IT Management  >   Systems Operations  >   Security  >  

Cyber Security Enhancement Act of 2002

RSS Feed   
Cyber Security Enhancement Act of 2002 Reports
 
Spear Phishing: Top Threats and Trends
sponsored by Barracuda
WHITE PAPER: Business email compromise (BEC) is an emerging cybersecurity threat that targets user inboxes. While BEC makes up just 7% of spear-phishing attacks, it’s responsible for over $26 billion in losses in the last four years. In this report, explore the latest BEC tactics used by scammers and best practices for protecting your organization.
Posted: 18 May 2020 | Published: 30 Nov 2019

Barracuda

Comprehensive Data Security and Access Control in Today’s Multi-Cloud World
sponsored by Okta + Netspoke
RESOURCE: Organizations are moving to the cloud, enhancing productivity but bringing about new security challenges. As environment grow more complex, organizations need to to find a way to provide secure cloud access for users. Continue reading to learn more about data security and access control in the era of multi-cloud environments.
Posted: 28 May 2020 | Published: 28 May 2020

Okta + Netspoke

4 Ways to Combat the Cybersecurity Skills Gap
sponsored by Acunetix
RESOURCE: As business environment become increasingly complex, the preexisting cybersecurity skills gap grows. In this article, explore what’s causing the gap, what can be done to narrow it, and 4 best practices for effectively combating the shortage of cybersecurity talent.
Posted: 01 Jun 2020 | Published: 16 Dec 2019

Acunetix

The Economics of Cybersecurity: Preparing for Ransomware
sponsored by BlueVoyant
EBOOK: One of the most recent evolutions of malware is ransomware, and it’s not going anywhere. In fact, it’s grown to the point where businesses need to consider it an inevitability and prepare accordingly. This e-book is designed to help you identify the cybersecurity costs needed for building a proactive defense strategy. Read on to learn more.
Posted: 12 May 2020 | Published: 12 May 2020

BlueVoyant

Making Sense of MITRE ATT&CK Evaluations to Address Your Cybersecurity Needs
sponsored by Dell SecureWorks
WEBCAST: The MITRE ATT&CK framework provides globally accessible information regarding adversary tactics and techniques based on observations. To further help end-users, MITRE uses the ATT&CK framework to evaluate various offerings and vendors. Watch this webinar to learn more about the evaluations and how to use them to address your security needs.
Posted: 28 May 2020 | Premiered: May 28, 2020

Dell SecureWorks

Building a Successful Cloud Infrastructure Security & Compliance Practice
sponsored by CloudHealth by VMware
WHITE PAPER: In order to implement effective cloud security, various teams and stakeholders across the organization need to work together to overcome the emerging security and compliance challenges. This white paper provides a comprehensive set of guidelines for organizations to streamline their collaboration efforts. Read on to learn more.
Posted: 21 May 2020 | Published: 21 May 2020

CloudHealth by VMware

Ransomware Realities for Small and Medium-Sized Businesses
sponsored by CrowdStrike
WHITE PAPER: Contrary to the belief that ransomware only targets large organizations, small and medium-sized businesses (SMBs) are on the receiving end of a breach nearly 43% of the time. But without the resources of a large business, what can SMBs do to protect themselves? Read on to find out.
Posted: 20 May 2020 | Published: 20 May 2020

CrowdStrike

Get Off the Ice Before it Breaks
sponsored by Matrix42
PRODUCT OVERVIEW: Each year, cyberattacks grow in both volume and success, leading to costly breaches. In fact, 7 in 10 industrial organizations fell victim to a cyberattack over the last 2 years. In this solution brief, learn how Matrix42’s GDPR-compliant data protection offering can help your organization meet its security goals.
Posted: 26 May 2020 | Published: 26 May 2020

Matrix42

Webinar: "I Love Agent-Based Security!" Said No One, Ever.
sponsored by Orca Security
VIDEO: As organizations continue to rely on cloud assets and environments, the efficacy of agent-based security wanes. In this webinar, join a panel of CSOs as they break down their budget and best practices for securing their environments, discuss the hidden risks plaguing your network, and more. Watch now to get started.
Posted: 08 May 2020 | Premiered: 10 Apr 2020

Orca Security

To Enable Zero Trust, Rethink Your Firewall Strategy
sponsored by VMware
ANALYST REPORT: IT organizations are spending more to secure their networks however, these investments are not always paying off. To better understand the challenges that businesses are facing in securing their internal network’s east-west traffic, VMware commissioned Forrester Consulting to conduct a survey. Download this report to explore key findings.
Posted: 20 May 2020 | Published: 29 Feb 2020

VMware
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info