IT Management  >   Systems Operations  >   Security  >  

Cybersecurity

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Cyber Security, Cyber Security Enhancement Act of 2002
DEFINITION: Information assurance, including information security, information technology disaster recovery, and information privacy. See Section 225, Cyber Security Enhancement Act of 2002, of the Homeland Security Act.
Cybersecurity Reports
51 - 75 of 511 Matches Previous Page  |  Next Page
Under Attack? 2016 Defenses Escape Compromise
sponsored by SearchSecurity.com
EZINE: In this issue of Information Security magazine, we look at security attack techniques and talk to top security researchers about enterprise threats in 2016.
Posted: 01 Feb 2016 | Published: 01 Feb 2016

SearchSecurity.com

Advanced Threat Detection with Machine-Generated Intelligence
sponsored by Prelert
RESEARCH CONTENT: In this resource, you will discover the research results from a survey of 614 IT security practitioners in the U.S., revealing a lack of confidence in their IT security team's ability to defend their organization. Read on to learn why adoption of a machine-generated intelligence will bolster your cyberdefense.
Posted: 29 Jan 2016 | Published: 31 Oct 2015

Prelert

What Story Does Your IT Security Tell?
sponsored by Prelert
DATA SHEET: In this resource, you will discover how to analyze log data and locate anomalies in order to combat advanced cyberthreats with an anomaly detection application. Access this resource to apply behavioral analytics to any data resource—including Windows event logs, DNS logs, and firewall logs.
Posted: 28 Jan 2016 | Published: 31 Dec 2015

Prelert

Math to the rescue! Try this novel hacking defense
sponsored by Prelert
RESOURCE: This article shows how you can detect malicious activity on your networks through and unlikely strategy – advanced math. Read on to take a closer look at this method of detection, and decide if it can help your organization protect its data.
Posted: 27 Jan 2016 | Published: 27 Jan 2016

Prelert

Building Management Systems: The cyber security blind spot
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: The systems which control heating, lighting and security in most buildings are vulnerable to cyber attack, this report from QinetiQ warns.
Posted: 26 Jan 2016 | Published: 26 Jan 2016

ComputerWeekly.com

The Global Risks Report 2016
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from the World Economic Forum identifies the most pressing global risks countries and organisations will face in 2016, including sections on technology and cyber crime.
Posted: 20 Jan 2016 | Published: 20 Jan 2016

ComputerWeekly.com

Bolster Network Security for the Latest Social Engineering Tactics
sponsored by WatchGuard Technologies, Inc.
VIDEO: This brief video explores customized social engineering tactics that can compromise your network security. Tune in for a quick security recommendation that get you up to speed on the latest social engineering techniques.
Posted: 19 Jan 2016 | Premiered: 10 Dec 2015

WatchGuard Technologies, Inc.

Staying ahead of threats with global threat intelligence and automated protection
sponsored by IBM
WHITE PAPER: In this white paper you will discover how to stay ahead of the ever evolving security landscape and keep your precious data safe.
Posted: 19 Jan 2016 | Published: 30 Jun 2015

IBM

A Guide to Cyber Risk
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Insurer Allianz Global Corporate & Specialty (AGCS) examines the latest trends in cyber risk and emerging perils around the globe.
Posted: 19 Jan 2016 | Published: 19 Jan 2016

ComputerWeekly.com

Business on the Internet - A Scary Reality
sponsored by LogicNow
WHITE PAPER: This white paper shows you different methods cybercriminals can use to ruin your business. The vast majority of infections can be attributed to user error falling victim to their tactics.
Posted: 13 Jan 2016 | Published: 04 Jan 2016

LogicNow

Gaining Awareness and Combatting Cyber Threats Without Breaking the Bank
sponsored by SurfWatch Labs
WHITE PAPER: This paper examines credit union security and gives tips on keeping cybercrime out of your organization. Read on for essential insight on building strong security on a small budget.
Posted: 07 Jan 2016 | Published: 31 Dec 2015

SurfWatch Labs

Flipping the Script: Law Firms Hunted by Cybercriminals
sponsored by SurfWatch Labs
WHITE PAPER: This resource examines the cyber-threats facing law firms, explaining why they are attractive and easy targets for cybercriminals. Access it to discover just how much danger your firm is in and how you can stay safe.
Posted: 07 Jan 2016 | Published: 07 Jan 2016

SurfWatch Labs

Hospitality and Cybercrime: How to Safeguard Sensitive Information
sponsored by SurfWatch Labs
WHITE PAPER: This white paper explores the many cyber-risks faced by the hospitality sector. Access it and discover just how much your business is at risk – and what you can do about it.
Posted: 06 Jan 2016 | Published: 06 Jan 2016

SurfWatch Labs

Dangers of the Deep, Dark Web
sponsored by IBM
WHITE PAPER: Access this white paper to learn how two of the most frequently used Deep Web networks operate and how you can stay safe from attacks that originate there.
Posted: 15 Dec 2015 | Published: 31 May 2015

IBM

Threat Intelligence Platforms: Everything You’ve Ever Wanted to Know But Didn’t Know to Ask
sponsored by ThreatConnect
WHITE PAPER: Today's cyber-threats are relentless, and they come in all forms. This in-depth resource covers the ins and outs of threat intelligence, discussing everything from what threat intelligence is to how you can best utilize it.
Posted: 15 Dec 2015 | Published: 15 Dec 2015

ThreatConnect

Cyber Security Intelligence Index for Retail
sponsored by IBM
WHITE PAPER: This security intelligence report examines the types of threats that retailers face and gives advice for staying safe. Access it now to learn how you can protect your retail organization from advanced attacks.
Posted: 14 Dec 2015 | Published: 14 Dec 2015

IBM

Cyber Security Intelligence Index for Retail
sponsored by IBM
WHITE PAPER: This security intelligence report examines the types of threats that retailers face and gives advice for staying safe. Access it now to learn how you can protect your retail organization from advanced attacks.
Posted: 14 Dec 2015 | Published: 14 Dec 2015

IBM

Secure Your Internal Corporate Networks With ABAC
sponsored by Cryptzone
EGUIDE: In this e-guide, discover how ABAC can provide your network with a robust security method that addresses security issues caused by growing remote access and BYOD trends. You will also learn how continuous network security monitoring can allow your enterprise to detect and prevent future cyber-attacks from occurring.
Posted: 27 Jan 2016 | Published: 25 Jan 2016

Cryptzone

New Rules of Data Security Virtual Portal
sponsored by IBM
WHITE PAPER: This portal is your hub for the latest data security strategies and best practices. Watch this series of informative videos to help shed light on the real world implications of data breaches, the importance of ensuring regulatory compliance and how to leverage best breed security solutions.
Posted: 22 Jan 2016 | Published: 09 Dec 2015

IBM

Cybercrime Exposed: The Hidden Economy of Cybercrime-as-a-Service
sponsored by Intel
WHITE PAPER: Access this resource for an inside look at the thriving economy of "cybercrime-as-a-service."
Posted: 07 Jan 2016 | Published: 31 Dec 2013

Intel

Big Data and Predictive Analytics: On the CybersecurityFront Line
sponsored by SAS
WHITE PAPER: In this white paper, learn about the intersection between big data, analytics, and cybersecurity. Furthermore, gain an in-depth look at the types of attacks and the steps you can take improve organizational security, including: map and tap into existing data sources, use deep analytics to refine and sharpen the picture, and more.
Posted: 06 Jan 2016 | Published: 31 Dec 2015

SAS

Detect and Thwart Insider Threats
sponsored by Lancope
WHITE PAPER: This white paper discusses how you can stop insider threats with enhanced network visibility. Read on to learn how to keep your organization secure from the inside out.
Posted: 05 Jan 2016 | Published: 31 Dec 2015

Lancope

Combating the Insider Threat: Your Guide to Staying Secure
sponsored by Lancope
WHITE PAPER: This resource explores the danger of insider threats and provides suggestions on preventing them. Read on to learn why you need to focus your security inward and what practices will help you do so.
Posted: 05 Jan 2016 | Published: 31 Dec 2015

Lancope

Detect Network Anomalies with the Right Netflow Analysis Tool
sponsored by Lancope
WHITE PAPER: In this article, a security expert discusses how he found a security tool that met his netflow analysis needs. Read on and learn how you can obtain the deep network insights necessary for stopping advanced hacks in your organization.
Posted: 04 Jan 2016 | Published: 18 Nov 2014

Lancope

Case Study: School District Stops Breaches with Heightened Network Visbility
sponsored by Lancope
WHITE PAPER: Access this case study to discover how a large school district blocked breaches with network visibility, improved its incident response time, and more.
Posted: 30 Dec 2015 | Published: 30 Dec 2015

Lancope
51 - 75 of 511 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement