Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Criminal Law  >   Crime  >  

Data Breach

RSS Feed   
Data Breach White Papers (View All Report Types)
 
The Network for the Digital Business Starts with the Secure Access Service Edge (SASE)
sponsored by Cato Networks
WHITE PAPER: Networking and security are slowing down the business as silos, built decades ago, are stretched and patched to accommodate emerging business requirements. In this white paper, learn how networking and security can become part of the IT platform for the digital business with a single cloud-based service: Secure Access Service Edge (SASE).
Posted: 02 Apr 2020 | Published: 02 Apr 2020

Cato Networks

Online Retail Threats Credential Stuffing
sponsored by Shape Security
WHITE PAPER: In the past decade, the frequency of credential theft has increased and the tools and techniques used by cybercriminals have evolved. In this white paper, explore one of the most common threats to retailers – credential stuffing – and learn how Shape works with major retailers to shut these attacks down.
Posted: 16 Aug 2019 | Published: 16 Aug 2019

Shape Security

The Age of Digital Transformation: 5 Keys to Securing Your Business Critical Applications
sponsored by CyberArk Software, Inc
WHITE PAPER: The digital transformation of enterprise IT has increased the challenge of protecting business critical applications. Securing business-critical applications means access must be reserved for individuals with the proper credentials and permissions. In this white paper, learn 5 key requirements to better protect your business critical applications.
Posted: 12 Jul 2019 | Published: 31 Mar 2019

CyberArk Software, Inc

Securing Hospitality IT Infrastructure
sponsored by CyberArk Software, Inc
WHITE PAPER: When it comes to cybersecurity, the hospitality industry has a threat surface unlike any other vertical sector. Privileged accounts are everywhere in the hospitality industry technology stack. In this white paper, learn what hospitality organizations should do to reduce the risk posed to privileged access by attackers.
Posted: 26 Aug 2019 | Published: 30 Apr 2019

CyberArk Software, Inc

Fortinet Delivers a Flexible SASE Solution
sponsored by Fortinet, Inc.
WHITE PAPER: Networks have been fundamentally transformed by digital innovation, cloud adoption, and the recent widespread shift to remote work. Increased reliance on cloud resources and environments has necessitated a new approach to secure network access. Jump into this white paper for an up-close look at SASE, which can support dynamic secure access needs.
Posted: 01 Oct 2020 | Published: 01 Oct 2020

Fortinet, Inc.

Securing the Grid Why Privileged Access Security is Key to Protecting Critical Energy & Utilities Infrastructure
sponsored by CyberArk Software, Inc
WHITE PAPER: One of the largest security vulnerabilities faced by companies in the energy and utilities sector is privileged accounts, and the access they provide. In this white paper, learn how energy and utilities organizations can proactively reduce the risk posed by privileged access.
Posted: 10 Jul 2019 | Published: 30 Apr 2019

CyberArk Software, Inc

PCI DSS Success: Archiving Compliance and Increasing Web Application Security
sponsored by Citrix
WHITE PAPER: This paper elaborates on the changing nature of the PCI DDS landscape and its requirements. It also identifies applicable application network compliance solutions from Citrix Systems Inc..
Posted: 19 Sep 2008 | Published: 18 Sep 2008

Citrix

Internet-Scale Identity Systems:An Overview and Comparison
sponsored by Ping Identity Corporation
WHITE PAPER: This white paper provides an overview of the benefits of implementing an Internet-based identity system and explores the similarities, differences and synergies among the top technologies and initiatives available.
Posted: 27 Mar 2014 | Published: 04 Mar 2014

Ping Identity Corporation

Symantec Internet Security Threat Report
sponsored by Symantec Corporation
WHITE PAPER: This Internet Security Threat Report details the issues related to online fraud and examines current trends in the internet security landscape. Read this paper today and learn about the future of internet attacks and what to expect in the coming years.
Posted: 30 Mar 2007 | Published: 01 Mar 2007

Symantec Corporation

Credit Issuers: Stop Application Fraud At The Source With Device Reputation
sponsored by iovation, Inc.
WHITE PAPER: Read this white paper to learn about new and innovative techniques and solutions can be used to combat fraud, and how you can realize a true return on investment by reducing losses from fraud exposure and increasing operational efficiency within your fraud prevention process.
Posted: 09 Jun 2009 | Published: 09 Jun 2009

iovation, Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info