IT Management  >   Systems Operations  >   Security  >  

Cyber Security Enhancement Act of 2002

RSS Feed   
Cyber Security Enhancement Act of 2002 Reports
 
Meeting Corporate Requirements for Comprehensive Security for Users and Their Devices
sponsored by Lenovo
RESOURCE: Perhaps the most common point of attack is user devices. With inconsistent security tools and many PCs running insecure software stacks, there are numerous ways these devices are compromised. In this article, learn how combining more secure operating systems and devices that automate key security processes is essential to protecting organizations.
Posted: 21 Mar 2019 | Published: 21 Mar 2019

Lenovo

Securing Web Applications in Container-Based Environments
sponsored by Fortinet, Inc.
WHITE PAPER: A lack of dynamic security capabilities that can keep pace with the ever-changing nature of DevOps environments leaves organizations exposed to risks. In this white paper, learn about Fortinet's WAF that is designed to protect web-based applications and internet-facing data from threats within container-based environments.
Posted: 14 Feb 2019 | Published: 17 Nov 2018

Fortinet, Inc.

Quarterly Threat Landscape Report
sponsored by Fortinet, Inc.
RESEARCH CONTENT: In this research report, find a summary of statistics culled from billions of threat events observed by Fortinet devices in live production environments around the world. The report also digs into and adds context around those key findings.
Posted: 06 Mar 2019 | Published: 06 Mar 2019

Fortinet, Inc.

Insider Threats Part 1: Identifying and Responding with Fidelis EDR Technology
sponsored by Fidelis
WEBCAST: Sometimes the biggest threat to your sensitive data is one of your own employees. In this webcast, Fidelis' Lucas Chumley and Louis Smith will demonstrate how to minimize the risk posed by an insider threat. Also, see how Fidelis technology can help identify and provide initial notification of a probable threat and then automate response.
Posted: 20 Feb 2019 | Premiered: Feb 20, 2019

Fidelis

IP Intelligence Improves Company Efficiency, Customer Experience, and Security
sponsored by Neustar
WHITE PAPER: Successful brands are the ones that identify and connect with their customers – and that's why IP Intelligence (IPI) is so critical. IPI helps companies sort out the good actors from the bad, improving the customer experience while keeping security systems safe. In this white paper, learn how different companies have implemented Neustar's IPI.
Posted: 13 Feb 2019 | Published: 19 Jul 2017

Neustar

Travis Perkins PLC Adopts Analytics-Driven SIEM to Enable Hybrid Cloud Transition
sponsored by Splunk Services UK Ltd
CASE STUDY: Travis Perkins PLC's existing SIEM solution couldn't provide the necessary security insights across its hybrid environment. They reviewed the alternatives available and selected the Splunk platform as their new SIEM. In this case study, discover the benefits that Travis Perkins PLC has seen since deploying the Splunk platform.
Posted: 14 Feb 2019 | Published: 14 Feb 2019

Splunk Services UK Ltd

DreamWorks Animation Applies HP Inc.'s Expertise and Experience to Reinforce Print and Document Security
sponsored by HP
CASE STUDY: In this case study, learn how a large film production studio, DreamWorks Animation, partnered with HP Inc. to address its print security needs. The case study also provides recommendations for addressing your organization's printer security needs.
Posted: 13 Mar 2019 | Published: 31 Mar 2018

HP

Back to the Basics: What is Cyber Risk and How Can We Measure It?
sponsored by CyberGRX
RESOURCE: Cyber-risk is a hot topic these days, but, it is often misunderstood or conflated with other cybersecurity and privacy concerns. This resource offers a definition of cyber-risk and outlines a model of measuring cyber-risk.
Posted: 28 Feb 2019 | Published: 21 Feb 2019

CyberGRX

Seamless Security Integration During a Merger or Acquisition Process
sponsored by Dell SecureWorks
WHITE PAPER: In addition to the challenges of brokering and completing a merger or acquisition, the logistics of integrating two or more businesses and closing potential risk gaps can be staggering. In this white paper, learn how a cybersecurity firm can deliver crucial expertise to facilitate a seamless integration of each company's cybersecurity program.
Posted: 12 Feb 2019 | Published: 12 Feb 2019

Dell SecureWorks

Effective Incident Response Planning Could Save You Millions
sponsored by Arctic Wolf
WHITE PAPER: As companies like Equifax, Verizon Wireless, and Anthem know all too well, it's not a matter of if, but when there will be a breach. Are you prepared to deal with an attack? In this white paper, learn how AWN CyberSOC for IR can help your organization swiftly detect and address your next (inevitable) data breach.
Posted: 06 Mar 2019 | Published: 06 Mar 2019

Arctic Wolf
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement