IT Management  >   Systems Operations  >   Security  >  

Cybersecurity

RSS Feed   
ALSO CALLED: Cyber Security, Cyber Security Enhancement Act of 2002
DEFINITION: Information assurance, including information security, information technology disaster recovery, and information privacy. See Section 225, Cyber Security Enhancement Act of 2002, of the Homeland Security Act.
Cybersecurity Reports
1 - 25 of 1339 Matches Previous Page  |  Next Page
Assessing the Cyberthreat Landscape: Today's Reality, Tomorrow's Risks
sponsored by Neustar
RESEARCH CONTENT: The ever-changing cyberthreat landscape, requires constant assessment. IT leaders must not only prioritize the many cyberthreats they face, but also use those insights to formulate and implement an appropriate mitigation strategy. Download this report sponsored by IDG to learn more about the cyberthreat landscape.
Posted: 17 Jan 2019 | Published: 17 Jan 2019

Neustar

The Changing Face of Cyber Attacks
sponsored by Neustar
WHITE PAPER: The question is not whether you will be attacked. It's when, by what, and how badly your company's reputation or finances will be damaged. In the world of cybersecurity the wrong time to consider defense is after the attack has occurred. In this white paper, learn about different attack methods and how to protect your company.
Posted: 17 Jan 2019 | Published: 07 Jan 2019

Neustar

Single sign-on: Understanding the role of SSO in security
sponsored by OneLogin
WHITE PAPER: IT is under pressure to securely support large numbers of apps in a hybrid environment. Passwords are a big problem when it comes to app security because they are difficult for IT to manage. Single sign-on, or SSO, gives users just one password they can use to access all their applications. In this white paper, learn about all things SSO.
Posted: 16 Jan 2019 | Published: 16 Jan 2019

OneLogin

Strategies for Improving Enterprise Application Security
sponsored by WhiteSource
WEBCAST: While most enterprises are focused on application scanning and remediation, many software development experts are advocating better, more secure application development initiatives that prevent vulnerabilities from occurring in the first place. In this webcast, experts discuss steps to integrate security into the app development process.
Posted: 15 Jan 2019 | Premiered: Mar 13, 2018

WhiteSource

IT outlook in 2019
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, find out what dominated the headlines in 2018, as well as key areas worth looking out for over the next 12 months.
Posted: 15 Jan 2019 | Published: 15 Jan 2019

ComputerWeekly.com

Meet the Experts: Open Source Security 101
sponsored by WhiteSource
WEBCAST: According to Forrester, 80% of developers used open source in their applications in the past year. When using open source, you must consider the security of the application. This webinar provides a high level overview of considerations that engineering teams and security officers should keep in mind when tackling open source security issues.
Posted: 14 Jan 2019 | Premiered: Jan 26, 2017

WhiteSource

Equifax Breach Lessons: How to Avoid Becoming the Next Victim
sponsored by WhiteSource
WEBCAST: Learn about the story behind the largest data breach to date. Understand the root cause, the timeline and why it was preventable. This webcast offers advice on how to avoid being the next Equifax. Some key suggestions include: implementing the right solution, changing the way you think and deal with application security and acting fast.
Posted: 14 Jan 2019 | Premiered: Nov 9, 2017

WhiteSource

DomainTools Guide to Threat Hunting with Splunk and Phantom
sponsored by DomainTools
WEBCAST: Threat hunting is a hypothesis driven approach to validating the collection, detection and analysis of data ahead of an incident. The first step to integrating threat hunting into your organization is establishing a true threat hunting program. In this webcast, learn about a number of threat hunting essentials.
Posted: 14 Jan 2019 | Premiered: Jan 14, 2019

DomainTools

The Beginner's Guide to Threat Hunting
sponsored by DomainTools
WEBCAST: Threat hunting is a hypothesis driven approach to validating the collection, detection and analysis of data ahead of an incident. It is important to establish a threat hunting process to have for reference before any possible incidents. In this webcast, learn about the key steps to creating a threat hunting process.
Posted: 11 Jan 2019 | Premiered: Dec 31, 2018

DomainTools

SANS Fingerprinting Threat Actors with Web Assets
sponsored by DomainTools
WEBCAST: Threat intelligence helps companies better predict the actions of threat actors to stay ahead of their attacks. In order to do this, organizations must learn more about the enemy. In this webcast, SANS instructor Rebekah Brown and Data Systems Engineer at DomainTools, Mike Thompson discuss ways to better fingerprint threat actors.
Posted: 11 Jan 2019 | Premiered: May 31, 2018

DomainTools

SANS 2018 Threat Hunting Survey Results
sponsored by DomainTools
WHITE PAPER: Threat hunting is a focused and iterative approach to searching out, identifying and understanding adversaries who have entered the defender's networks. Threat hunting is a hypothesis-driven approach to validating the collection, detection and analysis of data ahead of an incident. In this white paper, learn about all things threat hunting.
Posted: 11 Jan 2019 | Published: 30 Sep 2018

DomainTools

How To Analyze and Investigate Malicious Javascript Attacks
sponsored by DomainTools
WEBCAST: The increased frequency of JavaScript attacks creates big problems when trying to protect your users. JavaScript is the top language running on the web with 80% of the top 1 million sites using it in some capacity. In this webcast, Tarik Saleh, Keith Hoodlet and Paul Asadoorian will show you several different forms of malicious JavaScript.
Posted: 10 Jan 2019 | Premiered: Jan 10, 2019

DomainTools

2019: No Oscars for Bad Threat Actors
sponsored by DomainTools
WEBCAST: There has been a massive increase in the number and types of cybersecurity threats over the years. In this webcast, experts from DomainTools discuss some cyber forecasts and predictions for the coming years including IoT devices, automation, breaches and more.
Posted: 10 Jan 2019 | Premiered: Dec 31, 2018

DomainTools

The Beginner's Guide to Mitigating Phishing Attacks
sponsored by DomainTools
WEBCAST: Phishings attacks are a common form of fraud that is most commonly done by disguising malicious links to distribute malware. In this webcast, Corin Imani, Senior Security Advisor at DomianTools discusses real world examples, the steps to executing a phishing attack and ways to remediate a phishing attack.
Posted: 10 Jan 2019 | Premiered: Jan 10, 2019

DomainTools

2018 Cybersecurity Report Card: Organizations Rate their Security Posture and Share Best Practices
sponsored by DomainTools
WHITE PAPER: Responses from the 2018 Report Card survey shed light on how cybersecurity practices are evolving, and what the most successful organizations are doing to ensure they stay ahead of the ever-growing and changing threat landscape. This report outlines key findings from the survey and suggests how companies can improve their security efforts.
Posted: 10 Jan 2019 | Published: 31 Dec 2018

DomainTools

Best Practices for Protecting Against Phishing, Ransomware and Email Fraud
sponsored by DomainTools
WHITE PAPER: Security teams and the organizations they support live in difficult times: they increasingly are the targets of sophisticated threats. In this white paper, learn about the top concerns of decision makers, the growing success of cyberthreats, security's need to improve and best practices to consider.
Posted: 10 Jan 2019 | Published: 30 Apr 2018

DomainTools

CIO Trends #8: Benelux
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide we reveal how the Netherlands are taking the lead in cybersecurity; how Brussels is gearing up to be an insurtech hub and why the Dutch decided to share details of a Russian hacking of a major organisation with the rest of the world.
Posted: 09 Jan 2019 | Published: 09 Jan 2019

ComputerWeekly.com

The Suspicious Seven: A Network Visibility Checklist
sponsored by OneNeck IT
RESOURCE: Discovering key insights into attackers' behaviors and location within your environment can help you prevent a security event from becoming a full-blown data breach. This checklist provides 7 of the most common types of network blind spots and suspicious activities.
Posted: 07 Jan 2019 | Published: 31 Mar 2017

OneNeck IT

Top 10 cyber crime stories of 2018
sponsored by ComputerWeekly.com
EGUIDE: This year was marked by several reports on the spiralling cost of cyber crime to businesses as well as to the national and the global economy, as the cyber security industry turned to the bottom line as a motivator for decision makers to prioritise defence against cyber criminal activities. Here are Computer Weekly's top 10 cyber crime stories 2018
Posted: 03 Jan 2019 | Published: 03 Jan 2019

ComputerWeekly.com

Competitive Edge in the Cloud
sponsored by Akamai Technologies
EBOOK: Businesses rely on the cloud for agility, cost savings, and scalability, but how do you ensure that the cloud technologies enabling your business aren't also introducing security risks, impacting customer experience (CX), or costing more than anticipated? This e-book explains how cloud delivery platforms are designed to make the cloud work for you.
Posted: 27 Dec 2018 | Published: 31 Aug 2018

Akamai Technologies

A New SIEM for a New World
sponsored by Empow Cyber Security
WEBCAST: With the rise of digital business, attack surfaces have expanded, data has become more abundant and complex and alerts have become a hindrance rather than a help. Traditional SIEMs aren't able to keep up with this new environment. Watch this webinar to learn about the kind of SIEM today's dynamic world requires.
Posted: 27 Dec 2018 | Premiered: Dec 27, 2018

Empow Cyber Security

Making a DDoS Protection Plan: 8 Best Practices
sponsored by Akamai Technologies
WHITE PAPER: Having a DDoS protection plan in place when an attack strikes will make the difference between organization-wide panic and an orderly and timely response that keeps business as usual. In this white paper, learn about 8 best practices for building and maintaining a DDoS protection plan.
Posted: 27 Dec 2018 | Published: 30 Sep 2017

Akamai Technologies

Cybersecurity Operations: Realities and Strategies
sponsored by Empow Cyber Security
WEBCAST: Traditional cybersecurity technologies were not built for today's dynamic environments. They were designed for a simpler time, but the world has changed and security strategies and technologies must change with it. Listen as Jon Oltsik, Senior Principal Analyst at ESG discusses how to keep your organization safe.
Posted: 27 Dec 2018 | Premiered: Dec 27, 2018

Empow Cyber Security

How Natural Language Processing Can Automate Your SIEM
sponsored by Empow Cyber Security
WEBCAST: IT environments are growing more complex and bloated, but there aren't enough trained and knowledgeable security professionals available to manage and protect environments. In this webcast, Donnelly Financial's CISO Dannie Combs discusses how they tackled the cybersecurity skills shortage using next-gen SIEM.
Posted: 27 Dec 2018 | Premiered: Dec 27, 2018

Empow Cyber Security

Closing the IT Security Gap with Automation & AI in the Era of IoT: EMEA
sponsored by Aruba Networks
RESOURCE: The purpose of this research by Ponemon Institute is to understand the gaps in IT security programs and strategies that diminish companies' ability to identify, detect, contain and resolve data breaches and other security incidents. In this report, Ponemon Institute presents the findings from a survey completed by IT and IT security practitioners.
Posted: 21 Dec 2018 | Published: 30 Sep 2018

Aruba Networks
1 - 25 of 1339 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement