IT Management  >   Systems Operations  >   Security  >  

Cyber Security Enhancement Act of 2002

RSS Feed   
Cyber Security Enhancement Act of 2002 White Papers (View All Report Types)
State-Of-The-Art Data Protection for GDPR
sponsored by Fortinet, Inc.
WHITE PAPER: According to the Center for Internet Security, most successful attacks exploit poor cyber hygiene. In order to comply with the GDPR and prevent cyberattacks, a data protection, advanced threat prevention and detection plan is necessary. This resource offers successful data breach prevention strategies to ensure GDPR preparation.
Posted: 23 Jan 2018 | Published: 23 Jan 2018

Fortinet, Inc.

The CSO Broad-Level Reporting Survival Guide
sponsored by BitSight
WHITE PAPER: This 16-page survival guide dives into advancing the CSO/CISO-board relationship and why the board needs security leaders to fuel disciplined growth. Uncover what the board wants, how to present to the board, and tips to communicate with the board.
Posted: 06 Feb 2018 | Published: 06 Feb 2018


A Quick History of IoT Botnets
sponsored by Radware
WHITE PAPER: Gartner estimates that there will be 20 billion connected devices by 2020. Access this resource to learn about the history of IoT botnets and how the rise of connected devices can bring upon the rise of dangerous bot attacks.
Posted: 22 Feb 2018 | Published: 22 Feb 2018


Navigating the General Data Protection Regulation Mini Guide
sponsored by McAfee, Inc.
WHITE PAPER: As they face numerous regulations, enterprises believe data privacy can create a competitive advantage. But are they ready for the new GDPR enforcement? Here are the concerns and strategies of 800+ senior executives from industries around the world.
Posted: 12 Mar 2018 | Published: 12 Mar 2018

McAfee, Inc.

Cyber Resilience in the Modern SOC: Why Detection and Prevention is Not Enough
sponsored by IBM Resilient
WHITE PAPER: Organizations are failing at early breach detection, with more than 80% of breaches undetected by the breached organization, according to Gartner. This resource explores cyber resilience in the modern SOC and reveals why detection and prevention is no longer enough for effective security.
Posted: 12 Mar 2018 | Published: 12 Mar 2018

IBM Resilient

13 Essential Steps to Meeting the Security Challenges of the EU GDPR
sponsored by Tenable, Inc.
WHITE PAPER: This resource offers assistance to information security professionals in prioritizing changes and additions to their information security programs in preparation for GDPR.
Posted: 06 Feb 2018 | Published: 06 Feb 2018

Tenable, Inc.

End the Struggle with InfoSec Policies and Standards through Risk & Compliance Integration
sponsored by Edgile
WHITE PAPER: Information security policies and standards can oftentimes cause confusion and even liability within an organization. This resource details 4 pitfalls of a compliance-only approach and offers a secure method to complying with policies and standards through a risk-integrated approach.
Posted: 25 Jan 2018 | Published: 25 Jan 2018


The Confidence Crisis: Protecting Applications Against Data Theft and Bot Attacks
sponsored by Radware
WHITE PAPER: 68% of retailers lack certainty they could secure credit card data during peak demand periods, according to the National Retail Federation. Take a look at this report to gain insight into protecting applications against data theft and bot attacks targeting various industries.
Posted: 27 Feb 2018 | Published: 27 Feb 2018


Improving IAM in Today's Connected Enterprise
sponsored by Entrust, Inc.
WHITE PAPER: Instead of relying on dated measures, organizations can make authentication practices more robust by incorporating mobile devices into the mix. Explore this resource to gain insight into leveraging mobile devices to enhance authentication security as well as augment IAM approaches overall.
Posted: 16 Mar 2018 | Published: 16 Mar 2018

Entrust, Inc.

4 Essential Strategies for Endpoint Security and Protection
sponsored by Absolute
WHITE PAPER: Endpoint devices are the single largest group of devices inside your network today. Disruption of endpoints can have a serious impact on your day to day business operations. This resource offers 4 essential strategies to improve your endpoint security and protection.
Posted: 30 Jan 2018 | Published: 30 Jan 2018


About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement