IT Management  >   Systems Operations  >   Security  >  

Cyber Security Enhancement Act of 2002

RSS Feed   
Cyber Security Enhancement Act of 2002 Reports
 
Introducing MVision XDR
sponsored by McAfee
VIDEO: Extended detection and response (XDR) are taking security operations by storm, but are they any better than tried-and-true EDR tools? Watch this short video for a closer look at the key features and capabilities of McAfee’s MVision XDR offering, and discover a virtual demo of the tool in-use.
Posted: 13 Apr 2021 | Premiered: 13 Apr 2021

TOPICS:  Cybersecurity
McAfee

Five Steps To A Modern Cyber Risk Management Team In 2020
sponsored by Security Scorecard
EBOOK: According to a recent Deloitte survey, 95% of respondents experienced a wide range of cyberattacks – over half of which occurred within the last 2 years. This e-book highlights 5 steps your organization can take to transition from traditional, siloed risk management approaches towards a more collaborative effort – read on to get started.
Posted: 30 Mar 2021 | Published: 30 Mar 2021

TOPICS:  Cybersecurity
Security Scorecard

Detecting fraud in banking with the help of AI and ML software
sponsored by Innovecs LLC
WHITE PAPER: To address the challenges of modern fraud in banking, institutions are turning towards artificial intelligence (AI) and machine learning (ML) capabilities to better detect and mitigate fraud. Read this white paper to learn how AI and ML can help detect fraud in banking.
Posted: 14 Apr 2021 | Published: 14 Apr 2021

TOPICS:  Cybersecurity
Innovecs LLC

DETECT, DEFEND AND DETER: THE 3 D’S OF SECURE DIGITAL TRANSFORMATION
sponsored by ESET
WHITE PAPER: The COVID-19 pandemic served as a major accelerator for digital transformations, enabling organizations to modify and migrate their operations to a work-from-home model. Read this e-guide to discover the 3 D’s of digital transformation and learn how they can be used to determine the best combination of tools to meet your security needs.
Posted: 16 Apr 2021 | Published: 16 Apr 2021

TOPICS:  Cybersecurity
ESET

_beta access: General Use Cases
sponsored by Beta Systems
VIDEO: In this short video, take a closer look at some of the common challenges organizations face when using Resource Access Control Facility (RACF) and discover how Beta Systems can help to address these pain points – watch now to get started.
Posted: 14 Apr 2021 | Premiered: 26 Mar 2021

TOPICS:  Cybersecurity
Beta Systems

How To Keep Apis Secure From Bot Cyberattacks
sponsored by Radware
WHITE PAPER: APIs remain one of the most lucrative and accessible targets for today’s sophisticated bot attacks. In this white paper, you’ll learn how to prepare your APIs to defend against bot attacks by looking at common vulnerability areas, attack symptoms, and more – read on to get started.
Posted: 08 Apr 2021 | Published: 08 Apr 2021

TOPICS:  Cybersecurity
Radware

The Rise of Credential Stuffing Attacks: How to Keep Employee Accounts Secure
sponsored by TechTarget
RESOURCE: As long as employees are responsible for like passwords and accounts, there will be threats targeting those credentials. This e-guide offers expert insight into protecting your employees against credential stuffing attacks, highlighting key challenges, hacker methods, best practices, and more.
Posted: 02 Apr 2021 | Published: 02 Apr 2021

TechTarget

Forcepoint Data Loss Prevention (Dlp)
sponsored by Forcepoint
BROCHURE: Effective and scalable data protection has become an invaluable resource for today’s dynamic organizations in the fight against targeted attacks and accidental exposure. Read this brochure for an exclusive look at the key features and capabilities of Forcepoint’s Data Loss Prevention (DLP) offering.
Posted: 16 Apr 2021 | Published: 16 Apr 2021

TOPICS:  Cybersecurity
Forcepoint

Securely and Selectively Migrating Enterprise Data To the Cloud
sponsored by PKWare
EBOOK: In order to better secure and manage a growing amount of data, organizations are looking towards cloud capabilities for help. But security in the cloud looks much different than traditional on-premise security. Read this e-book to learn more about the basics of cloud security and how to migrate your sensitive data.
Posted: 15 Apr 2021 | Published: 15 Apr 2021

TOPICS:  Cybersecurity
PKWare

Learn How Cybercriminals Defeat CAPTCHA
sponsored by F5 Networks
WEBCAST: In this webinar, join Dan Woods – a VP from Shape Security – as he provides a comprehensive explanation (with a demonstration) as to the shortcomings of CAPTCHA and why it shouldn’t be used to protect web and mobile applications. Watch now to get started.
Posted: 06 Apr 2021 | Premiered: Apr 6, 2021

TOPICS:  Cybersecurity
F5 Networks
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences