IT Management  >   Systems Operations  >   Security  >  

Cyber Security Enhancement Act of 2002

RSS Feed   
Cyber Security Enhancement Act of 2002 Reports
The Future of Security Operations
sponsored by IBM Resilient
RESOURCE: As technology changes and attack surfaces grow, security teams are forced to think differently. Leverage this resource to learn about the future of security operations and how your team can more effectively operationalize world-class security practices.
Posted: 22 Mar 2018 | Published: 22 Mar 2018

IBM Resilient

Modern-Day Security Tales
sponsored by Cisco Umbrella
RESOURCE CENTER: How quickly is your organization able to combat security challenges? Explore this resource to uncover how to cut through your security challenges and implement effective protection in minutes, rather than months.
Posted: 10 Apr 2018 | Published: 10 Apr 2018

Cisco Umbrella

Managing Fraud Risks in the Digital World
sponsored by SAS
WHITE PAPER: New digital product and payment methodologies have presented fresh opportunities for fraudsters and different challenges for fraud managers. Access this resource to uncover how to stay secure and manage fraud risks in the digital world.
Posted: 17 Apr 2018 | Published: 17 Apr 2018


Enterprise DNS Security
sponsored by Infoblox
WHITE PAPER: According to an ESG research report, 72% of organizations believe cybersecurity operations have become significantly more difficult over the past 2 years. Explore this white paper to gain insight into enterprise DNS security, its benefits and what to expect for the future of cybersecurity.
Posted: 02 Apr 2018 | Published: 02 Apr 2018


Secure Data Acquisition, Communication and Processing for Your IoT Solutions
sponsored by Telit
WHITE PAPER: This white paper explores the 3 pillars of IoT network security and offers advice on how you can overcome the impending cybersecurity threats while maintaining the agility you need to gain a competitive advantage.
Posted: 23 Mar 2018 | Published: 23 Mar 2018


Data Masking & Security
sponsored by Delphix
RESOURCE: With data breach incidents regularly making the news, organizations must protect sensitive data across the enterprise. Access this resource to learn how the Delphix Dynamic Data Platform can help you ensure privacy, security and regulatory compliance.
Posted: 26 Mar 2018 | Published: 26 Mar 2018


GDPR: Not Just Compliance
sponsored by DXC
WHITE PAPER: GDPR presents a great opportunity for improved customer experience, deeper customer engagement, and increased sales. Explore this resource to learn more about how GDPR goes beyond simple compliance standards and can offer a greater benefit to your organization.
Posted: 05 Apr 2018 | Published: 05 Apr 2018


DevSecOps: Mastering security's group effort
sponsored by RSA Conference
WEBCAST: DevSecOps can be costly and time consuming, making it a challenging undertaking. Tune into this webcast to hear security experts discuss the hurdles of DevSecOps and how to foster a successful approach.
Posted: 19 Mar 2018 | Premiered: Mar 19, 2018

RSA Conference

The GDPR Compliance Checklist
sponsored by Acronis
RESOURCE: Has your organization identified its role in the GDPR? For many organizations, the path to GDPR compliance can be somewhat long and challenging. Given the deadline is approaching fast, uncover these 12 concrete steps to take to improve your GDPR compliance posture.
Posted: 22 Mar 2018 | Published: 22 Mar 2018


How to Protect Your Multi-Cloud Environment With One Security Fabric
sponsored by Fortinet, Inc.
WHITE PAPER: Multi-cloud networks present attack surfaces that are significantly larger, more distributed, and more variable than those of enterprise networks or single clouds. Leverage this resource to learn how to protect your multi-cloud environment with a broad, integrated, and automated framework for network security.
Posted: 05 Apr 2018 | Published: 05 Apr 2018

Fortinet, Inc.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement