IT Management  >   Systems Operations  >   Security  >  

Cybersecurity

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Cyber Security, Cyber Security Enhancement Act of 2002
DEFINITION: Information assurance, including information security, information technology disaster recovery, and information privacy. See Section 225, Cyber Security Enhancement Act of 2002, of the Homeland Security Act.
Cybersecurity Reports
51 - 75 of 649 Matches Previous Page  |  Next Page
How to Mitigate the Risk of Unpatched Vulnerabilities
sponsored by FireMon
WHITE PAPER: The most common vulnerabilities and exposures are well known, but ironically still provide attackers with the best chance to infiltrate and damage your organization. Why? Discover why patching sometimes isn't an option, and what to do to help mitigate the risk these constraints place upon your organization.
Posted: 24 Jul 2017 | Published: 08 Nov 2016

FireMon

Ransomware: 4 Ways to Protect Data Now
sponsored by Citrix
WHITE PAPER: Ransomware is a very real threat, seemingly in the news everyday with attacks like WannaCry. Uncover 4 steps to reduce exposure to ransomware attacks, and to minimize its impact in the event of an attack.
Posted: 21 Jul 2017 | Published: 21 Jul 2017

Citrix

How Protecting Valuable IP Helps A Leading Automotive Supplier Drive Productivity
sponsored by Cisco Umbrella
WHITE PAPER: Learn how a major automotive group was able to preemptively secure their globally distributed network against potential threats, safeguarding 2,500 users and their valuable intellectual property.
Posted: 21 Jul 2017 | Published: 21 Jul 2017

Cisco Umbrella

The Cloud Threat Funnel: Suspicious User Behavior That Matters
sponsored by Cisco Cloudlock
WHITE PAPER: Properly identifying suspicious activities in the cloud is akin to finding a needle in the haystack. In this cloud security report, discover what you should be looking for and how to mitigate the risk.
Posted: 21 Jul 2017 | Published: 21 Jul 2017

Cisco Cloudlock

Achieve GDPR Readiness with Secure App and Data Delivery
sponsored by Citrix
WHITE PAPER: GDPR is coming fast, and non-compliance can cripple businesses with heavy fines expected. Ensure your company isn't among those failing to comply. Discover how to achieve GDPR readiness and compliance by enabling IT to create a software-defined perimeter.
Posted: 21 Jul 2017 | Published: 21 Jul 2017

Citrix

Composite Authentication: Security Beyond Passwords
sponsored by Crossmatch
WEBCAST: In this webcast, security experts Kevin Beaver and Jeff Carpenter discuss what composite authentication is, how it evolved, and its place in the future of security.
Posted: 21 Jul 2017 | Premiered: Jun 29, 2017

Crossmatch

How to Secure IoT, Mobile, and Endpoints
sponsored by IBM
WHITE PAPER: As devices continue to expand, maintaining security becomes a larger challenge. Access this white paper to discover how to manage and secure a diverse pool of endpoints.
Posted: 21 Jul 2017 | Published: 21 Jul 2017

IBM

Closing the Cloud and Virtualization Security Gap
sponsored by HyTrust
WHITE PAPER: Many organizations haven't had the time to gain full familiarity with their virtualized environments. Discover how to gain control over virtualized systems so you can secure and manage your data, as well as ensure that virtualized servers and networks are in compliance.
Posted: 20 Jul 2017 | Published: 20 Jul 2017

HyTrust

Your Guide to HIPAA Compliance for Containers
sponsored by Twistlock, Inc.
WHITE PAPER: With the advent of microservices it is likely that many new healthcare apps are being built with containers. Discover how to achieve compliance with the HIPAA Security Rule for containerized workloads for healthcare apps.
Posted: 20 Jul 2017 | Published: 20 Jul 2017


A New Security Strategy for Today's Virtualized Computing Infrastructure
sponsored by Quest
WHITE PAPER: When it comes to cloud computing environments, attackers have a massive advantage – time. Discover what it takes to close the time-gap between attacker and defender to protect today's enterprise cloud computing infrastructure.
Posted: 20 Jul 2017 | Published: 20 Jul 2017

Quest

31% of Apps Used in Educational Institutions are Risky
sponsored by Cisco Cloudlock
WHITE PAPER: The cloud is revolutionizing education, but at the cost of massive security risk. Learn how certain cloud apps could lead to traumatic and costly data breaches, as well as how to mitigate the threat they pose.
Posted: 20 Jul 2017 | Published: 20 Jul 2017

Cisco Cloudlock

The State of Open Source Software: Vulnerability Risks are on the Rise
sponsored by Flexera Software
WHITE PAPER: Open source software (OSS) is an integral part of business for app developers today, but they can cause security risk and compliance issues. Learn about the current state of OSS and how you can ensure that your organization remains secure and compliance standards are met.
Posted: 19 Jul 2017 | Published: 19 Jul 2017

Flexera Software

How to Bridge the SIEM Alert Triage Gap
sponsored by FireMon
WHITE PAPER: Data analysis is the cornerstone of the alert triage process, so organizations typically turn to their SIEM and existing tools to triage events. Unfortunately, SIEMs are falling short and security teams can't keep up with alert volumes. Are we asking too much of our SIEM?
Posted: 19 Jul 2017 | Published: 19 Jul 2017

FireMon

Your Guide to Vendor Risk Management Visibility
sponsored by Rsam
WHITE PAPER: Don't end up in the headlines because a vulnerable vendor exposed your data to risk. Learn how to solve the vendor risk equation and mitigate the threat they pose to your organization.
Posted: 19 Jul 2017 | Published: 19 Jul 2017

Rsam

Securing the Cloud for the Modern Enterprise
sponsored by OneLogin
EBOOK: In this extensive, 47-page e-book explore how identity management can streamlines access to the cloud while protecting corporate data, reducing dependence on IT, and minimizing disruption.
Posted: 19 Jul 2017 | Published: 13 Jul 2017

OneLogin

The Top Cyber Security Trends in ANZ in 2017
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, read about Australia's plan for getting technology suppliers and service providers to decrypt encrypted messages, why threat intelligence is more than just ingesting data feeds into a security system and the risks that shadow IT can bring to organisations in Australia and New Zealand.
Posted: 19 Jul 2017 | Published: 19 Jul 2017

ComputerWeekly.com

4 Critical Elements of a Successful GRC Implementation
sponsored by Rsam
WHITE PAPER: The GRC landscape is changing quickly, are you ready to adapt? Explore these 4 critical elements of a successful GRC implementation and see what they can do for your organization.
Posted: 18 Jul 2017 | Published: 18 Jul 2017

Rsam

The Case for Cloud-Based IAM
sponsored by OneLogin
WHITE PAPER: What's the future of IAM? Is it on the cloud? What are the benefits? IAM expert David Meyer discusses why traditional IAM is no longer sufficient for enterprises today and how cloud-based IAM can meet your organization's security needs.
Posted: 18 Jul 2017 | Published: 18 Jul 2017

OneLogin

IAM: On-Premises vs. IDaaS Delivery
sponsored by OneLogin
WHITE PAPER: Which is better for your organization: on-premises IAM or IDaaS? This Gartner report can provide valuable insight into which one may be best for you.
Posted: 18 Jul 2017 | Published: 18 Jul 2016

OneLogin

7 Ways to Improve Your Security Incident Response
sponsored by Rsam
WHITE PAPER: There are many reasons incident response programs may not succeed, including lack of process maturity and poor data quality. Uncover 7 key concepts for implementing a successful incident response platform.
Posted: 18 Jul 2017 | Published: 18 Jul 2017

Rsam

How to Secure Your Organization's Data in SaaS Apps
sponsored by OneLogin
WHITE PAPER: According to Cisco, IT departments are only aware of about 7% of their company's cloud app usage, leading to a massive security blind spot. Discover 10 steps on how to track sensitive corporate data in third-party SaaS apps and ensure that only the right people have the right level of access to it.
Posted: 17 Jul 2017 | Published: 17 Jul 2017

OneLogin

Computer Weekly – 18 July 2017: Airbus secures critical infrastructure
sponsored by ComputerWeekly.com
EZINE: This week, Computer Weekly explores how to secure industrial control systems, which have often lagged behind the leading edge of IT security and pose serious risks to critical national infrastructure. Airbus believes that despite the vulnerabilities of individual components, industrial control systems as a whole are quite resilient.
Posted: 17 Jul 2017 | Published: 17 Jul 2017

ComputerWeekly.com

IAM Case Study: How to Maximize Your ROI and Security
sponsored by OneLogin
WHITE PAPER: Security and ROI don't have to be antagonistic. Learn how one company achieved a 482% ROI with their IAM over the course of three years, and more.
Posted: 17 Jul 2017 | Published: 17 Jul 2017

OneLogin

8 Best Practices to Ensure Compliance When Adopting Cloud Apps and Services
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Mitigating the risk shadow IT poses to your company is essential to ensuring compliance when adopting cloud apps and services. Discover 8 best practices that can help you avoid remediation costs, compliance fines, and more.
Posted: 17 Jul 2017 | Published: 17 Jul 2017

Symantec & Blue Coat Systems

The Top Cyber Security Trends in ASEAN in 2017
sponsored by ComputerWeekly.com
EGUIDE: For a few years now, the Association of Southeast Asian Nations (ASEAN) have called for closer collaboration among countries in the region on cyber security, given the transactional nature of cyber threats. Read more about these issues and how threat intelligence can help detect clandestine cyber activity before they turn into full-blown attacks.
Posted: 17 Jul 2017 | Published: 17 Jul 2017

ComputerWeekly.com
51 - 75 of 649 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement