IT Management  >   Systems Operations  >   Security  >  

Cyber Security Enhancement Act of 2002

RSS Feed   
Cyber Security Enhancement Act of 2002 Reports
 
The Edf Group With Nexus Lifecycle And Iq Server
sponsored by Sonatype
CASE STUDY: In this case study, discover how Électricité de France (EDF), one of the world’s largest generators of electricity, partnered with Sonatype to address challenges related to open-source application visibility and meet their goals of becoming a more efficient and responsible electricity company.
Posted: 01 Jun 2021 | Published: 01 Jun 2021

TOPICS:  Cybersecurity
Sonatype

Deep Dive Into Cyber Reality
sponsored by FireEye
WHITE PAPER: When it comes to cyber security, enterprises constantly wonder, “Will the effort and strategy we are making protect the organization from an attack?” Read this report to unlock exclusive data and insights about the current state of cyber risk and security effectiveness in the digital age.
Posted: 17 Aug 2021 | Published: 17 Aug 2021

TOPICS:  Cybersecurity
FireEye

Managed Security Testing Services
sponsored by Aujas
PRODUCT OVERVIEW: Security testing is one of the best ways to find unknown vulnerabilities lurking within your organization. View this web page to learn about Aujas’ portfolio of Managed Security Testing (MST) services – which ranges from looking at internal vulnerabilities across networks and apps to simulating external threats like a phishing or DDoS attacks.
Posted: 27 May 2021 | Published: 27 May 2021

TOPICS:  Cybersecurity
Aujas

Year-End Inventory and Device Collection Handbook
sponsored by Absolute Software Corporation
EBOOK: At the end of the school year, collecting and taking inventory of every single school-provided device in circulation can be a hassle. Access this handbook to unlock a 5-phase strategy proven to streamline a successful approach to device collection.
Posted: 01 Jun 2021 | Published: 01 Jun 2021

TOPICS:  Cybersecurity
Absolute Software Corporation

2021 Trends Report
sponsored by RSA Conference
RESEARCH CONTENT: Each year, cybersecurity experts from around the globe submit applications to speak at RSA Conference. Access this exclusive report to explore the trends and unlock reflections from the 2021 RSA Conference.
Posted: 19 Aug 2021 | Published: 19 Aug 2021

TOPICS:  Cybersecurity
RSA Conference

Meeting NIST Guidelines for Zero Trust Security
sponsored by Thales
WHITE PAPER: The digital age has completely transformed how organizations protect their users and data – traditional perimeter security methods have been replaced by Zero Trust architectures. Read this white paper to learn about facilitating effective Zero Trust implementation through NIST guidelines.
Posted: 01 Jun 2021 | Published: 01 Jun 2021

TOPICS:  Cybersecurity
Thales

Rethinking Threat Intel Management feat. Dark Reading
sponsored by Palo Alto Networks
VIDEO: According to SANS, 88% of SOCs use cyber threat intelligence for threat detection, and nearly half of organizations with SOCs have a dedicated threat intel team. To learn more about the challenges, opportunities and trends of today’s threat intelligence approaches, watch this webinar.
Posted: 07 Jul 2021 | Premiered: 07 Jul 2021

TOPICS:  Cybersecurity
Palo Alto Networks

Cyber Risk = A Top 3 Business Concern Make The Right Security Decisions With Threatconnect Risk Quantifiertm (RQ)
sponsored by ThreatConnect
DATA SHEET: When it comes to avoiding a cyber disaster, the ability to identify, understand and act on potential cyber risks is invaluable – but putting these processes in place can be tricky. Read this data sheet to learn how ThreatConnect’s Risk Quantifier (RQ) may be able to help you better evaluate your risk and orchestrate appropriate responses.
Posted: 08 Jul 2021 | Published: 08 Jul 2021

TOPICS:  Cybersecurity
ThreatConnect

Top 10 cyber crime stories of 2019
sponsored by ComputerWeekly.com
EGUIDE: Once again, in 2019 the cyber threat landscape proved the old biblical adage correct – there is nothing new under the sun. Data breaches were 10 a penny – indeed, in some cases they can actually be bought for pennies. Here are Computer Weekly's top 10 cyber crime stories of 2019.
Posted: 10 Sep 2021 | Published: 27 Dec 2019

ComputerWeekly.com

Computer Weekly – 20 July 2021: Ripe for change – mixing digital innovation with traditional winemaking
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how global winemaker Concha y Toro uses the latest tech to enhance 150-year old traditional processes. Pharma giant GSK explains how an API strategy is changing its business model. And we talk to retailers using video technology to bridge the gap between in-store and online selling. Read the issue now.
Posted: 19 Jul 2021 | Published: 20 Jul 2021

ComputerWeekly.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences