IT Management  >   Systems Operations  >   Security  >  

Cyber Security Enhancement Act of 2002

RSS Feed   
Cyber Security Enhancement Act of 2002 Reports
 
FINANCIAL SERVICES AND CYBER SECURITY
sponsored by Check Point
EBOOK: This e-book explores common cybersecurity issues and challenges facing the financial services industry and highlights how Check Point’s offerings can help address these challenges. Read on to get started.
Posted: 17 Nov 2021 | Published: 17 Nov 2021

TOPICS:  Cybersecurity
Check Point

Introducing Playbooks 2.0 And Browser Extension: Creating A Foundation Of Collaboration With Threatconnect 6.2
sponsored by ThreatConnect
BLOG: In cybersecurity terms, collaboration can enable disparate teams to share tools, data and capabilities in order to better detect and mitigate potential threats. Read this article to learn about how ThreatConnect’s Browser Extension can help your organization create a foundation of security collaboration.
Posted: 12 Jul 2021 | Published: 02 Jul 2021

TOPICS:  Cybersecurity
ThreatConnect

The CISO's guide to supply chain security
sponsored by ComputerWeekly.com
EGUIDE: Supply chain attacks have long been a concern in cyber security circles as it can be difficult to enforce security measures for suppliers and partners. In this e-guide, find out why supply chain attacks are intensifying amid the pandemic, how companies are responding to the attacks and what else organisations can do to disrupt the cyber kill chain.
Posted: 04 Jul 2021 | Published: 05 Jul 2021

ComputerWeekly.com

The Vision Behind the CyCognito Platform
sponsored by Cycognito
VIDEO: Defending against modern cyberattacks requires organizations to think like a hacker – which is easier said than done. To address this, attack surface management (ASM) platforms have emerged across the security market. Watch this short video to hear about the benefits of ASM platforms and explore the key features of CyCognito’s ASM offering.
Posted: 27 May 2021 | Premiered: 27 May 2021

TOPICS:  Cybersecurity
Cycognito

Secure Access To Critical Systems With TransientAccess
sponsored by TransientX, Inc
CASE STUDY: Cyflare, a cybersecurity platform provider, was recently facing issues related to securely and remotely managing end user devices. They tried everything from SSH, to VPN, but nothing was the right fit. Read this case study to discover how they landed on TransientX’s Zero Trust Network Access (ZTNA), and the benefits of their partnership.
Posted: 03 Jun 2021 | Published: 03 Jun 2021

TOPICS:  Cybersecurity

The Mimecast-Netskope-Crowdstrike Triple Play: Integrating Best-Of-Breed Solutions
sponsored by Mimecast
WHITE PAPER: The Mimecast-Netskope-CrowdStrike “Triple Play” is a joint effort created to address the growing information security challenges facing today’s IT pros. Read on to learn how these organizations combined their best-of-breed cybersecurity solutions to help organizations address cyberattacks and data loss.
Posted: 14 Jul 2021 | Published: 14 Jul 2021

TOPICS:  Cybersecurity
Mimecast

Infographic: Top IT predictions in APAC in 2022
sponsored by ComputerWeekly.com
INFOGRAPHIC: As one of the first in the world to emerge from the throes of the pandemic, Asia-Pacific (APAC) organisations are expected to invest more in cyber security, cloud computing and automation in 2022 to secure their digital future. In this infographic, we review some of the key IT trends that are likely to shape the industry in the next months.
Posted: 19 Jan 2022 | Published: 19 Jan 2022

ComputerWeekly.com

Essential Guide: APAC women in cyber security
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: In Asia-Pacific, men continue to outnumber women in the growing field of cyber security - even as more women are entering the industry. The lack of awareness of the profession among students and unconscious biases in hiring processes are just some of the challenges that we must overcome before we can see more women in the profession.
Posted: 04 Oct 2021 | Published: 04 Oct 2021

ComputerWeekly.com

Intelligent Cyber Threat Response
sponsored by Analyst1
PRODUCT OVERVIEW: The key to addressing today’s advanced cyberthreats lies in combining a complete understanding of how these threats operate combined with actionable insights for mitigation. Bridging the intelligence-insights gap is one of the core tenets of Analyst1, read this solution brief to learn more about this exclusive offering.
Posted: 04 Jun 2021 | Published: 04 Jun 2021

TOPICS:  Cybersecurity
Analyst1

Attack Surface Visibility The Foundation Of Effective Cybersecurity
sponsored by Cycognito
WHITE PAPER: Attack surface visibility provides organizations with insight into who is targeting their organization as well as where they’re focusing their efforts. Read this white paper to learn more about attack surface visibility, including its potential benefits and how to implement it.
Posted: 01 Jun 2021 | Published: 01 Jun 2021

TOPICS:  Cybersecurity
Cycognito
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2022, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences