IT Management  >   Systems Operations  >   Security  >  

Cyber Security

RSS Feed   
Cyber Security White Papers (View All Report Types)
 
Using Machine Learning and Analytics to Close the Security Skills Gap
sponsored by RSA
WHITE PAPER: This resource provides insight into utilizing analytics and machine learning to reduce the load on security professionals, while increasing visibility and predicting attackers' next steps.
Posted: 19 Dec 2017 | Published: 19 Dec 2017

RSA

The Art of Application Security: Getting Started with DevSecOps
sponsored by WhiteHat Security
WHITE PAPER: According to the Verizon DBIR, 60% of breaches involved web app attacks. Take a look at this white paper to discover best practices for application security as well as a case study example to prove the benefits of the application security best practices.
Posted: 17 Jan 2018 | Published: 17 Jan 2018

WhiteHat Security

Building a Secure Foundation to Reduce Cyber Risk
sponsored by Tenable, Inc.
WHITE PAPER: According to the Dimensional Research survey "Trends in Cybersecurity Frameworks and Foundational Controls", 52% of respondents said their cybersecurity program has major gaps or weaknesses, or many minor ones. This resource offers a strategy for building a secure foundation to reduce cyber risks within your organization.
Posted: 06 Feb 2018 | Published: 06 Feb 2018

Tenable, Inc.

Banking on Cybersecurity
sponsored by HyTrust
WHITE PAPER: According to PWC's Global Economic Crime Survey, cybercrime has jumped to the second-most reported economic crime and financial organizations are prime targets. This white paper offers best practices to strengthen data security and regulatory compliance in financial services.
Posted: 11 Dec 2017 | Published: 11 Dec 2017

HyTrust

IAM as a Foundation for Your AWS Migration Strategy
sponsored by Identity Automation
WHITE PAPER: Using IAM as the foundation of your AWS migration can reduce complexity, smooth out the overall process, and help ensure a successful transition to the cloud. This white paper offers strategies for enhancing your AWS deployment with an IAM approach.
Posted: 16 Jan 2018 | Published: 16 Jan 2018

Identity Automation

The GDPR from a North American Perspective
sponsored by Sophos
WHITE PAPER: 54% of US Multinationals have the GDPR as the number 1 data protection priority, according to a 2017 PWC study. This white paper discusses how the GDPR will affect non-European companies and provides insights into what your company can do to prepare for the regulation.
Posted: 04 Jan 2018 | Published: 04 Jan 2018

Sophos

Evolving Threat of Botnets, Web Scraping and IoT Zombies
sponsored by Radware
WHITE PAPER: By 2020, the number of IoT units installed could reach as many as 20 billion, according to Gartner. This resource examines the severity of dangerous bots, which exploit IoT devices as weapons of attack.
Posted: 21 Feb 2018 | Published: 21 Feb 2018

Radware

Assumption of Breach: A New Approach to Cyber Security
sponsored by Carousel Industries
WHITE PAPER: According to an RSA Survey, 75% of companies have significant cybersecurity risk exposure. This white paper reveals how a layered approach to cybersecurity can help with turning 3 key elements—people, processes and technology—from security vulnerabilities to strengths.
Posted: 24 Jan 2018 | Published: 24 Jan 2018

Carousel Industries

Finding GDPR noncompliance in a mobile first world
sponsored by Lookout
WHITE PAPER: With the proliferation of mobile devices in the workplace, whether company or employee owned, there is a greater risk of data loss or leakage. Whether they know it or not, your employees are putting your company's data--and GDPR compliance--at risk. This white paper is your guide to laying out the mobile portion of your GDPR strategy.
Posted: 15 Jan 2018 | Published: 26 Oct 2017

Lookout

Privilege Manager Tool
sponsored by Thycotic
WHITE PAPER: Targeted attacks are always after accounts with highly elevated privileges on sensitive and critical systems: privileged accounts. Explore this resource to gain insight into least privilege management and endpoint security strategies.
Posted: 23 Jan 2018 | Published: 23 Jan 2018

Thycotic
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement