IT Management  >   Systems Operations  >   Security  >  

Cybersecurity

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Cyber Security, Cyber Security Enhancement Act of 2002
DEFINITION: Information assurance, including information security, information technology disaster recovery, and information privacy. See Section 225, Cyber Security Enhancement Act of 2002, of the Homeland Security Act.
Cybersecurity Reports
26 - 50 of 532 Matches Previous Page  |  Next Page
3 Common Password Policy Mistakes
sponsored by Specops Software
RESOURCE: Most organizations don't have adequate password policy requirements. Take a look at the 3 common password policy mistakes that your organization might be making.
Posted: 17 Apr 2017 | Published: 29 Jul 2016

Specops Software

User and Entity Behavior Analytics for McAfee Enterprise Security Manager
sponsored by McAfee, Inc.
WHITE PAPER: This document provides an overview of core UEBA capabilities available in McAfee Enterprise Security Manager and introduces the many partners whose products are tightly integrated and certified with this security platform.
Posted: 11 Apr 2017 | Published: 31 Mar 2017

McAfee, Inc.

Cyber security in the Middle East
sponsored by ComputerWeekly.com
EGUIDE: As organisations increase their reliance on IT through rapid digital transformations, the threat of cyber attack grows. It is not just western countries such as the US and the UK that are being targeted by hackers, as the rapidly developed and wealthy nations of the Middle East become targets of both politically and financially driven attacks.
Posted: 11 Apr 2017 | Published: 11 Apr 2017

ComputerWeekly.com

Focus ASEAN: Security & Digital Transformation
sponsored by ComputerWeekly.com
EGUIDE: With cyber threats and attacks making headlines almost every day, governments and enterprises in Southeast Asia are placing greater emphasis on shoring up their cyber defenses, more so as they transform their economies digitally.
Posted: 10 Apr 2017 | Published: 11 Apr 2017

ComputerWeekly.com

Compliance and Beyond: Future-Proofing Your Password Policy
sponsored by Specops Software
WHITE PAPER: This white paper digs down into a variety of password security best practices to determine which established methods are still relevant. Learn how to improve password management with new best practices designed for modern compliance.
Posted: 07 Apr 2017 | Published: 07 Apr 2017

Specops Software

Focus ANZ: Security & Digital Transformation
sponsored by ComputerWeekly.com
EGUIDE: With cyber threats and attacks making headlines almost every day, cyber security has now become a key focus of many governments and enterprises all over the world. In this e-guide, read about the new measures the Australian government is putting in placeto protect critical systems from cyber attacks.
Posted: 07 Apr 2017 | Published: 07 Apr 2017

ComputerWeekly.com

Security Insights Magazine: 3 Accelerating Cybersecurity Trends
sponsored by DynTek
RESOURCE: In this resource, Intel's VP and CTO, Brett Kelsey, gives an in-depth interview on today's must-know cybersecurity trends. Additionally you'll learn how to forge a risk-based security strategy and where you cybersecurity gaps are.
Posted: 03 Apr 2017 | Published: 30 Dec 2016

DynTek

What is Enterprise Mobile Security?
sponsored by Lookout
EBOOK: Download this eBook to find out why EMM and MDM are not enough to ensure a secure mobile enterprise and understand where the fault lies in today's EMM/MDM initiatives.
Posted: 31 Mar 2017 | Published: 31 Mar 2017

Lookout

Augmented Intelligence Slashes Mobile and Endpoint Vulnerabilities
sponsored by IBM
WHITE PAPER: Learn how augmented intelligence and cognitive technology, as part of a UEM, can improve mobile security and reduce vulnerabilities, increase workforce productivity, help your organization make more informed decisions, and more.
Posted: 30 Mar 2017 | Published: 30 Mar 2017

IBM

Micro-segmentation: Security for Every Data Center
sponsored by VMware
WHITE PAPER: Firewalls are a security strategy that companies are discovering is wholly inadequate against today's sophisticated cyberattacks. To defend against cyberattacks, today's enterprises need a sophisticated approach to data center security. In this white paper, learn about a new approach to data center security designed for current threats.
Posted: 28 Mar 2017 | Published: 30 Sep 2016

VMware

Wright State University Expels Email Threats and Minimizes Risks with a Proactive Defense
sponsored by Proofpoint, Inc.
CASE STUDY: Wright State University faced a huge challenge in securing email and other communications, due to their highly transient student body of 18,000. In this concise case study, learn how the university was able to meet email and web security challenges like phishing, ransomware and malware.
Posted: 15 Mar 2017 | Published: 30 Dec 2016

Proofpoint, Inc.

Cyber risks in maritime container terminals: Analysis of threats and simulation of impacts
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security series explains why container terminals are vulnerable to cyber attacks, and recommends a technique for identifying and prioritising those vulnerabilities.
Posted: 15 Mar 2017 | Published: 15 Mar 2017

ComputerWeekly.com

How Enterprise Security Leaders are Now Forced to Address Top Security Threats
sponsored by Fortinet, Inc.
WHITE PAPER: Today's IT threat landscape is expanding, and new areas are at risk that businesses have never had to worry about before. This white paper identifies 5 cyberthreat areas that are putting organizations at risk today, as well as some steps you can take to minimize the danger they pose.
Posted: 15 Mar 2017 | Published: 15 Mar 2017

Fortinet, Inc.

Cyber-physical attacks: Dawn of a new age in cyber-warfare?
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series explores the application of cyber power in international relations
Posted: 14 Mar 2017 | Published: 14 Mar 2017

ComputerWeekly.com

CW ASEAN March 2017: Raising national security standards
sponsored by TechTarget ANZ
EZINE: In this month's CW ASEAN, we describe how Singapore is improving its cyber security defenses and preparations through a partnership with British security company BAE Systems.
Posted: 10 Mar 2017 | Published: 09 Mar 2017


CW ANZ March 2017: Take cover from cyber threats
sponsored by TechTarget ANZ
EZINE: In the latest issue of CW ANZ we focus on security, with analysis of why Australian organisations are not sold on cyber insurance.
Posted: 10 Mar 2017 | Published: 09 Mar 2017


CW Europe – March 2017
sponsored by ComputerWeekly.com
EZINE: Technology advancements in recent years have brought about huge social challenges. Artificial intelligence and big data, for example, have gained the serious attention of policy makers across the world.
Posted: 06 Mar 2017 | Published: 09 Mar 2017

ComputerWeekly.com

Computer Weekly – 7 March 2017: Industrial control systems pose big risk to security
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine the risks to national infrastructure from vulnerabilities in industrial control systems. DevOps is growing in popularity – we find out about the organisational, process and cultural approaches to make it succeed. And we ask CIOs how they are becoming hybrid IT and digital leaders. Read the issue now.
Posted: 06 Mar 2017 | Published: 07 Mar 2017

ComputerWeekly.com

ASEAN CIO Trends 2017 #1
sponsored by ComputerWeekly.com
EGUIDE: There are two things that keep CIOs awake at night – data breaches that affect the reputation of their firms, and the need to better understand customer needs. Against this backdrop, CIOs can no longer be content with keeping the lights on. In this e-guide, find out what it takes for CIOs to succeed in 2017.
Posted: 05 Mar 2017 | Published: 06 Mar 2017

ComputerWeekly.com

ANZ CIO Trends 2017 #1
sponsored by ComputerWeekly.com
EGUIDE: There are two things that keep CIOs awake at night – data breaches that affect the reputation of their firms, and the need to better understand customer needs. Against this backdrop, CIOs can no longer be content with keeping the lights on. Read how CIOs in Australia/New Zealand are demonstrating the value of IT within their organisation.
Posted: 05 Mar 2017 | Published: 05 Mar 2017

ComputerWeekly.com

Artificial Intelligence and Machine Learning: Cybersecurity Advances
sponsored by SearchSecurity.com
EZINE: In this issue of Information Security magazine, we look at machine learning in security and how recent advances may bolster your defenses.
Posted: 01 Mar 2017 | Published: 01 Mar 2017

SearchSecurity.com

The Ultimate Guide to Cybersecurity to Drive Profitability
sponsored by Cisco Systems, Inc.
EBOOK: This e-book explores how to turn cybersecurity success into a true competitive advantage that enables faster innovation. Discover how to secure your network to prevent costly downtime, equipment damage, compliance issues and more. Plus, learn how to leverage threat intelligence to bolster malware defense and improve network visibility.
Posted: 01 Mar 2017 | Published: 31 Dec 2016

Cisco Systems, Inc.

In 2017, the insider threat epidemic begins
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Cyber security resiliency depends on detecting, deterring and mitigating insider threats. This report from the Institute for Critical Infrastructure Technology assesses the risks and potential solutions.
Posted: 27 Feb 2017 | Published: 28 Feb 2017

ComputerWeekly.com

Hacking the Human Operating System
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Cyber attackers often bypass the consciousness of their targets and attempt to manipulate victims through subconscious influences. This report from Intel Security offers advice on how to mitigate these risks.
Posted: 27 Feb 2017 | Published: 27 Feb 2017

ComputerWeekly.com

The Current State of Blockchain Compliance
sponsored by BAE Systems Applied Intelligence
EGUIDE: In this expert e-guide, we examine blockchains and how they're affecting digital enterprise assets and cybersecurity. Discover how these distributed ledgers relate to Bitcoin and data security. Plus, learn how blockchain innovation and apps like smart contracts are affecting compliance.
Posted: 01 Mar 2017 | Published: 24 Feb 2017

26 - 50 of 532 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement