IT Management  >   Systems Operations  >   Security  >  

Cybersecurity

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Cyber Security, Cyber Security Enhancement Act of 2002
DEFINITION: Information assurance, including information security, information technology disaster recovery, and information privacy. See Section 225, Cyber Security Enhancement Act of 2002, of the Homeland Security Act.
Cybersecurity Reports
26 - 50 of 630 Matches Previous Page  |  Next Page
The Top Cyber Security Trends in ANZ in 2017
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, read about Australia's plan for getting technology suppliers and service providers to decrypt encrypted messages, why threat intelligence is more than just ingesting data feeds into a security system and the risks that shadow IT can bring to organisations in Australia and New Zealand.
Posted: 19 Jul 2017 | Published: 19 Jul 2017

ComputerWeekly.com

4 Critical Elements of a Successful GRC Implementation
sponsored by Rsam
WHITE PAPER: The GRC landscape is changing quickly, are you ready to adapt? Explore these 4 critical elements of a successful GRC implementation and see what they can do for your organization.
Posted: 18 Jul 2017 | Published: 18 Jul 2017

Rsam

The Case for Cloud-Based IAM
sponsored by OneLogin
WHITE PAPER: What's the future of IAM? Is it on the cloud? What are the benefits? IAM expert David Meyer discusses why traditional IAM is no longer sufficient for enterprises today and how cloud-based IAM can meet your organization's security needs.
Posted: 18 Jul 2017 | Published: 18 Jul 2017

OneLogin

IAM: On-Premises vs. IDaaS Delivery
sponsored by OneLogin
WHITE PAPER: Which is better for your organization: on-premises IAM or IDaaS? This Gartner report can provide valuable insight into which one may be best for you.
Posted: 18 Jul 2017 | Published: 18 Jul 2016

OneLogin

7 Ways to Improve Your Security Incident Response
sponsored by Rsam
WHITE PAPER: There are many reasons incident response programs may not succeed, including lack of process maturity and poor data quality. Uncover 7 key concepts for implementing a successful incident response platform.
Posted: 18 Jul 2017 | Published: 18 Jul 2017

Rsam

How to Secure Your Organization's Data in SaaS Apps
sponsored by OneLogin
WHITE PAPER: According to Cisco, IT departments are only aware of about 7% of their company's cloud app usage, leading to a massive security blind spot. Discover 10 steps on how to track sensitive corporate data in third-party SaaS apps and ensure that only the right people have the right level of access to it.
Posted: 17 Jul 2017 | Published: 17 Jul 2017

OneLogin

Computer Weekly – 18 July 2017: Airbus secures critical infrastructure
sponsored by ComputerWeekly.com
EZINE: This week, Computer Weekly explores how to secure industrial control systems, which have often lagged behind the leading edge of IT security and pose serious risks to critical national infrastructure. Airbus believes that despite the vulnerabilities of individual components, industrial control systems as a whole are quite resilient.
Posted: 17 Jul 2017 | Published: 17 Jul 2017

ComputerWeekly.com

IAM Case Study: How to Maximize Your ROI and Security
sponsored by OneLogin
WHITE PAPER: Security and ROI don't have to be antagonistic. Learn how one company achieved a 482% ROI with their IAM over the course of three years, and more.
Posted: 17 Jul 2017 | Published: 17 Jul 2017

OneLogin

8 Best Practices to Ensure Compliance When Adopting Cloud Apps and Services
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Mitigating the risk shadow IT poses to your company is essential to ensuring compliance when adopting cloud apps and services. Discover 8 best practices that can help you avoid remediation costs, compliance fines, and more.
Posted: 17 Jul 2017 | Published: 17 Jul 2017

Symantec & Blue Coat Systems

2017 Security Threat Report: Executive Summary
sponsored by Symantec
WHITE PAPER: Inside this summary of the larger 77-page 2017 Threat Report, discover 6 cyberattack insights and how they have evolved over the past year.
Posted: 17 Jul 2017 | Published: 17 Jul 2017

Symantec

The Top Cyber Security Trends in ASEAN in 2017
sponsored by ComputerWeekly.com
EGUIDE: For a few years now, the Association of Southeast Asian Nations (ASEAN) have called for closer collaboration among countries in the region on cyber security, given the transactional nature of cyber threats. Read more about these issues and how threat intelligence can help detect clandestine cyber activity before they turn into full-blown attacks.
Posted: 17 Jul 2017 | Published: 17 Jul 2017

ComputerWeekly.com

How to Meet Today's Data Protection Challenges
sponsored by Dell EMC Intel®
WHITE PAPER: This ESG report, learn about technologies that can help you meet today's data protection challenges.
Posted: 14 Jul 2017 | Published: 14 Jul 2017

Dell EMC Intel®

Your Shadow IT Discovery Best Practices Guide
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Learn how to guide your organization through the process of safely adopting cloud apps and services, mitigating the influence of shadow IT and reducing your security risk.
Posted: 14 Jul 2017 | Published: 14 Jul 2017

Symantec & Blue Coat Systems

How to Ensure Secure and Compliant Cloud App Use
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Cloud applications are becoming more vital to business, but securing them can be tricky. Discover 6 key guidelines to maximize the effectiveness of your CASB to help you remain secure and compliant with cloud apps.
Posted: 14 Jul 2017 | Published: 14 Jul 2017

Symantec & Blue Coat Systems

Improve Your Cloud Security Without Adding Complexity
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Discover how to improve your cloud security without adding complexity by learning how to selectively encrypt or tokenize field-level information in SaaS apps like Salesforce, ServiceNow, and Oracle.
Posted: 14 Jul 2017 | Published: 14 Jul 2017

Symantec & Blue Coat Systems

Internet and Security Threat Report 2017
sponsored by Symantec
WHITE PAPER: Inside this 77-page 2017 Internet Security Threat report, uncover current trends and analysis of today's cybersecurity issues and the evolution of malicious actors in the past 3 years. Discover where they might be going, the damage they've done, and much more.
Posted: 14 Jul 2017 | Published: 14 Jul 2017

Symantec

Mobile Apps Risk: Protect without Hindering Productivity
sponsored by Blue Cedar
EGUIDE: Mobile apps having a reputation for being notoriously unsecure. Discover the threat that mobile apps pose to your business, and some immediate security priorities for your enterprise to tackle when dealing with mobile apps.
Posted: 13 Jul 2017 | Published: 10 Jul 2017

Blue Cedar

Cloud Security: 6 Tips to Ensure Critical Data is Secure
sponsored by WinMagic
WHITE PAPER: With new legislation such as the EU's GDPR putting demands on your organization, how can you gain the visibility, efficiency, and real-time control to secure data in the cloud? Uncover 6 tips to improve cloud security and compliance.
Posted: 13 Jul 2017 | Published: 06 Jul 2017

WinMagic

Mobile Security in Healthcare: Ensure HIPAA Compliance
sponsored by BlackBerry
WHITE PAPER: Your mobile strategy requires an end-to-end solution for transmitting, managing, and storing data in compliance with HIPAA. Discover how to implement mobility in your healthcare organization and remain HIPAA compliant.
Posted: 13 Jul 2017 | Published: 13 Jul 2017

BlackBerry

Mobile Security Risk Mitigation and Tips for Success
sponsored by Blue Cedar
EGUIDE: Mobile is the new norm, putting mobile app security into the spotlight. In this e-guide discover a different method of approaching mobile security by focusing on data over device, as well as 12 specific tips to conquer mobile security and common problems.
Posted: 13 Jul 2017 | Published: 11 Jul 2017

Blue Cedar

5 Post-Hot Patch App Ban Risks and the Value of Security Assessments
sponsored by Blue Cedar
EGUIDE: Discover the value of application assessments when determining security risk, and 5 areas that need to be considered for enterprise app security in the face of Apple's decision to ban hot patches.
Posted: 13 Jul 2017 | Published: 11 Jul 2017

Blue Cedar

CW ASEAN – July 2017: Be alert to threats
sponsored by ComputerWeekly.com
EZINE: With cyber threats intensifying in recent years, the role of threat intelligence in anticipating and mitigating threats has become more important than ever. In this month's CW ASEAN, we explore how to make the most out of threat data feeds in an intelligence-driven security strategy.
Posted: 13 Jul 2017 | Published: 13 Jul 2017

ComputerWeekly.com

CW ANZ – July 2017: Cyber security plan bears fruit
sponsored by ComputerWeekly.com
EZINE: Australia's Cyber Security Strategy has made significant headway over the past year, but the jury is still out on its long-term impact. In this month's CW ANZ, we take a look at the progress of Australia's national cyber security blueprint and what else needs to be done to better protect Australia's interests in the global cyber security landscape.
Posted: 13 Jul 2017 | Published: 13 Jul 2017

ComputerWeekly.com

Case Study: Virtual Environments and Endpoints Secured
sponsored by TrendMicro
CASE STUDY: In this case study, discover how Cancer Research UK secured more than 2,000 active users across physical machines, VMware virtual desktops and mobile devices.
Posted: 13 Jul 2017 | Published: 13 Jul 2017

TrendMicro

Top Trends Shaping IAM in 2017
sponsored by OneLogin
WHITE PAPER: With the 9% of their overall IT security budgets already spent on IAM, many organizations are predicted to continue investing more of their money. Discover what factors are shaping IAM for near future in this Forrester report.
Posted: 13 Jul 2017 | Published: 21 Nov 2016

OneLogin
26 - 50 of 630 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement