IT Management  >   Systems Operations  >   Security  >  

Cybersecurity

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Cyber Security, Cyber Security Enhancement Act of 2002
DEFINITION: Information assurance, including information security, information technology disaster recovery, and information privacy. See Section 225, Cyber Security Enhancement Act of 2002, of the Homeland Security Act.
Cybersecurity Reports
76 - 100 of 694 Matches Previous Page  |  Next Page
Disrupt the Machine-to-Human Fight with a New Defender Lifecycle Model in Security Operations
sponsored by Gigamon
WHITE PAPER: In this white paper, learn how Gigamon's security delivery platform combats breaches and cyberattacks by integrating machine learning, artificial intelligence (AI) and security workflow automation.
Posted: 20 Sep 2017 | Published: 31 Jul 2017

Gigamon

Defender Lifecycle Model
sponsored by Gigamon
RESOURCE: In this short solution brief, learn how the Defender Lifecycle Model can help network viability to automate and accelerate the identification of threats.
Posted: 19 Sep 2017 | Published: 31 Aug 2017

Gigamon

IT Security and the Devops Environment
sponsored by CyberArk Software, Inc
WEBCAST: DevOps environments are unique because of the speed and scale at which they work. Watch this webcast to reveal characteristics regarding DevOps environments as well as the security aspects of DevOps.
Posted: 19 Sep 2017 | Premiered: Sep 19, 2017

CyberArk Software, Inc

IT Security and the Devops Environment
sponsored by CyberArk Software, Inc
WEBCAST: Watch this webcast to reveal how to improve application and infrastructure security and to engage in methods of delivering security that don't interrupt the fast flow and time to delivery.
Posted: 19 Sep 2017 | Premiered: Sep 19, 2017

CyberArk Software, Inc

Guide to Early Application Testing and Understanding Dev and Ops Responsibilities
sponsored by IBM
EGUIDE: Explore the importance of early application security testing. Learn from Owen Garrett, Head of Products for NGINX Inc., while he explains the security risks with containers and developing microservices.
Posted: 19 Sep 2017 | Published: 19 Sep 2017

IBM

How to Think like a Hacker to Stop Application Security Threats
sponsored by IBM
EGUIDE: Find out how applying the hacker mindset when setting application security standards can help uncover flaws that vulnerability scanners might not recognize.
Posted: 19 Sep 2017 | Published: 19 Sep 2017

IBM

How to Increase Security for your Login on Mobile Applications
sponsored by IBM
EGUIDE: In this expert e-guide, learn techniques to improve security for your mobile login information and messaging applications to help stop unauthorized users from accessing your personal data.
Posted: 19 Sep 2017 | Published: 19 Sep 2017

IBM

How to Secure Mobile Applications in a Private Cloud
sponsored by IBM
EGUIDE: In this expert e-guide, uncover the benefits and challenges of creating a private app store to control and monitor the delivery of properly secured mobile applications.
Posted: 19 Sep 2017 | Published: 19 Sep 2017

IBM

How to Boost Mobile Application Security
sponsored by IBM
EGUIDE: In this expert e-guide, discover ways to boost mobile application security by performing regular assessments to help eliminate an enterprise's vulnerability to data breaches and attacks.
Posted: 19 Sep 2017 | Published: 19 Sep 2017

IBM

Get your Enterprise Ready for GDPR
sponsored by CyberArk Software, Inc
WHITE PAPER: Take a closer look at this white paper to reveal a checklist for securing personal data to prepare for the GDPR.
Posted: 19 Sep 2017 | Published: 19 Sep 2017

CyberArk Software, Inc

Proactively Protect Against Ransomware
sponsored by CyberArk Software, Inc
WEBCAST: Watch this webcast to reveal steps your organization can proactively take to prevent and not react to the threat of ransomware.
Posted: 19 Sep 2017 | Premiered: Sep 19, 2017

CyberArk Software, Inc

Top 10 AWS Cloud Security Risks and how to Resolve them
sponsored by evident.io
WHITE PAPER: While AWS ensures the security of the cloud, you have a responsibility to manage the security of your data and systems in the cloud. Uncover 10 security risks found in AWS deployments, why they are important, and how they are remediated.
Posted: 19 Sep 2017 | Published: 19 Sep 2017

evident.io

16 Ways to Protect your Cloud from Ransomware
sponsored by evident.io
EBOOK: Read this e-book to uncover 16 steps your organization can take to protect your cloud from ransomware.
Posted: 19 Sep 2017 | Published: 19 Sep 2017

evident.io

How to Build an Enterprise Application Security Program
sponsored by IBM
EGUIDE: In this e-guide, learn the key steps to building an enterprise application security program to decrease exposure to potential attackers through statics and dynamic application testing.
Posted: 18 Sep 2017 | Published: 18 Sep 2017

IBM

Forensic State Analysis: A New Approach to Threat Hunting
sponsored by Infocyte
WEBCAST: Watch this SANS Institute webcast to uncover strategies to reduce the dwell time of attackers and improve your threat hunting techniques.
Posted: 18 Sep 2017 | Premiered: Apr 3, 2017

Infocyte

Mass Transit Agency Hunts Down Cybersecurity Threats with Infocyte
sponsored by Infocyte
CASE STUDY: Read this case study to discover how a mass transit agency overcame the issue of vulnerable IT infrastructure by implementing a threat hunting platform. Discover the threats they uncovered.
Posted: 18 Sep 2017 | Published: 31 Dec 2016

Infocyte

Aruba Campus Switching: The Foundation for the Modern Digital Workplace
sponsored by Aruba Networks
WHITE PAPER: In this white paper, learn the key benefits of different types of campus switching tools to prepare your network infrastructure for the increase of doing business on mobile.
Posted: 18 Sep 2017 | Published: 18 Sep 2017

Aruba Networks

Improve End-to-end Security with Aruba Clearpass
sponsored by Aruba Networks
RESOURCE: In this resource, learn how to protect all devices corporate, IoT, BYOD- wired and wirelessly to tighten up end-to-end security from unauthorized users.
Posted: 18 Sep 2017 | Published: 18 Sep 2017

Aruba Networks

The Total Economic Impact Of xMatters
sponsored by xMatters, Inc.
RESEARCH CONTENT: In this research report, Forrester Consulting shares the ROI from organizations that used xMatters as their communications and notifications platform.
Posted: 15 Sep 2017 | Published: 31 Jan 2017

xMatters, Inc.

Automate Log Management to Meet NIST 800-53 Compliance
sponsored by LogRhythm, Inc.
WHITE PAPER: The collection, management, and analysis of log data is integral to meeting many NIST 800-53 requirements. Explore how a log management and analysis platform can help your company meet or exceed these guidelines.
Posted: 15 Sep 2017 | Published: 31 Dec 2014

LogRhythm, Inc.

How to Build a SOC with Limited Resources
sponsored by LogRhythm, Inc.
WHITE PAPER: Read this white paper to discover the knowledge needed to successfully build your own security operations center (SOC).
Posted: 15 Sep 2017 | Published: 15 Sep 2017

LogRhythm, Inc.

11 Security Analytics Providers Slug it Out
sponsored by LogRhythm, Inc.
WHITE PAPER: Forrester surveys indicate that 74% of global enterprise security technology decision makers rate improving security monitoring as a high or critical priority. In this Forrester report, discover an in-depth look at 11 security analytics vendors: where they excel, fall short, and how they compare to one another.
Posted: 14 Sep 2017 | Published: 06 Mar 2017

LogRhythm, Inc.

Orchestrated Response: A Game-Changing Strategy
sponsored by IBM Resilient
WHITE PAPER: Uncover how organizations have improved their security posture by using advanced security automation and orchestration strategies to alleviate cyber threats.
Posted: 13 Sep 2017 | Published: 13 Sep 2017

IBM Resilient

Data Security in Higher Education
sponsored by J2 Cloud Services
RESOURCE: In this resource, discover how cloud faxing delivers a fast, secure, and more convenient fax service that increases satisfaction among university administration and students.
Posted: 13 Sep 2017 | Published: 14 Dec 2016

J2 Cloud Services

How Cloud Faxing Protects Confidential Customer Information
sponsored by J2 Cloud Services
RESOURCE: In this resource, recognize the risks associated with traditional faxing and learn how cloud faxing can help prevent big data breaches.
Posted: 13 Sep 2017 | Published: 23 Dec 2016

J2 Cloud Services
76 - 100 of 694 Matches Previous Page    2 3 4 5 6 7    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement