IT Management  >   Systems Operations  >   Security  >  

Cyber Security Enhancement Act of 2002

RSS Feed   
Cyber Security Enhancement Act of 2002 Reports
 
The DevOps Vulnerability Remediation Paradox
sponsored by Rezilion
VIDEO: The vulnerability management lifecycle can be chaotic, as deciding how to prioritize risk can be a daunting task. This video highlights how the addition of autonomous validation can help organizations reduce remediation work, shrink their attack surface and speed up DevOps deployments – watch now to get started.
Posted: 15 Dec 2020 | Premiered: 18 Nov 2020

Rezilion

Simplify Card Printing with the Affordable & Efficient HID Fargo INK1000
sponsored by HID Global
EBOOK: This e-book provides a closer look at HID’s FARGO INK100, an affordable, low-maintenance and efficient ID printer designed to provide high quality printing for ID badges, student or faculty IDs, gift and loyalty cards – read on to learn more about the printing technology.
Posted: 22 Dec 2020 | Published: 22 Dec 2020

HID Global

ESG White Paper Reimagining Endpoint Security
sponsored by Cisco Systems, Inc.
WHITE PAPER: New cyberthreats, cloud migrations, digital transformations, and the rise of the remote workforce has had a profound impact on the endpoint security landscape. The following ESG article from Cisco dives deeper into these changes and provides an overview of Cisco’s modern endpoint security platform – read on to get started.
Posted: 09 Dec 2020 | Published: 30 Jun 2020

Cisco Systems, Inc.

Evonik Industries Success Story
sponsored by SNP Transformation
CASE STUDY: For Evonik, a global chemicals company, balancing a growing list of compliance mandates with data protection and employee productivity is a difficult task. Read this case study to see why they partnered with SNP to address these challenges and discover the outcomes of this initiative.
Posted: 05 Jan 2021 | Published: 05 Jan 2021

SNP Transformation

6 Factors To Consider In Building Resilience Now
sponsored by Microsoft
RESOURCE: COVID-19 serves as a reminder of the importance of building digital resilience – and while most organizations agree on its importance, there remains confusion on where to invest, how to invest, and how to set goals as they relate to digital resilience. Read this article and discover 6 factors to consider for building digital resilience.
Posted: 17 Dec 2020 | Published: 17 Dec 2020

Microsoft

Dealing with VUCA
sponsored by InteliSecure
EGUIDE: Today’s IT and security leaders are responsible for dealing with VUCA – volatility, uncertainty, complexity, and ambiguity – and address data security risks in an ever-changing landscape. Read this InteliSecure e-guide to address the elements of VUCA and build agile data protection.
Posted: 30 Dec 2020 | Published: 30 Dec 2020

InteliSecure

Computer Weekly – 15 December 2020: How security will be different after Covid-19
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, the world of cyber security will probably never return to its pre-pandemic state – we look ahead. The combination of remote working and streaming video is putting extra strain on networks. And we look at how digital transformation is changing the way contact centres are run. Read the issue now.
Posted: 14 Dec 2020 | Published: 15 Dec 2020

ComputerWeekly.com

Has ID Card Issuance Been Marooned on a Desert Island?
sponsored by HID Global
WHITE PAPER: As organizations today put more considerations into how they secure access to critical data, the case for incorporating security cards becomes stronger. Read this brief to discover 10 reasons why ID card issuance is worth revisiting and explore the benefits organizations could realize from its use.
Posted: 21 Dec 2020 | Published: 21 Dec 2020

HID Global

Spear Phishing: Top Threats and Trends
sponsored by Barracuda
RESEARCH CONTENT: As their speedy exploitation of fears around the COVID-19 pandemic show, cybercriminals adapt quickly to current events and new tactics. This in-depth report takes a look at the evolving trends in spear-phishing and the new ways attackers are tricking their victims – read on unlock this exclusive insight.
Posted: 29 Dec 2020 | Published: 29 Dec 2020

Barracuda

Case Study: Ledn
sponsored by Clearedin
CASE STUDY: In this case study, discover how Ledn, a cryptocurrency company, was able to achieve better email security and industry-specific compliance requirements through a partnership with CleardIn – which equipped them to better identify and prevent email-based threats. Read on for the full story.
Posted: 05 Jan 2021 | Published: 05 Jan 2021

Clearedin
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info