Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Criminal Law  >   Crime  >   Terrorism  >  

Information Wars

RSS Feed    Add to Google    Add to My Yahoo!
Information Wars Reports
 
Wright State University Expels Email Threats and Minimizes Risks with a Proactive Defense
sponsored by Proofpoint, Inc.
CASE STUDY: Wright State University faced a huge challenge in securing email and other communications, due to their highly transient student body of 18,000. In this concise case study, learn how the university was able to meet email and web security challenges like phishing, ransomware and malware.
Posted: 15 Mar 2017 | Published: 30 Dec 2016

Proofpoint, Inc.

Terrorist use of the internet
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Terrorists are using web technology to help them launch cyber-attacks. What are the current and future threats?
Posted: 23 May 2014 | Published: 23 May 2014

ComputerWeekly.com

Underexposed risks of public Wi-Fi hotspots
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security series assess the hidden security risks of public Wi-Fi  hotspots.
Posted: 15 Mar 2013 | Published: 15 Mar 2013

ComputerWeekly.com

The Threat Lifecycle Management Framework
sponsored by LogRhythm, Inc.
WHITE PAPER: You can lessen your organization's risk of experiencing a damaging cyber incident or data breach by understanding six key phases of threat lifecycle management (TLM). Discover how integrated TLM capabilities can optimally reduce mean time to detect (MTTD) and mean time to respond (MTTR).
Posted: 30 Nov 2016 | Published: 30 Nov 2016

LogRhythm, Inc.

Securing DNS: What to Do, and What to be Aware of
sponsored by Cisco Umbrella
EGUIDE: In order to understand how DNS attacks work, it is important to understand DNS security weaknesses. In this e-guide, security pros Peter Wenham and Vladimir Jirasek reveal best practices and recommendations for securing DNS and staying ahead of its vulnerabilities.
Posted: 27 Jul 2017 | Published: 24 Jul 2017

Cisco Umbrella

Cybercrime and the Healthcare Industry
sponsored by RSA
WHITE PAPER: As technologies in healthcare continue to evolve, so will the cybercriminal activity targeted at healthcare organizations progress as well. This paper takes a look into cybercrime in the healthcare industry and discusses why access to data and information is fast becoming a target of scrutiny and risk.
Posted: 21 Jun 2011 | Published: 21 Jun 2011

RSA

Real Time Endpoint Compliance for Continuous Diagnostics and Mitigation
sponsored by IBM
WHITE PAPER: Access this white paper to explore an endpoint management solution that will help federal agencies continuously monitor, manage, and detect vulnerabilities across their critical networks.
Posted: 08 Apr 2014 | Published: 31 Oct 2013

IBM

Businesses Eye VDI Security to Fight Cyberattacks
sponsored by Citrix
EGUIDE: The rise of data breaches puts security as a top priority in businesses, and VDI is a layer that can help IT minimize the number of vulnerable endpoints. Download our e-guide to learn how VDI security can bulk up your defenses against cyberattacks.
Posted: 20 Dec 2016 | Published: 15 Dec 2016

Citrix

The Reality of Cyber Warfare
sponsored by AT&T Corp
WHITE PAPER: Examine the topic of trench warfare in a cyber-world and discover many factors you need to know about these potentially disastrous events.
Posted: 28 Mar 2012 | Published: 13 Dec 2011

AT&T Corp

Combat Cybercrime, Demonstrate Compliance and Streamline IT Operations
sponsored by ArcSight, an HP Company
WHITE PAPER: This whitepaper discusses the requirements for a universal log management solution and specifically describes how ArcSight Logger 4 delivers on those requirements. A recent cyberespionage incident at Boeing Corporation is highlighted as an example. Read more to find out.
Posted: 02 Mar 2010 | Published: 02 Mar 2010

ArcSight, an HP Company
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement