IT Management  >   Systems Operations  >   Security  >  

Cybersecurity

RSS Feed   
ALSO CALLED: Cyber Security, Cyber Security Enhancement Act of 2002
DEFINITION: Information assurance, including information security, information technology disaster recovery, and information privacy. See Section 225, Cyber Security Enhancement Act of 2002, of the Homeland Security Act.
Cybersecurity White Papers (View All Report Types)
1 - 25 of 352 Matches Previous Page  |  Next Page
The First 72-Hours: How to Approach the Initial Hours of a Security Incident
sponsored by Fidelis
WHITE PAPER: Over the course of responding to thousands of critical security incidents, Fidelis Security has seen organizations approach the initial hours of an incident in every conceivable way. In this white paper, discover the 1st steps security teams should take when responding to an incident.
Posted: 20 Sep 2019 | Published: 20 Sep 2019

Fidelis

What's the Difference Between UEM and MTD?
sponsored by Wandera
WHITE PAPER: Two security tools that many often mix up are Unified Endpoint Management (UEM) and Mobile Threat Defense (MTD). In this white paper, learn about the key capabilities and use cases for both security tools to determine which one is better for your organization.
Posted: 20 Sep 2019 | Published: 20 Sep 2019

Wandera

A Field Guide to Understanding the Tactics, Techniques and Attack Vectors Used by Cybercriminals
sponsored by Radware
WHITE PAPER: The threat landscape is as diverse as it is sophisticated, thanks largely to the fact that the skills and tools behind launching cyberattacks have become commoditized. In Radware's Hacker's Almanac, gain an understanding the threat landscape and current tactics, techniques and procedures used by today's cybercriminals.
Posted: 20 Sep 2019 | Published: 20 Sep 2019

Radware

SSL Attacks on the Rise
sponsored by Radware
WHITE PAPER: As is always the trend, mass adoption of certain technologies is followed closely by efforts to exploit its wide use through a number of security threats. SSL is no exception to this rule. Download this white paper, to learn everything you need to know about SSL attacks and how to protect against them.
Posted: 19 Sep 2019 | Published: 19 Sep 2019

Radware

2019 State of OT/ICS Cybersecurity Survey
sponsored by Nozomi Networks
WHITE PAPER: In this 2019 SANS OT/ICS cybersecurity survey, explore the challenges with design, operation and risk management of an industrial control system (ICS), its cyber assets and communication protocols, and supporting operations.
Posted: 18 Sep 2019 | Published: 12 Jun 2019

Nozomi Networks

Detecting and Preventing Cybercrime and Fraud
sponsored by Concur Technologies
WHITE PAPER: In this white paper, explore what CFOs from some of Australia's leading businesses have to say about their cybercrime and fraud experiences and the risks facing their businesses today. Also, explore advice for businesses looking to tackle fraud.
Posted: 18 Sep 2019 | Published: 18 Sep 2019

Concur Technologies

The New Age of Fraud
sponsored by Concur Technologies
WHITE PAPER: Today, there is a realization that fraud is an enterprise risk that falls in the same realm as supply chain, disaster and regulatory risks. But how can companies prevent, detect and mitigate this risk? In this white paper, examine how companies are putting a microscope on employee spend to better prevent and detect fraud across their business.
Posted: 18 Sep 2019 | Published: 31 Aug 2019

Concur Technologies

Threat Models and Methodologies
sponsored by Blackberry Cylance
WHITE PAPER: This white paper explores what MITRE has achieved in creating the ATT&CK Enterprise framework, and how security practitioners can leverage it to better dissect and assess the security problems at hand. Download now to learn more.
Posted: 17 Sep 2019 | Published: 17 Sep 2019

Blackberry Cylance

Comprehensive Security for Your Applications
sponsored by VMware
WHITE PAPER: Despite cybersecurity being a top priority, organizations continue to fall short protecting against threats. In this white paper, learn how VMware can help your organization to architect security into your infrastructure to better secure your applications and data.
Posted: 17 Sep 2019 | Published: 31 Dec 2018

VMware

Securing Transportation Infrastructure
sponsored by Cyber-Ark Software
WHITE PAPER: Privileged accounts, and the access they provide, represent the largest security vulnerabilities for transportation organizations today. In this white paper, learn how transit or infrastructure organizations can secure their privileged accounts, credentials and secrets.
Posted: 16 Sep 2019 | Published: 30 Apr 2019

Cyber-Ark Software

TPCRM 101: A Guide for Beginners
sponsored by CyberGRX
WHITE PAPER: As organizations increasingly rely on third parties, their ecosystems become more vulnerable to third-party cyber risk. Implementing an effective third-party cyber risk management (TPCRM) program is essential to securing your organization's cyber ecosystem. In this white paper, learn everything you need to know about a TPCRM program.
Posted: 12 Sep 2019 | Published: 12 Sep 2019

CyberGRX

Rethinking Third-party Cyber Risk Management
sponsored by CyberGRX
WHITE PAPER: In this white paper, ensure that your current third-party cyber risk management practices will translate into lower third-party cyber risk.
Posted: 12 Sep 2019 | Published: 12 Sep 2019

CyberGRX

Countering Evasive Threats With Moving Target Defense
sponsored by Morphisec, Inc.
WHITE PAPER: Download this white paper to learn about Moving Target Defense (MTD) and how it leverages the tactics used by sophisticated attackers — deception, modification and polymorphism — to level the cybersecurity playing field.
Posted: 11 Sep 2019 | Published: 11 Sep 2019

Morphisec, Inc.

6 Ways to Make Your Security Stack Work Harder
sponsored by Cisco Umbrella
WHITE PAPER: The average company uses more than 50 security vendors. And sometimes you still find your stack coming up short when it comes to securing users anywhere they access the internet. In this white paper, check out 6 ways to amplify and extend your stack with cloud security from Cisco Umbrella.
Posted: 10 Sep 2019 | Published: 10 Sep 2019

Cisco Umbrella

Using MITRE ATT&CK in Threat Hunting and Detection
sponsored by LogRhythm, Inc.
WHITE PAPER: ATT&CK can be used in many different ways to improve cybersecurity efforts. This white paper focuses on how you can use ATT&CK to enhance, analyze and test your threat detection efforts. Download this white paper to learn how you can ensure comprehensive, up-to-date, and verifiable threat detection.
Posted: 10 Sep 2019 | Published: 10 Sep 2019

LogRhythm, Inc.

Security Readout: 2019 Trends for Remote and Roaming User Security
sponsored by Cisco Umbrella
WHITE PAPER: It's no secret that the way people work has changed dramatically over the past few years. In this white paper, explore the complex factors that make remote and roaming user security a challenge, and the emerging solutions best positioned to meet the needs of today's increasingly distributed enterprise.
Posted: 09 Sep 2019 | Published: 09 Sep 2019

Cisco Umbrella

Server Security Lies Deep in Hardware
sponsored by HPE and Intel®
WHITE PAPER: Jump inside this white paper to learn how to adapt your server refresh strategy to the rising frequency of hardware attacks. Plus, get a closer look at some of the latest server models being purpose-built to withstand the capabilities of modern cyberattacks.
Posted: 06 Sep 2019 | Published: 06 Sep 2019

HPE and Intel®

Trend Report: Employees Like to Use Unsanctioned Apps — and Don't Plan to Stop
sponsored by Cisco Umbrella
WHITE PAPER: Employees are downloading apps to do their work faster, but this is causing risk to the business. IT can't secure what it can't see, which means threats can creep in. In this white paper, learn how Cisco Umbrella can help you discover which SaaS apps are being used, who's using them, and what risks they pose to your organization.
Posted: 06 Sep 2019 | Published: 06 Sep 2019

Cisco Umbrella

Remove Assumptions, Prove Security
sponsored by Verodin
WHITE PAPER: With no visibility into their cybersecurity effectiveness beyond a point in time, organizations have grown accustomed to holding a reactionary stance when managing their cybersecurity risks. Learn about Verodin SIP, an evidence based approach to managing your cybersecurity lifecycle.
Posted: 05 Sep 2019 | Published: 05 Sep 2019

Verodin

5 Ways to Reduce Risk and Boost Productivity
sponsored by Citrix
WHITE PAPER: While IT must enable both the flexibility employees need to be productive and the security the business requires, this balancing act often ends in compromise. In this white paper, explore 5 ways a secure digital workspace can reduce risk and boost productivity.
Posted: 05 Sep 2019 | Published: 05 Sep 2019

Citrix

Defending the Digital Enterprise
sponsored by Gigamon
WHITE PAPER: Given the amount of encrypted traffic and the threat vector it now poses, you need a way to efficiently decrypt traffic, share it with tools and then re-encrypt it. In this white paper, discover 7 things you need to do to successfully decrypt your SSL and TLS traffic.
Posted: 05 Sep 2019 | Published: 05 Sep 2019

Gigamon

Trend Report: More Organizations are Using a Secure Internet Gateway for Secure Access
sponsored by Cisco Umbrella
WHITE PAPER: Security leaders need to find a way to give users back their freedom while still protecting sensitive data. In this white paper, learn how a Secure Internet Gateway (SIG) can do just that by providing workers with safe access to the internet – no matter what device they're using or where they're located.
Posted: 05 Sep 2019 | Published: 05 Sep 2019

Cisco Umbrella

Making Application & Infrastructure Vulnerability Management More Effective
sponsored by ZeroNorth
WHITE PAPER: Organizations are struggling to keep up with the dizzying pace it takes to roll out new software capabilities, which only deepens the challenge of keeping up with risks across applications and infrastructure. In this white paper, discover 5 steps you can take to help begin your Application and Infrastructure Vulnerability Management Program.
Posted: 05 Sep 2019 | Published: 05 Sep 2019

ZeroNorth

Advanced Protection for Web Applications on AWS
sponsored by Amazon Web Services
WHITE PAPER: As companies migrate business-critical applications from their on-premises infrastructure to the cloud, they increase their exposure to known and unknown targeted attacks. In this white paper, learn how organizations can combat these threats by deploying a security solution designed specifically for internet-facing applications such as a WAF.
Posted: 04 Sep 2019 | Published: 21 Aug 2019

Amazon Web Services

5 Considerations for Evaluating a Modern Enterprise Security Platform.
sponsored by Verizon
WHITE PAPER: Security teams will be stretched thin. The jobs they perform will become increasingly more complex given the continued proliferation of attacks. To meet these challenges, practitioners are considering new solutions and approaches. Download this white paper to explore 5 considerations for evaluating a modern enterprise security platform.
Posted: 03 Sep 2019 | Published: 28 Feb 2019

Verizon
1 - 25 of 352 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement