IT Management  >   Systems Operations  >   Security  >  

Cybersecurity

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Cyber Security, Cyber Security Enhancement Act of 2002
DEFINITION: Information assurance, including information security, information technology disaster recovery, and information privacy. See Section 225, Cyber Security Enhancement Act of 2002, of the Homeland Security Act.
Cybersecurity Reports
76 - 100 of 553 Matches Previous Page  |  Next Page
DDoS Extortion and Bitcoin: New Security Threat on the Horizon
sponsored by Neustar®
WHITE PAPER: This white paper profiles DD4BC and how to protect your network and organization from the attack.
Posted: 15 Jul 2015 | Published: 08 Jul 2015

Neustar®

Holiday Ecommerce Security Preparedness: It's Never Too Early
sponsored by Neustar®
WHITE PAPER: This white paper acts a guide for how to ensure retail operations function efficiently and securely through the holiday season.
Posted: 15 Jul 2015 | Published: 08 Jul 2015

Neustar®

2015 Information Security Trends: What's Next?
sponsored by Cyveillance, Inc.
WEBCAST: This webinar examines what information security and threat analysts can expect in 2015. Topics will include using threat intelligence before and after data breaches, information sharing, the Internet of Things, and the role of the CISO.
Posted: 15 Jul 2015 | Premiered: Feb 26, 2015

Cyveillance, Inc.

Understanding today’s information security threats
sponsored by Dell SecureWorks
PODCAST: This podcast can help you gain the understanding you need to secure your organization by describing what threats your business faces and how you can combat them.
Posted: 14 Jul 2015 | Premiered: Jul 14, 2015

Dell SecureWorks

Point of Sale Insecurity: A Threat to Your Business
sponsored by SurfWatch Labs
WEBCAST: This webcast discusses the risks facing PoS machines and what you can do to make sure yours are secured..
Posted: 13 Jul 2015 | Premiered: Jun 9, 2015

SurfWatch Labs

Cyber Risk Intelligence Tailored For Your Business
sponsored by SurfWatch Labs
VIDEO: This brief video explains how cyber intelligence can help your organization gain a stronger understanding of the cyber risks it faces.
Posted: 13 Jul 2015 | Premiered: 12 Sep 2014

SurfWatch Labs

Connecting the Server Room to the Board Room
sponsored by SurfWatch Labs
VIDEO: This video describes how an effective security intelligence application can help executives understand the security risks their business faces.
Posted: 13 Jul 2015 | Premiered: 10 Apr 2015

SurfWatch Labs

Increase Security Effectiveness with Threat Intelligence
sponsored by Cyveillance, Inc.
WEBCAST: This webcast explains the benefits of implementing an effective threat intelligence system.
Posted: 13 Jul 2015 | Premiered: Jun 30, 2015

Cyveillance, Inc.

Device Fingerprinting: A New Tool for Enhanced Application Protection
sponsored by Radware
WHITE PAPER: Access this white paper to learn the five common factors challenging IP-based identification and how device fingerprinting can make it easier.
Posted: 10 Jul 2015 | Published: 29 May 2015

Radware

Create Your Own Private ISAC: Tips for Sharing Threat Intelligence
sponsored by SurfWatch Labs
WHITE PAPER: This white paper discusses how cybersecurity professionals can build an information sharing and analysis center (ISAC) to disseminate security intelligence and insights among partners.
Posted: 10 Jul 2015 | Published: 10 Jul 2015

SurfWatch Labs

Understanding Today's Information Security Threats
sponsored by Dell SecureWorks
VIDEO: This video can help you understand what information security threats your organization faces and how you can best combat them.
Posted: 10 Jul 2015 | Premiered: 10 Jul 2015

Dell SecureWorks

Unified Security Management vs. SIEM: A Technical Comparison
sponsored by AlienVault
WHITE PAPER: This white paper explores why SIEM solutions have been proven to be less effective than their vendors claim.
Posted: 10 Jul 2015 | Published: 10 Jul 2015

AlienVault

You've Been Breached: How to Create an Effective Incident Response Plan
sponsored by Dell SecureWorks
VIDEO: In this video, a security expert discusses how you can develop an incident response plan that will ensure your organization isn't caught by surprise in a cyber-attack.
Posted: 09 Jul 2015 | Premiered: 09 Jul 2015

Dell SecureWorks

How the Hackers Get In: Experiences from Real-Life Security Breaches
sponsored by Dell SecureWorks
VIDEO: In this video, an information security expert discusses the results of his research to reveal hackers' most common motives and techniques.
Posted: 08 Jul 2015 | Premiered: 08 Jul 2015

Dell SecureWorks

Website Security Threat Report Part 2
sponsored by Symantec Corporation
WHITE PAPER: Download part 2 of this Website Security Threat Report for the latest on the fast-evolving world of targeted attacks - from cyber espionage tactics to denial of service, spear-phishing and watering hole attacks.
Posted: 07 Jul 2015 | Published: 07 Jul 2015

Symantec Corporation

Website Security Threat Report Part 1
sponsored by Symantec Corporation
WHITE PAPER: This website security threat report will give enterprises, small businesses and consumers essential information to help secure their systems from threat vulnerabilities. Continue reading to access emerging trends in attacks, malicious code activity, phishing, and spam.
Posted: 07 Jul 2015 | Published: 07 Jul 2015

Symantec Corporation

Information Security Asean July 2015
sponsored by TechTarget ANZ
EZINE: Cyber-crime is a global phenomenon. No business is safe if they fail to implement the right security products and policies.
Posted: 07 Jul 2015 | Published: 07 Jul 2015


Countdown to Compromise: The Timeline of a Spear-Phishing Attack
sponsored by Mimecast
WHITE PAPER: This white paper uses a typical spear-phishing scenario to demonstrate the dangers spear-phishing poses.
Posted: 07 Jul 2015 | Published: 07 Jul 2015

Mimecast

Information Security ANZ July 2015
sponsored by TechTarget ANZ
EZINE: Analysts and security experts discuss the current risk factors in the ANZ region.
Posted: 07 Jul 2015 | Published: 07 Jul 2015


IBM 2015 Cyber Security Intelligence Index
sponsored by IBM
WHITE PAPER: This infographic gives you a quick breakdown of just how prevalent cyber breaches are and how much danger your organization may be in.
Posted: 07 Jul 2015 | Published: 07 Jul 2015

IBM

Determining the Right Mobile Security Solution for Your Organization
sponsored by IBM
WHITE PAPER: This helpful white paper presents the steps every organization should take before committing to a mobile security solution, and examines the pros and cons of different potential security strategies.
Posted: 06 Jul 2015 | Published: 07 Aug 2014

IBM

The Changing Face of Security Management
sponsored by Global Knowledge
WHITE PAPER: Access this white paper to learn how you can implement a threat based, network cognizant security system that is prepared for the constantly changing landscape of security.
Posted: 02 Jul 2015 | Published: 02 Jul 2015

Global Knowledge

The Day after Tomorrow: Cyber-Crisis Management at the Speed of Twitter
sponsored by Hewlett-Packard Limited
WEBCAST: In this video, a security expert discusses why the first 48 hours after a cyber-breach are vital to preserving your business and its reputation.
Posted: 01 Jul 2015 | Premiered: Jun 4, 2015

Hewlett-Packard Limited

Network Forensics for Attack Mitigation
sponsored by Global Knowledge
WHITE PAPER: This white paper explains how network forensics are emerging as a key solution to limiting the damage of network malware attacks.
Posted: 01 Jul 2015 | Published: 01 Jul 2015

Global Knowledge

10 Things Security Experts Wish End Users Knew
sponsored by Global Knowledge
WHITE PAPER: In this white paper, you'll learn the 10 concerns that security experts want end users to know about security at work and at home.
Posted: 01 Jul 2015 | Published: 01 Jul 2015

Global Knowledge
76 - 100 of 553 Matches Previous Page    2 3 4 5 6 7    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement