IT Management  >   Systems Operations  >   Security  >  

Cyber Security Enhancement Act of 2002

RSS Feed   
Cyber Security Enhancement Act of 2002 White Papers (View All Report Types)
DNS Network Traffic Volumes During the 2020 Pandemic
sponsored by Farsight Security
WHITE PAPER: The pandemic has driven more people online than ever before. By reading this study, you can comprehend how traffic volumes for passive DNS cache miss traffic have changed since the outbreak of COVID-19. 316 online sites were used for this study, and these sites spanned across 5 categories: News, travel, retail, streaming and higher education.
Posted: 01 Dec 2020 | Published: 27 May 2020

Farsight Security

Why Seconds Matter
sponsored by Palo Alto Networks
WHITE PAPER: As cyberattacks grow, security programs need to evolve to meet each new threat. Inline machine learning has emerged as one of the most effective ways of stopping new threats without sacrificing resources, time and people – read this whitepaper to learn more.
Posted: 11 Mar 2021 | Published: 11 Mar 2021

TOPICS:  Cybersecurity
Palo Alto Networks

BEST PRACTICES DNS: The First Principle Of Enterprise Security
sponsored by Infoblox
WHITE PAPER: For today’s WFH and soon-to-be-hybrid workforces, security teams must exploit DNS. As the foundation of enterprise networks, DNS can provide a layer of security intelligence otherwise not seen by security operations centers. Leverage this report to learn 5 critical questions organizations must ask of DNS security vendors.
Posted: 25 Feb 2021 | Published: 25 Feb 2021


Security Is The Key To A Dependable SD-Branch Solution
sponsored by Fortinet, Inc.
WHITE PAPER: In the era of remote work and SD-WAN, cybersecurity at the WAN, LAN and IoT device edge has becoming a growing priority. Read this white paper to learn about the role of effective security in enabling a dependable SD-Branch solution.
Posted: 05 May 2021 | Published: 05 May 2021

TOPICS:  Cybersecurity
Fortinet, Inc.

How to develop a datadriven, risk-based cybersecurity program
sponsored by Verizon
WHITE PAPER: As more organizations adopt a risk-based approach to cybersecurity, it’s critical that stakeholders and influencers ask for and get the data they need for strategic decision-making. Read this white paper to learn how to develop a data-driven, risk-based cybersecurity program.
Posted: 12 May 2021 | Published: 12 May 2021

TOPICS:  Cybersecurity

Detecting fraud in banking with the help of AI and ML software
sponsored by Innovecs LLC
WHITE PAPER: To address the challenges of modern fraud in banking, institutions are turning towards artificial intelligence (AI) and machine learning (ML) capabilities to better detect and mitigate fraud. Read this white paper to learn how AI and ML can help detect fraud in banking.
Posted: 14 Apr 2021 | Published: 14 Apr 2021

TOPICS:  Cybersecurity
Innovecs LLC

MITRE ATT&CK White Paper
sponsored by IronNet
WHITE PAPER: The MITRE ATT&CK Framework provides valuable and objective insights into the target of a threat and its current phase. Download this whitepaper to read about the 5 ways for a CISO to use the MITRE ATT&CK Framework including increasing your visibility of the threat landscape and strengthening your defensive posture now and over time.
Posted: 05 Mar 2021 | Published: 05 Mar 2021


sponsored by CyberArk Software, Inc
WHITE PAPER: Protecting today’s growing number of digital identities is becoming more and more critical. Read this white paper to learn more the key elements of a Zero Trust security strategy and discover how it can help your organization better protect its digital identities.
Posted: 12 May 2021 | Published: 12 May 2021

TOPICS:  Cybersecurity
CyberArk Software, Inc

Best Practice Makes Perfect: Malware In The New Normal
sponsored by Malwarebytes
WHITE PAPER: Over the past few years, malware attacks have grown in both frequency as well as severity – a change made more dramatic by the spread of COVID-19. But as we enter the new normal, what will malware threats and prevention efforts look like? Read this whitepaper to find out.
Posted: 11 Mar 2021 | Published: 31 Aug 2020

TOPICS:  Cybersecurity

Microservice Architectures Challenge Traditional Security Practices
sponsored by Radware
WHITE PAPER: When it comes to application security, today’s competitive landscape often forces organizations to choose between agility and security. Read this white paper to learn more about these conflicting concepts, the evolution of AppSec and its emerging security challenges.
Posted: 05 Apr 2021 | Published: 05 Apr 2021

TOPICS:  Cybersecurity

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.


All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences