IT Management  >   Systems Operations  >   Security  >  

Cybersecurity

RSS Feed   
ALSO CALLED: Cyber Security, Cyber Security Enhancement Act of 2002
DEFINITION: Information assurance, including information security, information technology disaster recovery, and information privacy. See Section 225, Cyber Security Enhancement Act of 2002, of the Homeland Security Act.
Cybersecurity Reports
1 - 25 of 1320 Matches Previous Page  |  Next Page
Curated Insights on IT GRC
sponsored by MetricStream
EBOOK: Sustainable cyber resilience requires a proactive approach to address today’s cyber risks. In this e-book, discover how organization can achieve cyber resilience in an increasingly digitized world, gain quick tips for achieving budgetary approval from the board and discover how to combat todays threats – read on to unlock this exclusive insight.
Posted: 20 Jan 2021 | Published: 20 Jan 2021

MetricStream

IT and Cyber Risk Management: The Accelerated Approach
sponsored by MetricStream
EBOOK: While business leaders agree on the seriousness of cyber risks, there is often disagreement on where to allocate budge – leading to fractured security efforts that are rarely effective. Read this e-book to unlock a 5-step approach that CISOs can use to address these disagreements and direct a unified approach to security and risk management.
Posted: 20 Jan 2021 | Published: 20 Jan 2021

MetricStream

Using Online Identities in Professional Investigations
sponsored by Pipl
WHITE PAPER: As interactions have become more and more digital, online identities have emerged to replace the traditional notion of a user identity. Read this white paper to learn more about the changing nature of identity and how Pipl leverages online identity data to enhance investigations into today’s cyberthreats.
Posted: 20 Jan 2021 | Published: 20 Jan 2021

Pipl

Online Identity and the Digital Economy of Tomorrow
sponsored by Pipl
EGUIDE: Identity verification has evolved from traditional methods – which required the presence of government-issued documents – towards digital, multi-layered methods. Read this e-guide for an in-depth analysis of the challenges of today’s environments and explore the emerging trends shaping the future of identity verification.
Posted: 20 Jan 2021 | Published: 20 Jan 2021

Pipl

Inky 2020 End of Year Phishing Report
sponsored by Inky Technology
RESEARCH CONTENT: With most people working remote in 2020, reliance on email for communication grew even higher – leading to a stark rise in phishing attacks. This report reflects on the top threat types and security strategies for phishing in 2020 and offers insight into what to expect in 2021 – read on to unlock the full report.
Posted: 20 Jan 2021 | Published: 20 Jan 2021

Inky Technology

Fighting Hackers & Responding to Ransomware: A How-To
sponsored by Fidelis
EGUIDE: Cyberthreats aren’t going away any time soon. It’s vital that you take steps to ready your organization for any attack that comes your way. In this expert e-guide, explore 5 actionable deception-tech steps for fighting hackers as well as 9 steps for creating a ransomware incident response plan. Open now to put your best security foot forward.
Posted: 20 Jan 2021 | Published: 15 Jan 2021

Fidelis

CW Benelux - February-April 2021: Is reluctance to report cyber crimes in the Netherlands helping the criminals to get away?
sponsored by ComputerWeekly.com
EZINE: According to an academic study in the Netherlands, only one in seven Dutch people report a cyber crime to the police when it happens - feeling it is better to sort the problem out themselves because they don't think the police will do anything.
Posted: 20 Jan 2021 | Published: 11 Feb 2021

ComputerWeekly.com

API Security Checklist
sponsored by Curity AB
EGUIDE: As APIs grow in usage, they become a more valuable target for cybercriminals. This API Security Checklist was written to help guide you on your journey towards protecting web APIs by offering insight into emerging threats, best practices and expert insights – read on to unlock the full guide.
Posted: 19 Jan 2021 | Published: 19 Jan 2021

Curity AB

AT&T Business: Customer Stories – NHS Management, LLC
sponsored by AT&T Cybersecurity
CASE STUDY: In this case study, see how NHS Management, a healthcare provider that supports 50 nursing homes, was able to address the growing security needs of their patients and establish a threat detection and incident response program that allowed them to protect and prevent unwanted access to patient data – read on for the full story.
Posted: 19 Jan 2021 | Published: 19 Jan 2021

AT&T Cybersecurity

AT&T Managed Threat Detection and Response
sponsored by AT&T Cybersecurity
DATA SHEET: Threat detection and incident response is the bread and butter of an organization’s ability to quickly and reliably mitigate potential threats. Read this data sheet for a closer look at the capabilities and potential benefits of AT&T’s Managed Threat Detection and Response offering.
Posted: 19 Jan 2021 | Published: 19 Jan 2021

AT&T Cybersecurity

Online Identity Information for Professionals
sponsored by Pipl
DATA SHEET: Microsoft, IBM, Twitter, BBC, eBay are among the industry leaders that use Pipl in their identity information investigations – but why? This Pipl data sheet provides an overview of Pipl’s mission, key features, strategic capabilities, and more. Read on to unlock the full data sheet.
Posted: 19 Jan 2021 | Published: 19 Jan 2021

Pipl

How to Protect Your Organization with Managed Threat Detection and Response
sponsored by AT&T Cybersecurity
WEBCAST: Security is spreading its wings. SD-WAN and cloud-based security are both being adopted at a high rate, and this adoption begins with conversations about cyber risk. Because security talent is in short supply, professionals need to find ways to fend off threats. Watch this webcast for a live demo of AT&T’s Managed Threat Detection and Response.
Posted: 19 Jan 2021 | Premiered: Jan 19, 2021

AT&T Cybersecurity

New rules, risks, and rewards: protecting the future of retail
sponsored by AT&T Cybersecurity and Fortinet
WHITE PAPER: For today’s retailers, gathering valuable insights from customer interactions can be pivotal in enhancing and customizing the user experience – hopefully leading to a purchase and lifetime loyalty. However, these advancements can invite a new wave of cyberthreats. Read this white paper to explore a modern security approach for retailers.
Posted: 19 Jan 2021 | Published: 19 Jan 2021

AT&T Cybersecurity and Fortinet

RiskTech 100 2021 Research Report
sponsored by MetricStream
RESEARCH CONTENT: Changes in the risk and compliance landscape were accelerated last year, likely due to the spread of COVID-19 – So what will the technology trends, security threat types and emerging offerings in this landscape look like in 2021? Read this exclusive RiskTech 100 research report to find out.
Posted: 19 Jan 2021 | Published: 19 Jan 2021

MetricStream

Seamlessly Scale Security on AWS with Fortinet
sponsored by Fortinet, Inc.
VIDEO: While cloud is at the foundation of modern innovation, it has the potential to introduce a new array of risks and threats to organizations that aren’t prepared. Watch this webinar – which features security leaders at Fortinet and AWS – to unlock best practices, expert insights, and more.
Posted: 19 Jan 2021 | Premiered: 19 Jan 2021

Fortinet, Inc.

JumpStart Guide to Application Security in AWS
sponsored by Fortinet, Inc.
VIDEO: Deploying and securing critical business applications in cloud environments is becoming a standard practice for today’s IT and security driven organizations. In this webinar, join security experts from SANS, Fortinet and AWS as they discuss how to deploy and security applications in AWS environments – watch now for exclusive insight.
Posted: 19 Jan 2021 | Premiered: 19 Jan 2021

Fortinet, Inc.

Helping Educators Defend their Web Applications with Amazon & Fortinet
sponsored by Fortinet, Inc.
VIDEO: Today’s distributed organizations operate outside what would be traditionally considered a perimeter. As a result, web application and API security are increasingly becoming the first line of defense for critical business asset. Watch this webinar to unlock exclusive insight regarding web app and API security from leaders at AWS and Fortinet.
Posted: 19 Jan 2021 | Premiered: 19 Jan 2021

Fortinet, Inc.

AT&T Managed Threat Detection and Response
sponsored by AT&T Cybersecurity
DATA SHEET: Threat detection is one of the fastest-growing areas in cybersecurity, but talent is in short supply, leaving organizations to do more with less resources. And as cybercriminals become cleverer, the burden falls to the business to counter threats. Examine this data sheet to explore Managed Threat Detection and Response from AT&T.
Posted: 15 Jan 2021 | Published: 15 Jan 2021

AT&T Cybersecurity

Okta + Netskope + CrowdStrike + Proofpoint: Securely Enable Remote Work at Scale
sponsored by Okta
DATA SHEET: Security and access challenges have been magnified by the massive global shift towards remote work. Read this data sheet to see how Okta, Netskope, Crowdstrike and Proofpoint (also known as the Spectra Alliance) combine their efforts to enable organizations to securely enable remote work at scale.
Posted: 15 Jan 2021 | Published: 15 Jan 2021

Okta

The Future of CIAM: 4 Trends Shaping Identity and Access Management
sponsored by Okta
WHITE PAPER: As cyberthreats evolve, so too do the tools and tactics required to safeguard user access. The following white paper highlights 4 trends shaping the identity and access management (IAM) market – read on to unlock this exclusive insight.
Posted: 15 Jan 2021 | Published: 15 Jan 2021

Okta

Global CISO Playbook for the New Normal
sponsored by Fidelis
EBOOK: It’s arguable that CISOs have the toughest job in the world right now. Growing cyber terrains, evolving threat landscapes and skill shortages are all placing more pressure on these professionals than ever before. Download this e-book to hear from the CISO of Fidelis Cybersecurity as he outlines strategies and best practices for cyber defense.
Posted: 15 Jan 2021 | Published: 15 Jan 2021

Fidelis

Enterprise Data Protection Solutions, Explained
sponsored by Forcepoint
EGUIDE: It’s hard to overstate the value of data protection given its ability to safeguard critical assets, maintain brand image and avoid legal issues. However, choosing the right data protection partner can be tough. This data protection buyer’s guide offers key search criteria, questions to ask potential partners and more – read on to get started.
Posted: 15 Jan 2021 | Published: 15 Jan 2021

Forcepoint

Building a New Future for Retail
sponsored by AT&T Cybersecurity and Fortinet
DATA SHEET: Today’s retailers have the opportunity to harness behavioral insights and customer data and transform yesterday’s interactions into streamlined, secure and highly personalized customer experiences. View this infographic to learn more about the threats, opportunities and best practices in modern retail.
Posted: 15 Jan 2021 | Published: 15 Jan 2021

AT&T Cybersecurity and Fortinet

Computer Weekly – 19 January 2021: The UK's struggle with digital schooling
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, the UK government's sudden decision to close schools left many unable to provide children with online schooling - we examine the home learning challenges. Cyber security experts give us their forecasts for 2021. And we find out how technology supports the work of the Guide Dogs charity. Read the issue now.
Posted: 15 Jan 2021 | Published: 19 Jan 2021

ComputerWeekly.com

Pipl: The Online Identity Information Company
sponsored by Pipl
VIDEO: Digital identities are critical for interacting in today’s connected world, and the need to secure and manage these identities has never been higher. Watch this short video to learn more about the state of identity management and the role of Pipl in this global shift.
Posted: 15 Jan 2021 | Premiered: 15 Jan 2021

Pipl
1 - 25 of 1320 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info