IT Management  >   Systems Operations  >   Security  >  

Cyber Security Enhancement Act of 2002

RSS Feed   
Cyber Security Enhancement Act of 2002 White Papers (View All Report Types)
 
Top 10 Security Events to Monitor in Azure Ad and Microsoft 365
sponsored by Quest
WHITE PAPER: Although cloud environments enable organizations to be more efficient, it often comes at the cost of additional vulnerabilities. In this e-book, take a closer look a 10 security events that administrators track closely to keep their cloud environments secure.
Posted: 28 May 2020 | Published: 28 May 2020

Quest

Lay Your Security Tech Foundation
sponsored by TITUS
WHITE PAPER: Today’s data breaches have legal, financial and reputational implications, and overcoming this challenge is made more difficult by increasingly complex and stringent regulations. Download the following Forrester report, which outlines 4-step approach to help organizations get started with building their strategies around these challenges.
Posted: 25 Jun 2020 | Published: 24 Jun 2020

TITUS

The Ransomware-as-a-Service Evolution Is Here, with Its Sights on Your Mainframe
sponsored by BMC
WHITE PAPER: The latest iteration of ransomware, known as Ransomware-as-a-service (RaaS), provides hackers with access to ransomware resources in exchange for sending a portion of each ransom to the malware programmer. So, what proactive steps can organizations take against ransomware groups? Read this white paper to find out.
Posted: 10 Jun 2020 | Published: 10 Jun 2020

BMC

Discovery-In-Depth: The Path to Data Intelligence
sponsored by BigID
WHITE PAPER: Data discover is the foundational element of an effective data management strategy – and discovery enables data intelligence, insight and analysis. Download this white paper and discover how to leverage multiple modes of data discovery in order to successfully find & identify sensitive data.
Posted: 02 Jul 2020 | Published: 02 Jul 2020

BigID

Auth0’s Approach to Information Security Identity in the Real World
sponsored by Auth0
WHITE PAPER: Identity solutions, like any cybersecurity tool, require more than just strength and ability – they need to be flexible in order to meet the needs of your business environment and fit into your strategy. This white paper takes a closer look at the role of extensibility and practicality for identity solutions, read on to learn more.
Posted: 02 Jul 2020 | Published: 02 Jul 2020

Auth0

How to Ensure NIAP Mobile Application Compliance
sponsored by NowSecure
WHITE PAPER: Mobile applications allow for improved business operations and more seamless experience. However, for federal agencies, the heavy burden of ensuring each app meets the National Information Assurance Partnership (NIAP) security requirements causes a massive roadblock. Download this white paper to learn ease this headache.
Posted: 19 Jun 2020 | Published: 19 Jun 2020

NowSecure

Essential Elements of a Penetration Test
sponsored by Synack
WHITE PAPER: A recent study from the White House indicated that cyberattacks cost the economy between $57 and $109 billion. In order to avoid the financial, legal and reputational damage of an attack, organizations are looking to penetration tests. In this white paper, discover why penetration tests are so critical and the emergence of crowdsource testing.
Posted: 27 May 2020 | Published: 27 May 2020

Synack

The Business Case for Cloud Threat Defense
sponsored by Palo Alto Networks
WHITE PAPER: In order to protect the growing security and compliance requirements needed to protect cloud data and applications, organizations are implementing cloud threat defenses. Download this white paper to get a better understanding of the benefits, costs, issues and risks associated with implementing cloud threat defenses.
Posted: 09 Jun 2020 | Published: 09 Jun 2020

Palo Alto Networks

Application Security Risk Report
sponsored by Micro Focus
WHITE PAPER: As organizations continue to embrace the productivity and collaboration benefits of business applications, it’s important to understand that hackers are constantly developing new techniques to exploit these applications. Download this research report for a comprehensive look at the trending attack methods and risks to keep an eye on.
Posted: 12 Jun 2020 | Published: 12 Jun 2020

Micro Focus

SANS Institute: Cloud Security Survey Results
sponsored by ExtraHop
WHITE PAPER: The SANS Institute conducts an annual survey designed to better understand how organizations are using cloud capabilities, the most prominent threats to cloud environments and assets, and best practices for improving security. Read on to unlock the 2019 report.
Posted: 19 Jun 2020 | Published: 31 May 2019

ExtraHop
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info