IT Management  >   Systems Operations  >   Security  >  

Cyber Security Enhancement Act of 2002

RSS Feed   
Cyber Security Enhancement Act of 2002 Reports
 
The State of Email Security Report 2019
sponsored by Mimecast
RESEARCH CONTENT: Email is the largest single attack vector and there are many risks your organization faces when trying to defend against the daily scourge of threats. In this white paper, explore key statistics from Mimecast's 3rd annual State of Email Security Report which can help you shape your email security plan.
Posted: 10 Jun 2019 | Published: 10 Jun 2019

Mimecast

Aeris and ROAMWORKS: Protecting Cargo from Security Challenges
sponsored by Aeris
CASE STUDY: To assist Dubai Airports achieve its goals, ROAMWORKS, with the help of Aeris, provided an end-to-end platform that enabled airport management to monitor, track, manage, and control their asset data around the world. In this case study, learn more about ROAMWORKS and Aeris' partnership and how they can help protect cargo from security challenges.
Posted: 12 Jun 2019 | Published: 12 Jun 2019

Aeris

Who needs malware? How Adversaries use Fireless Attacks to Evade your Security
sponsored by CrowdStrike
WHITE PAPER: According to CrowdStrike, 8 out of 10 attack vectors that resulted in a successful breach used fileless attack techniques. Access this white paper to learn how fileless attacks work and why traditional techniques fail to protect your organization.
Posted: 04 Jun 2019 | Published: 04 Jun 2019

CrowdStrike

4 Top Identity and Access Management Trends
sponsored by Onfido
EGUIDE: As end-user security threats continue to rise, it becomes more crucial for IT pros to have identity and access management tools. However, the tools offered in the identity and access management market are evolving and IT pros need to catch up. In this e-guide, explore the top 4 identity and access management trends shaping the market right now.
Posted: 07 Jun 2019 | Published: 07 Jun 2019

Onfido

Security Automation with Ansible
sponsored by Red Hat
WEBCAST: Configuring systems and applications to make life more difficult for attackers is daunting. In this webcast, learn how using the agentless, push-based power of Red Hat Ansible Automation to apply and enforce security standards can help organizations adapt to meet internal and external security guidelines.
Posted: 15 May 2019 | Premiered: May 15, 2019

Red Hat

The ASD Essential 8 and Ivanti
sponsored by Ivanti ANZ
WHITE PAPER: Implementing the ASD Essential 8 effectively helps you achieve a baseline for your cybersecurity strategy. While this sounds straightforward, many companies still struggle to achieve this level of security today. In this white paper, learn about the importance of each control that makes up the Essential 8.
Posted: 30 May 2019 | Published: 30 May 2019

Ivanti ANZ

Is Your Cybersecurity Strategy In Good Shape?
sponsored by Iron Mountain
WHITE PAPER: This white paper will help you tackle these evolving threats and secure your business with a proven 3-stage data protection process. View it now to get started and to ensure your cybersecurity strategy is in good shape.
Posted: 21 May 2019 | Published: 31 Dec 2018

Iron Mountain

The Present and Future of Security Operations
sponsored by Splunk
WHITE PAPER: In this white paper, learn about several technologies, processes, and philosophical trends that may help CISOs overcome today's security operations challenges and develop a well-organized and operative future-oriented strategy.
Posted: 20 May 2019 | Published: 31 Mar 2019

Splunk

Instant Security Maturity Assessment
sponsored by CrowdStrike
RESOURCE: In this resource, learn about CrowdStrike's Falcon Complete which fuses machine intelligence with human intervention to prevent breaches. Falcon Complete operationalizes your organization against malware, ransomware and fileless attacks. Download the resource to explore the benefits.
Posted: 21 May 2019 | Published: 21 May 2019

CrowdStrike

Deakin Hardens Its Shield With Ivanti
sponsored by Ivanti ANZ
CASE STUDY: Deakin University determined the ASD's recommended cybersecurity controls would help them implement the strongest defense against cyberattacks. In this case study, learn how Deakin University was able to address the Top 4 of the ASD Essential 8 strategies after implementing Ivanti's security portfolio.
Posted: 30 May 2019 | Published: 30 May 2019

Ivanti ANZ
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement