IT Management  >   Systems Operations  >   Security  >  

Cybersecurity

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Cyber Security, Cyber Security Enhancement Act of 2002
DEFINITION: Information assurance, including information security, information technology disaster recovery, and information privacy. See Section 225, Cyber Security Enhancement Act of 2002, of the Homeland Security Act.
Cybersecurity Reports
26 - 50 of 518 Matches Previous Page  |  Next Page
Cloud Security Gateways Rise to the Data Loss Challenge
sponsored by SearchSecurity.com
EZINE: In this issue of Information Security magazine, we look at cloud data loss prevention, the challenges of enforcing security policies across environments, and whether cloud access security brokers can offer another layer of protection.
Posted: 01 Apr 2016 | Published: 01 Apr 2016

SearchSecurity.com

How Integrated Services Reduce Risk and the Impact of a Security Breach to Organizations
sponsored by Dell SecureWorks
WHITE PAPER: This white paper presents the advantages of a single-outsourced solution for managed security services and incident response. Discover how combining your capabilities with an MSSP can enable you to improve your overall security by reducing investigation time with real-time data access and enhancing remediation solutions with cyberintelligence.
Posted: 25 Mar 2016 | Published: 25 Mar 2016

Dell SecureWorks

Top 5 IT Challenges Facing Canadian Businesses
sponsored by Rogers Communications, Inc.
WHITE PAPER: Business success increasingly hinges on a company's ability to use new technology to drive innovation and improve operational efficiency. But IT leaders say their ability to advance the business is challenged. Read this brief white paper to learn about the IT challenges facing businesses today and why IT departments are wasting 200 hours per week.
Posted: 25 Mar 2016 | Published: 08 Mar 2016

Rogers Communications, Inc.

Protect Against Zero-Day Attacks at the Every Level
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: It's time to take threat defense to the next level and protect your organization. In this white paper, you'll uncover ways to combine OS-level sandboxing with threat prevention capabilities for integrated prevention and security management.
Posted: 24 Mar 2016 | Published: 24 Mar 2016

Check Point Software Technologies Ltd.

Setting the Stage: Landscape Shifts Dictate Future Threat Response Strategies
sponsored by TrendMicro
RESOURCE: A deeper threat landscape greeted 2016—a playing field shaped by the introduction of new technologies and attack models. Access this report to see 2016's threat landscape in review, and discover why you need to reconsider traditional methods of protecting your data and assets.
Posted: 23 Mar 2016 | Published: 23 Mar 2016

TrendMicro

Formulate a Game Plan for Closing the SecOps Gap
sponsored by BMC
WHITE PAPER: Access this report to discover why collaboration between security and operations (SecOps) will drive faster threat response, stronger security, and improved compliance in your organization. Take a closer look at the SecOps gap now, and learn the gravity of IT misalignment.
Posted: 18 Mar 2016 | Published: 18 Mar 2016

BMC

Report: Modern Threat Intelligence
sponsored by IBM
WHITE PAPER: The complexities of doing business at scale, both strategic and technical, create barriers in preventing breaches. Uncover ways to focus on user education and systematic protocols for operating a strong risk assessment program, allowing you to overcome these barriers.
Posted: 15 Mar 2016 | Published: 29 Feb 2016

IBM

The Enemy Within: Why Insiders Are Still the Weakest Link in Your Data Security Chain
sponsored by Absolute
WHITE PAPER: This white paper describes the 5 steps that your enterprise needs to take in order to foster a conscientious data security environment within your enterprise, despite the challenges of the digital era.
Posted: 14 Mar 2016 | Published: 08 Jul 2015

Absolute

Cyberthreat Intelligence: How Organizations are Using Analytics on Data Left Behind by Hackers
sponsored by LogRhythm, Inc.
WHITE PAPER: One barrier to understanding the merits of cyberthreat intelligence (CTI) is confusion about what it is and what it isn't. Access this article to gain an insider's perspective on what CTI really has to offer, who needs it, and how to find the right vendor.
Posted: 07 Mar 2016 | Published: 07 Mar 2016

LogRhythm, Inc.

Bullet-Proofing Your Email with Cloud-Based Security
sponsored by LogicNow
WHITE PAPER: Since malicious software and web links can bring down entire enterprises, having an extra layer of defense in place has never been more important. Learn what you can do to protect users, and deliver highly accurate spam detection, and robust virus defense.
Posted: 04 Mar 2016 | Published: 04 Mar 2016

LogicNow

Information Security ANZ March 2016
sponsored by TechTarget ANZ
EZINE: Australian organisations face a huge skills shortage when it comes to fighting cyber-crime unless they act quickly
Posted: 03 Mar 2016 | Published: 03 Mar 2016


Information Security Asean March 2016
sponsored by TechTarget ANZ
EZINE: Organisations in the Association of Southeast Asian Nations are increasingly the targets for cyber criminals
Posted: 03 Mar 2016 | Published: 03 Mar 2016


Spear Phishing Attacks: Where to Find Them and How to Prevent Them
sponsored by Cloudmark
EGUIDE: This exclusive e-guide discusses the reasons behind why spear phishing attacks are at the heart of most targeted attacks. Access now and you'll uncover advice to help minimize the chance of a spear phishing attack successfully infiltrating the enterprise.
Posted: 02 Mar 2016 | Published: 02 Mar 2016

Cloudmark

Best Practices for Defending Against Spear Phishing Attacks
sponsored by Cloudmark
EGUIDE: This exclusive e-guide details a new wave of spear phishing attacks targeting defense contractors, universities, and security firms. Read on as experts explain how to defend against the man-in-the-email attacks with proper training and little technology.
Posted: 01 Mar 2016 | Published: 01 Mar 2016

Cloudmark

PCI Compliance Protect your business from data breach
sponsored by Earthlink.
WHITE PAPER: Get stronger control over PCI compliance in this white paper by learning the 12 requirements to simplify and accelerate the process. Access this resource now to learn how to proactively protect your organization from a data breach.
Posted: 01 Mar 2016 | Published: 01 Mar 2016

Earthlink.

Computer Weekly – 1 March 2016: Protecting the UK from cyber attacks
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to the National Crime Agency's top cyber cop about tackling IT security threats against the UK through global collaborations. We ask CIOs for their tips on building an IT strategy for the digital age. And we review the big six storage suppliers' plans for all-flash arrays. Read the issue now.
Posted: 29 Feb 2016 | Published: 01 Mar 2016

ComputerWeekly.com

3 Steps to Implementing an Effective BYOD Mobile Security Strategy
sponsored by Checkpoint Software Technologies
WHITE PAPER: This white paper identifies three key steps that help to secure your mobility in a way that maximizes its benefits. Download now to get access to a checklist of capabilities you can use when evaluating mobile security solutions to ensure you can get the most out of your mobility initiatives.
Posted: 11 Feb 2016 | Published: 30 Mar 2015

Checkpoint Software Technologies

The Top 4 Most Pressing Android Mobile Cybersecurity Threats
sponsored by Checkpoint Software Technologies
WHITE PAPER: In this paper, you will break down the most common types of attacks that impact Android mobile devices.
Posted: 11 Feb 2016 | Published: 30 Mar 2015

Checkpoint Software Technologies

Exposing the Unknown: How Sandboxing Technology Fights Modern Threats
sponsored by Checkpoint Software Technologies
WHITE PAPER: This white paper takes a look at the modern threat landscape, including zero-day attacks and advanced persistent threats (APT), and the consequences of not protecting your company's data and networks. Access now to learn how traditional sandboxing compares to advanced sandbox solutions.
Posted: 11 Feb 2016 | Published: 30 Jun 2015

Checkpoint Software Technologies

Threat Research: Targeted Attacks on Enterprise Mobile
sponsored by Checkpoint Software Technologies
RESEARCH CONTENT: This study reveals whether or not Mobile Remote Access Trojans (mRAT) threats are real for the enterprise. Download now and learn about commercial mRAT threats and what corporate data is at risk.
Posted: 11 Feb 2016 | Published: 25 Mar 2015

Checkpoint Software Technologies

The Rise of Known and Unknown Malware and Best Approaches to Zero-Day Attacks
sponsored by Checkpoint Software Technologies
WHITE PAPER: In this paper, you will examine several best practice strategies for malware threat defense and protection against zero-day attacks.
Posted: 11 Feb 2016 | Published: 25 Oct 2015

Checkpoint Software Technologies

Top 6 Cyber Security Threats to iOS Devices
sponsored by Checkpoint Software Technologies
WHITE PAPER: This white paper details the six most common types of attacks that impact iOS mobile devices. Access now and you'll learn the basic requirements for protecting against them.
Posted: 11 Feb 2016 | Published: 25 Jun 2015

Checkpoint Software Technologies

Defend Against the Undetected
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper discusses how an automated, integrated security process can ensure a more secure network. Discover how this security strategy can efficiently defend your network from the perimeter to the core.
Posted: 10 Feb 2016 | Published: 11 Jan 2016

Fortinet, Inc.

The Business Benefits of Managing Cyber Risk and Minimizing Unnecessary Data
sponsored by UnitedLex
EGUIDE: Cyber risk management is becoming an increasingly important area of concern as company directors' realize the limitations of insurance. How can you address this risk and instill confidence in your customer engagement? Find out how to enhance your cyber risk management using 4 key strategies.
Posted: 18 Feb 2016 | Published: 16 Feb 2016

UnitedLex

Keep Your Data Secure in the Wake of the Heartbleed OpenSSL Vulnerability
sponsored by Symantec Website Security
EGUIDE: In this e-guide, learn about the web security implications of Heartbleed, the security defect found in several OpenSSL versions. View now to find out whether your enterprise should be concerned and how to protect your data from this bug.
Posted: 11 Feb 2016 | Published: 09 Feb 2016

Symantec Website Security
26 - 50 of 518 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement