IT Management  >   Systems Operations  >   Security  >  

Cybersecurity

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Cyber Security, Cyber Security Enhancement Act of 2002
DEFINITION: Information assurance, including information security, information technology disaster recovery, and information privacy. See Section 225, Cyber Security Enhancement Act of 2002, of the Homeland Security Act.
Cybersecurity Reports
26 - 50 of 736 Matches Previous Page  |  Next Page
Next-Generation Anti-Malware Testing for Dummies
sponsored by Cylance
WHITE PAPER: Inside this Next-Generation Anti-Malware Testing for Dummies e-book, learn about next-generation endpoint security techniques and how you can use machine learning and AI to protect against advanced persistent threats.
Posted: 31 Oct 2017 | Published: 31 Oct 2017

Cylance

Pathways for GDPR Readiness
sponsored by IBM
WHITE PAPER: The GDPR regulation can be used as a potential business opportunity for your company. Explore this white paper to learn more about getting a leg up with the GDPR journey, potential drawbacks of failing to comply with GDPR and how your company can benefit from GDPR.
Posted: 30 Oct 2017 | Published: 30 Oct 2017

IBM

Vendor Landscape: Vulnerability Management, 2017
sponsored by Tenable, Inc.
WHITE PAPER: According to a Forrester security survey, software vulnerabilities are the leading method of external intrusion in a breach. Explore this Forrester report to learn more about the vulnerability management vendor landscape and security trends that directly affect and enable business operations.
Posted: 30 Oct 2017 | Published: 30 Oct 2017

Tenable, Inc.

5 Steps to Building a Successful Vulnerability Management Program
sponsored by Tenable, Inc.
WHITE PAPER: Vulnerability management is something that will never end and will need to be improved and worked on periodically to ensure the security of your enterprise.Explore this white paper to learn more about successful vulnerability management programs to protect your enterprise.
Posted: 30 Oct 2017 | Published: 27 Apr 2017

Tenable, Inc.

The Critical Elements of IoT Security
sponsored by Fortinet, Inc.
WHITE PAPER: IoT devices are on the rise. Read this white paper to gain a stronger understanding of how to build an IoT security strategy to help increase your network performance and reliability.
Posted: 27 Oct 2017 | Published: 27 Oct 2017

Fortinet, Inc.

Strategies for the Enterprise to Address Today's Top Security Vulnerabilities
sponsored by Fortinet, Inc.
WHITE PAPER: In this white paper, learn the network security challenges organizations still need to overcome and methods for overcoming them.
Posted: 26 Oct 2017 | Published: 26 Oct 2017

Fortinet, Inc.

6 Key Use Cases for Securing Your Organization’s Cloud Workloads
sponsored by CyberArk Software, Inc
WHITE PAPER: According to CyberArk Software, total worldwide spending on cloud services will reach $266 billion by 2021 and SaaS will consume nearly 60% of cloud spending by then. Explore this white paper to gain insight into how you can ensure your cloud workloads and infrastructures are secure.
Posted: 26 Oct 2017 | Published: 26 Oct 2017

CyberArk Software, Inc

New Security Challenges Redefine Risk and Vulnerability
sponsored by Fortinet, Inc.
WHITE PAPER: In this white paper, gain a stronger understanding of the network security challenges organizations still need to overcome.
Posted: 25 Oct 2017 | Published: 25 Oct 2017

Fortinet, Inc.

KuppingerCole Report Leadership Compass
sponsored by CyberArk Software, Inc and KuppingerCole
WHITE PAPER: Privilege management is among the most relevant areas of IAM and cybersecurity, given that privileged users are a primary target of attackers. Explore this 55 page market report to learn more about privilege management and how you can protect your enterprise to the fullest extent against attackers.
Posted: 25 Oct 2017 | Published: 25 Oct 2017

CyberArk Software, Inc and KuppingerCole

Why Network Monitoring is Important for Cybersecurity Readiness
sponsored by LiveAction
EGUIDE: Our experts explain how consolidating traffic through known secure gateways and watching traffic closely with a variety of monitoring tools can improve cybersecurity readiness.
Posted: 25 Oct 2017 | Published: 25 Oct 2017

LiveAction

What you Need to Know About Cloud Security
sponsored by Arctic Wolf Networks, Inc.
EBOOK: In this e-book, gain a stronger understanding of the 3 most prominent types of cloud services and the questions your organization should ask when building a network security platform.
Posted: 25 Oct 2017 | Published: 25 Oct 2017

Arctic Wolf Networks, Inc.

IoT Botnets: The Stakes Have Changed. Have you?
sponsored by Arbor Networks
WEBCAST: The stakes have changed for IoT botnets and DDoS attacks, are you ready? In this webcast, learn how IoT devices attract DDoS security attacks. Then, find out how your organization can shift towards a more secure and reliable IoT future.
Posted: 25 Oct 2017 | Premiered: Nov 21, 2016

Arbor Networks

How to Close Security Gaps to Stop Ransomware and other Threats
sponsored by Fortinet, Inc.
EBOOK: In this e-book, gain a stronger understanding on how protecting your enterprise starts with ensuring coverage across different attack vectors through coordinated Advanced Threat Protection (ATP). Then, find out how IT network pros strive to overcome network security challenges to help increase performance, reliability, and scalability.
Posted: 25 Oct 2017 | Published: 25 Oct 2017

Fortinet, Inc.

5 questions to ask when considering a DDoS Managed Service
sponsored by Arbor Networks
WHITE PAPER: When evaluating DDoS protection for your business, what are the top questions you should ask? This white paper offers 5 questions to ask to ensure you are picking the best DDoS protection strategy for your enterprise.
Posted: 24 Oct 2017 | Published: 24 Oct 2017

Arbor Networks

Advantages of a Fabric vs. Platform Approach to Enterprise Security
sponsored by Fortinet, Inc.
WHITE PAPER: It is challenging to know which strategy is best for your enterprise protection. This white paper explores the differences between a fabric and a platform approach to your security framework, and reveals how you can protect your enterprise from security threats.
Posted: 24 Oct 2017 | Published: 24 Oct 2017

Fortinet, Inc.

A Secure, IT-Approved File Sharing Alternative to Shadow IT
sponsored by Citrix
WHITE PAPER: Discover how to mitigate the security risks and Shadow IT issues associated with online file sharing services. Find out how to protect your data while still enabling employees to be productive, and uncover 5 ways to identify and eliminate Shadow IT that results from unauthorized file sharing accounts.
Posted: 24 Oct 2017 | Published: 24 Oct 2017

Citrix

IoT Botnets and DDoS Attacks: The Stakes Have Changed
sponsored by Arbor Networks
WEBCAST: The stakes have changed for IoT botnets and DDoS attacks, are you ready? In this webcast, learn how IoT botnets quickly spread. Then, find out how your organization can shift towards a more secure and reliable IoT future.
Posted: 24 Oct 2017 | Premiered: Apr 6, 2017

Arbor Networks

The Stakes Have Changed: No End in Sight for DDoS Attack Size Growth
sponsored by Arbor Networks
RESOURCE: In this resource, gain a better understanding of how IoT devices become vulnerable to the spread of IoT botnets, so your organization can move towards a more secure and reliable IoT future.
Posted: 24 Oct 2017 | Published: 24 Oct 2017

Arbor Networks

New Cybersecurity Regulations Adopted to Protect Financial Systems & Information
sponsored by HID Global
WHITE PAPER: According to the Symantec Internet Security Threat Report, the United States is at the top of the list for both the number of breaches by country and the number of identities stolen by country. Explore this white paper to discover how to protect your organization from data breaches.
Posted: 23 Oct 2017 | Published: 13 Oct 2017

HID Global

IOT Botnets & DDoS Attacks: The Stakes Have Changed
sponsored by Arbor Networks
RESOURCE: In this resource, gain a better understanding for DDoS mitigation best practices and learn how to prevent the growth of IoT botnets.
Posted: 23 Oct 2017 | Published: 23 Oct 2017

Arbor Networks

Why IPS Devices and Firewalls Fail to Stop DDoS Threats
sponsored by Arbor Networks
WHITE PAPER: According to data center respondents of Arbor's Worldwide Infrastructure Security report, 67% have experienced a multi-vector DDoS attack. In addition, 45% of respondents experienced firewall or IPS device failure during an attack. This white paper reveals why IPS devices and firewalls can't stop DDoS attacks.
Posted: 23 Oct 2017 | Published: 23 Oct 2017

Arbor Networks

The APAC Guide to Data Protection & GDPR
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, learn more about what governments in APAC are doing to keep companies on their toes in securing personal data, what organisations can do to stem potential data issues and the implications of the European Union's upcoming General Data Protection Regulation (GDPR) on businesses in the region.
Posted: 23 Oct 2017 | Published: 23 Oct 2017

ComputerWeekly.com

Marcher Marches On: The Anatomy of a Banker Malware
sponsored by Check Point Software Technologies Ltd.
RESOURCE: Inside, get a breakdown of the mobile banking malware known as Marcher. Learn how Marcher gets into mobile devices using flash phishing, what harm it can cause once inserted into your device, and more.
Posted: 20 Oct 2017 | Published: 28 Apr 2016

Check Point Software Technologies Ltd.

Powerful DDoS Attacks & Recovery for Enterprises
sponsored by Arbor Networks
EGUIDE: A series of potent, record-setting DDoS attacks hit several targets in 2016 using IoT malware to infect and leverage a large number of internet connect devices. Inside this guide, experts reveal 11 key takeaways for this type of attack and real-world examples of companies suffering from the aftermath including Dyn.
Posted: 31 Oct 2017 | Published: 24 Oct 2017

Arbor Networks

DDoS Mitigation: Types of DDoS Attacks and Security Considerations
sponsored by Arbor Networks
EGUIDE: Our experts discuss various DDoS mitigation services and what your organization should consider before implementing cloud DDoS protection. Then, uncover the various types of DDoS attacks and the steps to take towards a more secure and reliable future.
Posted: 27 Oct 2017 | Published: 27 Oct 2017

Arbor Networks
26 - 50 of 736 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement