IT Management  >   Systems Operations  >   Security  >  

Cybersecurity

RSS Feed   
ALSO CALLED: Cyber Security, Cyber Security Enhancement Act of 2002
DEFINITION: Information assurance, including information security, information technology disaster recovery, and information privacy. See Section 225, Cyber Security Enhancement Act of 2002, of the Homeland Security Act.
Cybersecurity White Papers (View All Report Types)
76 - 100 of 389 Matches Previous Page  |  Next Page
The GDPR from a North American Perspective
sponsored by Sophos
WHITE PAPER: 54% of US Multinationals have the GDPR as the number 1 data protection priority, according to a 2017 PWC study. This white paper discusses how the GDPR will affect non-European companies and provides insights into what your company can do to prepare for the regulation.
Posted: 04 Jan 2018 | Published: 04 Jan 2018

Sophos

The 3 Keys to Faster Threat Response
sponsored by RSA
WHITE PAPER: According to the latest RSA study rating organizations' cybersecurity maturity, 74% of those surveyed have inadequate systems to quickly recover from an attack. Explore this e-book to uncover a deeper understanding into 3 keys to a faster threat response.
Posted: 04 Jan 2018 | Published: 04 Jan 2018

RSA

The 7 Building Blocks of Better Threat Visibility
sponsored by RSA
WHITE PAPER: According to RSA, the anticipated losses to cybercrime by 2021 are $6 trillion. Explore this e-book to uncover how to advance your threat visibility with 7 building blocks.
Posted: 04 Jan 2018 | Published: 04 Jan 2018

RSA

The Importance of the Facilitated Password Process for Enterprise Password Management
sponsored by Fast Pass Corp
WHITE PAPER: According to the 2017 Verizon Data Breach Investigations Report, 81% of hacking related breaches leveraged stolen or weak passwords. Explore this password management white paper to gain insight into securing your passwords to protect your organization from hackers.
Posted: 04 Jan 2018 | Published: 04 Jan 2018

Fast Pass Corp

Extending Security Technology to the Cloud: Threat Detection & Response
sponsored by RSA
WHITE PAPER: According to Gartner, spending on cloud system IaaS will grow from $34 billion in 2017 to $71 billion through 2020. This white paper offers strategies for improving threat detection and response within cloud technologies.
Posted: 03 Jan 2018 | Published: 03 Jan 2018

RSA

5 Ways to Boost Your Security Team's Impact
sponsored by RSA
WHITE PAPER: 93% of security operations center (SOC) managers are unable to triage all potential threats. Explore this resource to uncover 5 tools to boost your security team's impact.
Posted: 03 Jan 2018 | Published: 03 Jan 2018

RSA

Protecting Your Enterprise from Ransomware Attacks
sponsored by Seqrite
WHITE PAPER: Click inside to take a more in-depth look at what makes a ransomware attack unique, and why you need to take steps to protect yourself. Then, learn about 5 protection mechanisms you can put into place.
Posted: 22 Dec 2017 | Published: 22 Dec 2017

Seqrite

The State of Security for In-Production Web Applications
sponsored by tCell
WHITE PAPER: In both the 2016 and 2017 Verizon Data Breach Investigations Reports, web application attacks are listed as the number one breach method, by far. Explore this white paper to gain insight into specific web app attacks, including third-party libraries, account takeovers, and more.
Posted: 22 Dec 2017 | Published: 22 Dec 2017

tCell

Using Machine Learning and Analytics to Close the Security Skills Gap
sponsored by RSA
WHITE PAPER: This resource provides insight into utilizing analytics and machine learning to reduce the load on security professionals, while increasing visibility and predicting attackers' next steps.
Posted: 19 Dec 2017 | Published: 19 Dec 2017

RSA

2018 Threat Predictions
sponsored by Fortinet, Inc.
WHITE PAPER: As technology continues to evolve, there is a growing criminal element looking to exploit new opportunities the digital society brings. This white paper reveals predictions regarding the future threat landscape, offers insight into specific threats, and provides mitigation tactics to enhance security.
Posted: 13 Dec 2017 | Published: 13 Dec 2017

Fortinet, Inc.

Banking on Cybersecurity
sponsored by HyTrust
WHITE PAPER: According to PWC's Global Economic Crime Survey, cybercrime has jumped to the second-most reported economic crime and financial organizations are prime targets. This white paper offers best practices to strengthen data security and regulatory compliance in financial services.
Posted: 11 Dec 2017 | Published: 11 Dec 2017

HyTrust

Key Considerations in Selecting a Customer IAM Solution
sponsored by Janrain
WHITE PAPER: The rise of the social customer creates opportunities for organizations to develop deeper relationships with customers in support of business objectives. Explore this white paper to gain insight into selecting a customer IAM strategy that works best for your organization.
Posted: 07 Dec 2017 | Published: 07 Dec 2017

Janrain

Top Trends That Will Shape CIAM in 2018 and Beyond
sponsored by Janrain
WHITE PAPER: In order for digital businesses to manage, govern, and secure customers' access to systems and data without hurting the customer experience, businesses should implement a customer IAM strategy. This Forrester report details 12 key trends shaping the customer IAM landscape and how security and risk pros can respond to them in a productive manner.
Posted: 06 Dec 2017 | Published: 06 Dec 2017

Janrain

Windows 10: If Compatibility is Not a Problem, What Is?
sponsored by Flexera Software
WHITE PAPER: Explore this white paper to gain insight into the security challenges of adopting Windows 10 and how to reduce risks when implementing and using the software.
Posted: 05 Dec 2017 | Published: 27 Apr 2017

Flexera Software

Integrated Security Solution for SD-WAN
sponsored by Silver Peak
WHITE PAPER: This solution brief offers an integrated security approach for SD-WAN in order to achieve end-to-end security for broadband and hybrid WANs.
Posted: 27 Nov 2017 | Published: 27 Nov 2017

Silver Peak

The Evolving Risk Landscape
sponsored by F5 Networks
WHITE PAPER: There was nearly a 22% increase in attacks on web applications from 2016 to 2017. While apps have increased productivity, they have also opened the door to unprecedented threats, expanding the risk landscape and putting corporate data at risk. This e-book offers a guide to protecting against web fraud, credential stuffing, ransomware, and phishing.
Posted: 20 Nov 2017 | Published: 20 Nov 2017

F5 Networks

Damage Control: The Impact of Critical IT Incidents
sponsored by Splunk
WHITE PAPER: IT incidents result in annual costs running into millions of dollars, while the average organization is dealing with hundreds of incidents every week. This Quocirca research report analyzes the impact critical IT incidents have on organizations, which halt business processes and impact users.
Posted: 20 Nov 2017 | Published: 20 Nov 2017

Splunk

The Clock is Ticking on GDPR Obligations
sponsored by IBM
WHITE PAPER: GDPR gives organizations 72 hours to report a data breach, while discovery usually takes a company 150 days. Take a look at this article to discover ways your organization can prepare for GDPR to ensure you are compliance ready by May 2018.
Posted: 20 Nov 2017 | Published: 20 Nov 2017

IBM

Top Cyber Threats to the Technology Sector
sponsored by Digital Shadows
WHITE PAPER: Technology providers collect sensitive customer data, causing them to be popular targets for cyberattacks. Explore this white paper to learn about the top 4 threats facing technology companies today, and learn from recent attacks to ensure your data is secured.
Posted: 14 Nov 2017 | Published: 14 Nov 2017

Digital Shadows

Top Cyber Threats to The Retail Sector
sponsored by Digital Shadows
WHITE PAPER: Given the frequent number of transactions taking place using payment cards, retail companies are frequently the target of financially-motivated threats. Explore this white paper to uncover the top 3 cyber threats to the retail sector to help you monitor and manage digital risks.
Posted: 14 Nov 2017 | Published: 14 Nov 2017

Digital Shadows

The Pressing Need for Digital Risk Management
sponsored by Digital Shadows
WHITE PAPER: According to ESG research, 69% of organizations are increasing their cybersecurity budgets. This ESP report reveals how CISOs and risk officers can adopt a thorough risk management strategy to protect their enterprise from pressing cyber threats.
Posted: 14 Nov 2017 | Published: 14 Nov 2017

Digital Shadows

Inside Online Carding Courses Designed for Cybercriminals
sponsored by Digital Shadows
WHITE PAPER: Experts project a loss of $24 billion to payment card fraud by the end of 2018. This paper looks at an online course designed for bad actors in order to shed light on the latest fraud tactics and tools, allowing consumers, merchants and credit card companies to better understand the threat and protect themselves from becoming the next fraud victim.
Posted: 14 Nov 2017 | Published: 14 Nov 2017

Digital Shadows

Top Cyber Threats to the Legal Sector
sponsored by Digital Shadows
WHITE PAPER: Legal firms can be attractive targets for cybercriminals, especially firms working on mergers and acquisitions (M&A), possessing a large amount of sensitive, non-public information. This paper highlights 3 security risks for legal firms to focus on and how to mitigate them.
Posted: 13 Nov 2017 | Published: 13 Nov 2017

Digital Shadows

Cybersecurity for Dummies
sponsored by Thycotic
WHITE PAPER: People are the number one target and cause of cybersecurity failures. Explore this 29-page For Dummies e-book to learn about cybersecurity, how to recognize and respond to threats, and how to protect your company.
Posted: 04 Jan 2018 | Published: 04 Jan 2018

Thycotic

GDPR Compliance Checklist: A 9-Step Guide
sponsored by AlienVault
WHITE PAPER: The GDPR has the potential to significantly alter the way businesses handle and store data as it consolidates and replaces many local data protection laws. This guide offers a 9-step GDPR checklist to ensure your organization is prepared for the May 2018 regulation.
Posted: 04 Jan 2018 | Published: 04 Jan 2018

AlienVault
76 - 100 of 389 Matches Previous Page    2 3 4 5 6 7    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement