IT Management  >   Systems Operations  >   Security  >  

Cybersecurity

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Cyber Security, Cyber Security Enhancement Act of 2002
DEFINITION: Information assurance, including information security, information technology disaster recovery, and information privacy. See Section 225, Cyber Security Enhancement Act of 2002, of the Homeland Security Act.
CybersecurityReports
201 - 225 of 425 Matches Previous Page  | Next Page
Hidden Lynx: Professional Hackers for Hire
sponsored by Symantec Corporation
WHITE PAPER: In this white paper, uncover the facts behind security's most threatening presence, the Hidden Lynx group, which uses more sophisticated, targeted attacks, and has the ability to adapt to defense methods.
Posted: 28 Oct 2013 | Published: 17 Sep 2013

Symantec Corporation

Meeting Threats in Real-Time: Strategies for Enhanced SIEM
sponsored by LogRhythm, Inc.
WHITE PAPER: Access this resource for in-depth information about the need for more effective security information and event management (SIEM) due to the increasing number of advanced persistent threats (APTs) organizations face.
Posted: 10 Oct 2013 | Published: 10 Oct 2013

LogRhythm, Inc.

Top Five DNS Security Attack Risks and How to Avoid Them
sponsored by Infoblox
WHITE PAPER: Read this white paper to learn best practices and options for a hardened DNS layer that can minimize the risk of experiencing a DNS attack by identifying the symptoms and implementing a response faster.
Posted: 13 Sep 2013 | Published: 31 May 2013

Infoblox

How To Secure Online Activities
sponsored by Global Knowledge
WHITE PAPER: The Internet is not automatically a secure or safe place to be. However, if one system's security is more daunting to overcome than another's, then attackers might focus on the system that is easier to compromise.
Posted: 05 Sep 2013 | Published: 30 Jul 2013

Global Knowledge

Automation Suite for NERC CIP Compliance
sponsored by LogRhythm, Inc.
WHITE PAPER: Uncover how a particular NERC CIP compliance suite provides the tools and out-of-the-box assistance you need to address numerous NERC CIP requirements, including Electronic Security Perimeter, Incident Reporting and Planning, Vulnerability Detection, and many more.
Posted: 05 Sep 2013 | Published: 29 Mar 2013

LogRhythm, Inc.

Targeted attacks and how to defend against them
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Bob Tarzey and Louella Fernandes assess the scale and real impact of targeted attacks the measures being taken to defend against them.
Posted: 16 Aug 2013 | Published: 16 Aug 2013

ComputerWeekly.com

Search Security University: Cyber Security
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Join this SearchSecurity.com University for best practices on what do to about cyber threats against your business and how to be proactive in the face of creative and evolving adversaries.
Posted: 14 Aug 2013 | Premiered: 15 Aug 2013

SearchSecurity.com

Provide Better Visibility and Manageability across Network Security Tools
sponsored by WatchGuard Technologies, Inc.
ANALYST REPORT: Access this analyst report to explore what IT security professionals need in security tools given the significant growth of sophisticated cyber-attacks in an increasingly complex IT environment.
Posted: 30 Oct 2013 | Published: 30 Sep 2013

WatchGuard Technologies, Inc.

Longline Phishing: A New Class of Advanced Phishing Attacks
sponsored by Proofpoint, Inc.
WHITE PAPER: In this white paper, gain valuable information about longlining, the newest method in phishing attacks, and key recommendations for how to enhance your email security defense.
Posted: 28 Oct 2013 | Published: 31 Dec 2012

Proofpoint, Inc.

Symantec Intelligence Report - August 2013
sponsored by Symantec Corporation
WHITE PAPER: In this white paper, get the most recent analysis on cybersecurity threats and trends, and gain insight on what to expect in the future.
Posted: 21 Oct 2013 | Published: 31 Aug 2013

Symantec Corporation

Weaponized malware now threatens the private sector
sponsored by Lumension
WHITE PAPER: Access this resource for crucial information about the next class of advanced persistent threats (APT) and uncover how you can boost endpoint security management to reduce the risk of these attacks.
Posted: 15 Oct 2013 | Published: 12 Sep 2012

Lumension

Website Security Threat Report, Part Two
sponsored by Symantec Corporation
WHITE PAPER: This website security threat report focuses on the threats that impact your website and online business. Access this resource to understand the threat landscape and understand how you can protect your company and your infrastructure.
Posted: 14 Oct 2013 | Published: 11 Oct 2013

Symantec Corporation

Security Intelligence – Is Security a Battle You Can Win
sponsored by IBM
WHITE PAPER: This white paper details the need for IT teams to discover the benefits of security intelligence (SI), and how it can simplify the complex security environment for better security analytics.
Posted: 14 Oct 2013 | Published: 30 Jun 2011

IBM

Measuring End User Susceptibility and Defenses Against Phishing Attacks with CORE Insight
sponsored by Core Security Technologies
WHITE PAPER: This white paper contains critical information about spear phishing and how to prepare your users and systems from falling for these targeted attacks being masked as trustworthy content.
Posted: 11 Oct 2013 | Published: 11 Oct 2013

Core Security Technologies

IT Security. Fighting the Silent Threat
sponsored by Kaspersky Lab
WHITE PAPER: Kaspersky Lab experts are releasing new research designed to assist you in your cybersecurity business decisions. Download the report now to get quantifiable statistics about perceived versus real cyberattacks.
Posted: 09 Oct 2013 | Published: 09 Oct 2013

Kaspersky Lab

Moving Compliance Forward
sponsored by Tenable Network Security
EGUIDE: Read this expert e-guide and discover how analysts see big changes ahead around risk management. Managing partner at VerSprite, Tony Uceda Velez also explains how leveraging a threat model can re-energize your compliance strategy.
Posted: 08 Oct 2013 | Published: 08 Oct 2013

Tenable Network Security

Defense in Depth: Improve Your Threat and Vulnerability Management Programs
sponsored by Tenable Network Security
EGUIDE: SearchSecurity.com experts, Diana Kelley and Matthew Pascucci bring to you in this e-guide, five simple tips to improve your enterprise's threat and vulnerability programs and layered security, explaining how to apply defense-in-depth principles toward ultra-redundant networks.
Posted: 07 Oct 2013 | Published: 07 Oct 2013

Tenable Network Security

Three Mistakes Companies Make When It Comes to Vulnerability Management
sponsored by Core Security Technologies
WHITE PAPER: In this resource, get 3 self-assessment questions to establish whether or not your approach to vulnerability management is truly successful at mitigating future security risks.
Posted: 07 Oct 2013 | Published: 07 Oct 2013

Core Security Technologies

Rethinking Your Enterprise Security
sponsored by Hewlett-Packard Company
WHITE PAPER: If you stop to ask yourself how your security strategy is doing, more likely than not you'd say it's going fine, right? This resource is a prime opportunity to conduct a personal security report card to double check that all of your security i's are dotted and t's crossed.
Posted: 30 Sep 2013 | Published: 31 May 2012

Hewlett-Packard Company

Outcome Based Security Monitoring in a Continuous Monitoring World
sponsored by Tenable Network Security
WHITE PAPER: In this white paper, you will discover a five step approach that can help commercial and government organizations achieve their goals of continuous monitoring programs. Learn how this approach leverages distributed scanning, sniffing and log analysis to perform flexible, scalable and near real-time vulnerability detection for any size of network.
Posted: 27 Sep 2013 | Published: 31 Dec 2012

Tenable Network Security

Building An Intelligence - Driven Security Operations Center
sponsored by EMC Corporation
WHITE PAPER: Access this white paper for insider tips on rapid cyber threat detection and remediation as well as how to coordinate technologies, personnel, and processes for better security.
Posted: 26 Sep 2013 | Published: 28 Feb 2013

EMC Corporation

Symantec Website Security Threat Report
sponsored by Symantec Corporation
WHITE PAPER: This document is a reference to understanding the threat landscape and how you can protect your company and your infrastructure.
Posted: 09 Sep 2013 | Published: 09 Sep 2013

Symantec Corporation

Reducing Security Complexity
sponsored by Optus Business
VIDEO: In this webcast, you will be provided with a high level overview of the emerging threats within the Australian security landscape and how these affect midsized organisations.
Posted: 04 Sep 2013 | Premiered: 27 Aug 2013

Optus Business

September Information Security Magazine
sponsored by SearchSecurity.com
EZINE: Industry experts explore key developments that define next-generation firewalls from application awareness to domain-reputation-management, intrusion prevention techniques, and protecting virtual machines. Also uncover the latest global risk assessment that predicts investments in security will finally lead spending in years to come.
Posted: 30 Aug 2013 | Published: 30 Aug 2013

SearchSecurity.com

Top 5 DNS Security Attack Risks and How to Avoid Them
sponsored by Infoblox
WHITE PAPER: This paper will highlight how traditional DNS infrastructure deployments can actually increase the risks of DNS attacks. Read this white paper to learn best practices and options for a hardened DNS layer that can minimize the risk of experiencing a DNS attack by identifying the symptoms and implementing a response faster.
Posted: 15 Aug 2013 | Published: 31 May 2013

Infoblox
201 - 225 of 425 Matches Previous Page    7 8 9 10 11 12    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement