IT Management  >   Systems Operations  >   Security  >  

Cybersecurity

RSS Feed   
ALSO CALLED: Cyber Security, Cyber Security Enhancement Act of 2002
DEFINITION: Information assurance, including information security, information technology disaster recovery, and information privacy. See Section 225, Cyber Security Enhancement Act of 2002, of the Homeland Security Act.
Cybersecurity White Papers (View All Report Types)
1 - 25 of 364 Matches Previous Page  |  Next Page
How Does Security Innovation Power Digital Transformation?
sponsored by ZeroNorth
WHITE PAPER: Digital transformation defined by its seeming-endless search for technological innovation. Unfortunately, security can sometimes be an afterthought for companies looking to stay ahead of the competition. In this white paper, discover how security innovation can augment digital transformation.
Posted: 24 Jan 2020 | Published: 31 Oct 2019

ZeroNorth

How to Become Cyber Resilient: A Digital Enterprise Guide
sponsored by Malwarebytes
WHITE PAPER: Tap into this white paper to explore the current market influences that impact how an organization pursues cyber resilience, the key methods that should be adopted in becoming cyber resilient, and the reasons why cyber resilience can transform an organization into a digital enterprise highly focused on growth.
Posted: 24 Jan 2020 | Published: 24 Jan 2020

Malwarebytes

The New Norm: Trend Micro Security Predictions for 2020
sponsored by Trend Micro
WHITE PAPER: Industry experts at Trend Micro recently conducted research into past cybersecurity trends to develop their predictions for ever-evolving landscape of cybersecurity threats and defense methods in 2020 and beyond. Continue to read the full report.
Posted: 24 Jan 2020 | Published: 24 Jan 2020

Trend Micro

IDC Worldwide Cloud Security Market Shares, 2018: Protecting Workloads in Hybrid and Multicloud
sponsored by Trend Micro
WHITE PAPER: SDC workload security spans threat protection, vulnerability management, analytics, and data integrity to protect what runs on top of the SDC infrastructure. This research report offers advice for technology suppliers and highlights the global market share. Read on to uncover the results.
Posted: 24 Jan 2020 | Published: 30 Nov 2019

Trend Micro

A CISO’s Guide to Fixing Flat Networks and Vulnerable Systems
sponsored by ShieldX
WHITE PAPER: Traditional perimeter security is obsolete when it comes to preventing lateral hacker movement in the cloud era. Even Gartner recommends an updated approach focused on security access at the workload level. This guide highlights the faults of traditional security tactics includes a checklist of the benefits of a micro-segmentation approach.
Posted: 24 Jan 2020 | Published: 30 Nov 2018

ShieldX

Magecart Attack on Focus Camera
sponsored by Tala Security
WHITE PAPER: Magecart attacks continue to plague websites and sensitive customer data. In this solution brief, learn how Tala Security protects against client-side attacks by exploring the features and capabilities the enable them to provide website security.
Posted: 24 Jan 2020 | Published: 24 Jan 2020

Tala Security

A CISO’s Guide to Micro-Segmentation
sponsored by ShieldX
WHITE PAPER: Micro-segmentation is growing increasingly popular amongst organizations that operate within multi-cloud environments. It focuses on the workload-level, and only allows permissions based on what the specific task requires. The following guide includes a comprehensive checklist designed to take the pain out of micro-segmentation adoption.
Posted: 23 Jan 2020 | Published: 31 Oct 2018

ShieldX

Security Controls for Effective Micro-Segmentation
sponsored by ShieldX
WHITE PAPER: With cyberattacks becoming increasingly difficult to identify and mitigate, organizations shift towards Forrester’s Zero Trust Model to protect their post-perimeter environments against lateral movements. In this white paper, explore security controls and evaluation criteria for the foundational elements of your zero-trust strategy.
Posted: 23 Jan 2020 | Published: 30 Sep 2017

ShieldX

Implementing Effective Cyberprotection Demands New Approaches
sponsored by NWN Corporation
WHITE PAPER: As cyberattackers become more skilled and launch harder-to-detect campaigns, organizations need to revise their security strategies to match the pace of modern attacks. Use this white paper to explore the 7 essential services that your chosen partner provides should include.
Posted: 23 Jan 2020 | Published: 23 Jan 2020

NWN Corporation

ESG XDR Paper: Beyond EDR
sponsored by Trend Micro
WHITE PAPER: 76% of companies feel that threat detection and response is more difficult today than it was 2 years ago. SIEM approaches are becoming too costly, and EDR tools aren’t a standalone option. So, what options, if any, do organizations have? Read on to learn more.
Posted: 23 Jan 2020 | Published: 31 Aug 2019

Trend Micro

Lattes, Lunch, and VPNs: Securing Remote Workers the Right Way
sponsored by Malwarebytes
WHITE PAPER: In this short story, following the journey of Olivia and Luciana as they face the cybersecurity threats associated with remote workers, VPNs and cloud platforms to establish the necessary technologies and employee enablement to overcome these challenges and reshape their security strategy.
Posted: 23 Jan 2020 | Published: 23 Jan 2020

Malwarebytes

How to Build a Winning Cybersecurity Team
sponsored by Global Knowledge
WHITE PAPER: Just like a sports team, cybersecurity teams need to be carefully built and managed in order to reach peak performance. Effective cybersecurity teams also require adequate processes and technologies to support their efforts. So, what should you consider when building a winning cybersecurity team? Read on to find out.
Posted: 23 Jan 2020 | Published: 23 Jan 2020

Global Knowledge

Interview with Identity Expert
sponsored by Mitek Systems, Inc.
WHITE PAPER: In this Q and A, the head of risk and payments at an American money transfer company sits down with the customer success leader at Mitek to talk about role of identity verification in innovation and how increasing regulations will affect financial institutions. Read on to learn more.
Posted: 23 Jan 2020 | Published: 21 Jan 2020


Emerging Technology Analysis: SOAR Solutions
sponsored by ThreatQuotient
WHITE PAPER: Although SOAR and SIEM share similar security capabilities, they are distinct markets unlikely to consolidate. However, technology leaders at SOAR providers need to understand this distinction in order to build upon existing SIEM services. This deep dive from Gartner focuses on SOAR and offers recommendations for SOAR providers.
Posted: 22 Jan 2020 | Published: 07 Dec 2018

ThreatQuotient

Cybercrime Tactics and Techniques: Ransomware Retrospective
sponsored by Malwarebytes
WHITE PAPER: In this edition of Cybercrime Tactics and Techniques, take an in-depth look into ransomware attacks over the past few years – attack methods, common targets and notable subcategories. In addition, this report will consider where ransomware will go next, and how to prepare. Read on to reveal the full report.
Posted: 21 Jan 2020 | Published: 31 Aug 2019

Malwarebytes

Interview with Fraud Strategy Leader
sponsored by Mitek Systems, Inc.
WHITE PAPER: In this Q and A, the fraud strategy leader at a mobile-only banking app sits down with the customer success leader at Mitek to talk about why customer experience is critical to business success and the vital role it plays in identity verification.
Posted: 21 Jan 2020 | Published: 21 Jan 2020


Onboarding IT Service Providers Shouldn’t be Complicated, Costly, or Risky
sponsored by Tehama
WHITE PAPER: Enterprises need to secure, accelerate, and simplify how they onboard external third parties and provide access to critical and vulnerable systems while mitigating the cybersecurity risks. This white paper goes in-depth into the associated risks and outlines potential tactics for ensuring security during the onboarding process.
Posted: 20 Jan 2020 | Published: 31 Jan 2019

Tehama

Buyer’s Guide Digital Identity Verification
sponsored by Mitek Systems, Inc.
WHITE PAPER: Much of today’s customer interaction is done via digital interactions. As this trend continues to grow, organizations need to ensure that they balance customer experience with security. This buyer’s guide provides an overview of current identity verification tools as well as an evaluation workbook to steer you towards an informed decision.
Posted: 20 Jan 2020 | Published: 31 May 2019


Buyer’s Guide to Threat Intelligence Platforms
sponsored by ThreatQuotient
WHITE PAPER: As organizations begin to build their threat intelligence operations, they must consider how they will organize their data. Threat intelligence platforms (TIPs) give IT teams the visibility required to make the most of existing resources. Read this white paper to learn more about TIP, and how to go about making an informed buying decision.
Posted: 20 Jan 2020 | Published: 31 Mar 2018

ThreatQuotient

Endpoint Protection
sponsored by Malwarebytes
WHITE PAPER: Networks are expanding to include remote devices that exist outside of the traditional perimeter, and organizations require modern endpoint security services. In this white paper, uncover the results from Info-Tech’s Data Quadrant Report on endpoint security to ensure your organization is equipped to make an informed buying decision.
Posted: 17 Jan 2020 | Published: 30 Jun 2019

Malwarebytes

How to Safeguard Against Cross-Site Scripting (XSS) Attacks
sponsored by Tala Security
WHITE PAPER: Cross-site scripting (XSS) attacks are a rising concern for all industries and will continue to be a favored strategy for cybercriminals. With a proactive and strategic approach, your organization can ensure web application security. Read on to learn more.
Posted: 17 Jan 2020 | Published: 17 Jan 2020

Tala Security

Datrium Ransomware Protection
sponsored by Datrium
WHITE PAPER: A recent study found that 1 in 2 companies have suffered a DR event in the past 2 years—and half of those from ransomware. In this white paper, Datrium highlights the categories of ransomware attacks and how to defend against them. Read on to learn more.
Posted: 17 Jan 2020 | Published: 17 Jan 2020

Datrium

6 Practical Approaches to Bridge the Cybersecurity Talent Shortage
sponsored by Alert Logic
WHITE PAPER: Many organizations are adopting new and emerging technologies faster than they can address related security issues. The situation is further exacerbated by the industry’s skills and resources gap. In this white paper, discover 6 practical approaches to bridge the cybersecurity skills and resource gap in your organization.
Posted: 17 Jan 2020 | Published: 17 Jan 2020

Alert Logic

New Topics on the New Security+ SY0-501 Exam
sponsored by Global Knowledge
WHITE PAPER: In 2017, the revised version of the CompTIA Security+ exam was made available, with more focus on risk management and mitigation. This white paper will guide you in your efforts to prepare for the exam by outlining the new topics included in the objectives list for the current version of the exam.
Posted: 16 Jan 2020 | Published: 16 Jan 2020

Global Knowledge

The Right Way to Combat Customer Journey Hijacking
sponsored by Tala Security
WHITE PAPER: Most IT security teams focus on protecting user data, with little focus on user experience. By implementing a strategy that provides front-end and back-end protection, you can safeguard the interactions customers have with you, prevent the financial and reputational impacts of customer journey hijacking. Read on to get started.
Posted: 15 Jan 2020 | Published: 15 Jan 2020

Tala Security
1 - 25 of 364 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info