IT Management  >   Systems Operations  >   Security  >  

Cybersecurity

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Cyber Security, Cyber Security Enhancement Act of 2002
DEFINITION: Information assurance, including information security, information technology disaster recovery, and information privacy. See Section 225, Cyber Security Enhancement Act of 2002, of the Homeland Security Act.
Cybersecurity Reports
226 - 250 of 792 Matches Previous Page  |  Next Page
Compliance in Full Throttle in 2017
sponsored by Rsam
EGUIDE: According to the TechTarget IT Priorities 2017 survey, nearly two-thirds of respondents reported that their organizations plan to implement compliance initiatives this year. Inside this e-guide uncover why compliance is in full throttle in 2017 and the benefits of compliance and information governance process alignment.
Posted: 27 Jul 2017 | Published: 21 Jul 2017

Rsam

4 Key Considerations for Securing Operation Technology in the Oil & Gas Industry
sponsored by Bayshore Networks
WHITE PAPER: The Industrial Internet of Things (IIoT) is revolutionizing the manufacturing industry – but also opens the door to cyber threats. Learn about the opportunities and risks created, and the need for securing the operation technology environment. Plus, discover 4 key considerations to protect industrial assets against cyber threats.
Posted: 27 Jul 2017 | Published: 02 Jul 2017

Bayshore Networks

Product Overview: 30 Minutes to a More Secure Enterprise
sponsored by Cisco Umbrella
WHITE PAPER: DNS-layer security offers a first line of defense for your company – DNS request proceed internet activity, after all. But which DNS security is right for you? In this product overview, discover how implementing Cisco Umbrella can help you improve your company's security.
Posted: 26 Jul 2017 | Published: 26 Jul 2017

Cisco Umbrella

2017 Application Security Report
sponsored by WhiteHat Security
WHITE PAPER: With so many cyberattacks targeting the app layer, securing it is vital to your organization's digital transformation. Inside this, 2017 application security report discover 60 pages of detailed app security data.
Posted: 25 Jul 2017 | Published: 25 Jul 2017

WhiteHat Security

Continuous Application Security Testing Benefits
sponsored by WhiteHat Security
WHITE PAPER: Security scrutiny is heavier than ever for financial services. Learn 4 benefits of properly deployed continuous application security testing can give your organization to help shine under the current environment of scrutiny.
Posted: 25 Jul 2017 | Published: 25 Jul 2017

WhiteHat Security

Getting Started with Cloud IAM Services
sponsored by OneLogin
EGUIDE: In this e-guide learn how to get started with IAM services in the cloud, as well as what you need to know about cloud IAM before implementation.
Posted: 24 Jul 2017 | Published: 19 Jul 2017

OneLogin

Closing the Cloud Security Readiness Gap
sponsored by HyTrust
WEBCAST: Discover why security readiness lags behind adoption in the cloud and what can be done to mitigate the vulnerability and risk that creates.
Posted: 24 Jul 2017 | Premiered: Jul 24, 2017

HyTrust

SANS 2016 Survey on Security and Risk
sponsored by WhiteHat Security
WHITE PAPER: Financial service organizations are successfully attacked more than any other type of cybercrime victim. Discover how and why they are attacked, how prepared they are, and what steps are being taken to mitigate their risk.
Posted: 24 Jul 2017 | Published: 24 Jul 2017

WhiteHat Security

When the State of Security Makes You WannaCry
sponsored by WhiteHat Security
WHITE PAPER: WannaCry was a worm, a kind of attack that was thought to be obsolete. So why was it one of the largest and most effective cyberattacks in recent memory? Discover why so many organizations were vulnerable, and what you can do to protect your organization from future attacks.
Posted: 24 Jul 2017 | Published: 24 Jul 2017

WhiteHat Security

Top 10 Encryption Benefits
sponsored by HyTrust
WHITE PAPER: Encryption, handled poorly, can lead to more vulnerabilities than it solves. Discover 10 benefits of properly deployed encryption.
Posted: 24 Jul 2017 | Published: 24 Jul 2017

HyTrust

Ransomware: 4 Ways to Protect Data Now
sponsored by Citrix
WHITE PAPER: Ransomware is a very real threat, seemingly in the news everyday with attacks like WannaCry. Uncover 4 steps to reduce exposure to ransomware attacks, and to minimize its impact in the event of an attack.
Posted: 21 Jul 2017 | Published: 21 Jul 2017

Citrix

Achieve GDPR Readiness with Secure App and Data Delivery
sponsored by Citrix
WHITE PAPER: GDPR is coming fast, and non-compliance can cripple businesses with heavy fines expected. Ensure your company isn't among those failing to comply. Discover how to achieve GDPR readiness and compliance by enabling IT to create a software-defined perimeter.
Posted: 21 Jul 2017 | Published: 21 Jul 2017

Citrix

Closing the Cloud and Virtualization Security Gap
sponsored by HyTrust
WHITE PAPER: Many organizations haven't had the time to gain full familiarity with their virtualized environments. Discover how to gain control over virtualized systems so you can secure and manage your data, as well as ensure that virtualized servers and networks are in compliance.
Posted: 20 Jul 2017 | Published: 20 Jul 2017

HyTrust

Your Guide to HIPAA Compliance for Containers
sponsored by Twistlock, Inc.
WHITE PAPER: With the advent of microservices it is likely that many new healthcare apps are being built with containers. Discover how to achieve compliance with the HIPAA Security Rule for containerized workloads for healthcare apps.
Posted: 20 Jul 2017 | Published: 20 Jul 2017


Your Guide to Vendor Risk Management Visibility
sponsored by Rsam
WHITE PAPER: Don't end up in the headlines because a vulnerable vendor exposed your data to risk. Learn how to solve the vendor risk equation and mitigate the threat they pose to your organization.
Posted: 19 Jul 2017 | Published: 19 Jul 2017

Rsam

Securing the Cloud for the Modern Enterprise
sponsored by OneLogin
EBOOK: In this extensive, 47-page e-book explore how identity management can streamlines access to the cloud while protecting corporate data, reducing dependence on IT, and minimizing disruption.
Posted: 19 Jul 2017 | Published: 13 Jul 2017

OneLogin

The Top Cyber Security Trends in ANZ in 2017
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, read about Australia's plan for getting technology suppliers and service providers to decrypt encrypted messages, why threat intelligence is more than just ingesting data feeds into a security system and the risks that shadow IT can bring to organisations in Australia and New Zealand.
Posted: 19 Jul 2017 | Published: 19 Jul 2017

ComputerWeekly.com

4 Critical Elements of a Successful GRC Implementation
sponsored by Rsam
WHITE PAPER: The GRC landscape is changing quickly, are you ready to adapt? Explore these 4 critical elements of a successful GRC implementation and see what they can do for your organization.
Posted: 18 Jul 2017 | Published: 18 Jul 2017

Rsam

The Case for Cloud-Based IAM
sponsored by OneLogin
WHITE PAPER: What's the future of IAM? Is it on the cloud? What are the benefits? IAM expert David Meyer discusses why traditional IAM is no longer sufficient for enterprises today and how cloud-based IAM can meet your organization's security needs.
Posted: 18 Jul 2017 | Published: 18 Jul 2017

OneLogin

7 Ways to Improve Your Security Incident Response
sponsored by Rsam
WHITE PAPER: There are many reasons incident response programs may not succeed, including lack of process maturity and poor data quality. Uncover 7 key concepts for implementing a successful incident response platform.
Posted: 18 Jul 2017 | Published: 18 Jul 2017

Rsam

How to Secure Your Organization's Data in SaaS Apps
sponsored by OneLogin
WHITE PAPER: According to Cisco, IT departments are only aware of about 7% of their company's cloud app usage, leading to a massive security blind spot. Discover 10 steps on how to track sensitive corporate data in third-party SaaS apps and ensure that only the right people have the right level of access to it.
Posted: 17 Jul 2017 | Published: 17 Jul 2017

OneLogin

6 Ways to Keep Your Endpoint Devices Secure
sponsored by Sentinel Labs, Inc.
EGUIDE: Endpoint devices are often the root cause of data breaches but finding the best endpoint security for your enterprise is a complex, ever-changing task. In this e-guide, experts Kevin Tolly and Eric Cole uncover 6 ways to improve endpoint device security and what features to focus on in your search for an endpoint security tool.
Posted: 27 Jul 2017 | Published: 26 Jul 2017

Sentinel Labs, Inc.

Ransomware and Cloud Security: Keys to Stop the Threat
sponsored by Cisco Umbrella
EGUIDE: Highly complex threats are targeting corporate assets and resources every day. In this e-guide, security expert Kevin Beaver reveals 5 ways to prevent a ransomware infection through network security and assistant editor Kathleen Casey explores 5 ways to fend off cloud security threats.
Posted: 27 Jul 2017 | Published: 24 Jul 2017

Cisco Umbrella

Securing DNS: What to Do, and What to be Aware of
sponsored by Cisco Umbrella
EGUIDE: In order to understand how DNS attacks work, it is important to understand DNS security weaknesses. In this e-guide, security pros Peter Wenham and Vladimir Jirasek reveal best practices and recommendations for securing DNS and staying ahead of its vulnerabilities.
Posted: 27 Jul 2017 | Published: 24 Jul 2017

Cisco Umbrella

Turn the Web from a Security Risk into an Asset
sponsored by Authentic8, Inc.
WHITE PAPER: Just being on a web browser can put your organization at risk. But forgoing web access is out of the question. Discover how browser isolation could improve your organization's security posture.
Posted: 25 Jul 2017 | Published: 25 Jul 2017

Authentic8, Inc.
226 - 250 of 792 Matches Previous Page    8 9 10 11 12 13    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement