.
Posted: 26 Oct 2015 | Published: 26 Oct 2015

AlienVault

Accelerate Office 365 Adoption with Security and Compliance Controls
sponsored by Proofpoint, Inc.
WHITE PAPER: Learn how you can address security and compliance gaps in Office 365 to make your Office 365 adoption faster, easier and, most importantly, safer.
Posted: 21 Oct 2015 | Published: 10 Mar 2015

Proofpoint, Inc.

Technology Offers Convenience, Privacy Pays the Price
sponsored by Global Knowledge
WHITE PAPER: Technology is a wonderful thing, but it comes with a price: your privacy. This white paper can help you learn more about what kind of personal data is collected by web sites and applications, and how to secure your information online.
Posted: 20 Oct 2015 | Published: 20 Oct 2015

Global Knowledge

Are You Ready for a New Era of Risk?
sponsored by Global Knowledge
WHITE PAPER: In this age of sophisticated threats, security awareness and training is essential for everyone within an organization. Access this white paper to learn how Cisco has continued to evolve its security solutions and training.
Posted: 19 Oct 2015 | Published: 19 Oct 2015

Global Knowledge

Insider Threat Report 2015
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This survey of 500 cyber security professionals offers insight into the state of insider threats and solutions to prevent them.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

ComputerWeekly.com

Data Breaches: What Can and Cannot Be Done
sponsored by Global Knowledge
WHITE PAPER: This white paper discusses the inevitability of data breaches and gives tips for staying as secure as possible in an insecure threat environment.
Posted: 11 Aug 2015 | Published: 11 Aug 2015

Global Knowledge

Unified Security Management vs. SIEM: A Technical Comparison
sponsored by AlienVault
WHITE PAPER: What's wrong with SIEM? This white paper explores why SIEM solutions have been proven to be less effective than their vendors claim, and provides you with an alternative solution to securing your enterprise.
Posted: 10 Jul 2015 | Published: 10 Jul 2015

AlienVault

The Changing Face of Security Management
sponsored by Global Knowledge
WHITE PAPER: Access this white paper to learn how you can implement a threat based, network cognizant security system that is prepared for the constantly changing landscape of security.
Posted: 02 Jul 2015 | Published: 02 Jul 2015

Global Knowledge

Network Forensics for Attack Mitigation
sponsored by Global Knowledge
WHITE PAPER: This white paper explains how network forensics are emerging as a key solution to limiting the damage of network malware attacks.
Posted: 01 Jul 2015 | Published: 01 Jul 2015

Global Knowledge

10 Things Security Experts Wish End Users Knew
sponsored by Global Knowledge
WHITE PAPER: In this white paper, you'll learn the 10 concerns that security experts want end users to know about security at work and at home.
Posted: 01 Jul 2015 | Published: 01 Jul 2015

Global Knowledge

UK 2015 Cyber Risk Survey Report
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Many UK firms are failing to adequately assess their customers and trading partners for cyber risk, Marsh's UK Cyber Risk Survey reveals.
Posted: 23 Jun 2015 | Published: 23 Jun 2015

ComputerWeekly.com

When Minutes Count:How to Fight Advanced Threats with Real-Time SIEM
sponsored by Intel Security
WHITE PAPER: This report assesses organizations' abilities to detect and deflect targeted attacks, reveals the top eight most critical indicators of attack, and examines best practices for proactive incident response, including use of real-time SIEM solutions.
Posted: 22 Oct 2015 | Published: 31 Dec 2014

Intel Security

Special Report: Best Practices for Incident Response
sponsored by Intel Security
WHITE PAPER: The SANS 2015 Incident Response survey results reveals an increasingly complex response landscape and the need for automation of processes and services to provide both visibility across systems and best avenues of remediation. Read this paper for coverage of these issues, along with best practices and sage advice.
Posted: 22 Oct 2015 | Published: 31 Aug 2015

Intel Security

"Hacking as a Service," and Other Emerging Threats
sponsored by SearchSecurity.com
EZINE: Lethal threats to enterprise security are emerging from every which way. Access this exclusive edition of Information Security Magazine to learn just what you're up against.
Posted: 12 Oct 2015 | Published: 12 Oct 2015

SearchSecurity.com

State of File Collaboration Security
sponsored by FinalCode
WHITE PAPER: Access this research report on file collaboration security for insights into file data leakage risks, security processes and control maturity, perceived cloud-based file platform threats, and more.
Posted: 08 Oct 2015 | Published: 08 Oct 2015

FinalCode

Secure, Efficient File-Sharing
sponsored by FinalCode
VIDEO: This brief video looks at a security system that keeps files safe without altering the way employees share them.
Posted: 05 Oct 2015 | Premiered: 29 May 2015

FinalCode

5 Reasons to Adopt a Managed Security Service
sponsored by MASERGY
WHITE PAPER: Could manages security service providers (MSSPs) be the answer to this conundrum? This white paper discusses the benefits of adopting an MSSP, listing 5 key reasons how they can improve your cyber defenses.
Posted: 21 Sep 2015 | Published: 21 Sep 2015

MASERGY

File Sharing Insecurity: The Final Data Leakage Frontier
sponsored by FinalCode
WEBCAST: In this webinar, discover how you can strengthen security for you shared files without staunching innovation and collaboration.
Posted: 21 Sep 2015 | Premiered: Oct 8, 2015

FinalCode

Security Questions CEOs Should be Asking
sponsored by MASERGY
WHITE PAPER: This infographic highlights three of the most basic questions that you should be asking yourself about your security.
Posted: 17 Sep 2015 | Published: 17 Sep 2015

MASERGY

The Enterprise Security Checklist
sponsored by MASERGY
RESOURCE: This resource presents a seven-step checklist for building rigorous and effective cybersecurity that can combat today's advanced threats.
Posted: 14 Sep 2015 | Published: 15 Jul 2015

MASERGY

Quick Guide to Network Anomaly Detection
sponsored by Prelert
WHITE PAPER: This brief white paper details the two types of anomaly scores and how they are manifested. Continue reading now to learn how to use each score as an indicator for proactive alerting.
Posted: 10 Aug 2015 | Published: 30 Jul 2015

Prelert

Detecting Hidden Network Attacks Before a Breach
sponsored by Prelert
WHITE PAPER: This white paper explores a proactive approach to mitigating modern day cyber security threats and detecting attacks as they enter the network.
Posted: 07 Aug 2015 | Published: 15 Jul 2015

Prelert

Up-to-the-Minute Global Threat Intelligence
sponsored by IBM
WEBCAST: In this webcast, you'll learn how stay informed with up to the minute cybercrime attack information.
Posted: 30 Jul 2015 | Premiered: Jul 17, 2015

IBM

Information Security Asean July 2015
sponsored by TechTarget ANZ
EZINE: Cyber-crime is a global phenomenon. No business is safe if they fail to implement the right security products and policies.
Posted: 07 Jul 2015 | Published: 07 Jul 2015


Information Security ANZ July 2015
sponsored by TechTarget ANZ
EZINE: Analysts and security experts discuss the current risk factors in the ANZ region.
Posted: 07 Jul 2015 | Published: 07 Jul 2015

201 - 225 of 565 Matches Previous Page    7 8 9 10 11 12    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement