IT Management  >   Systems Operations  >   Security  >  

Cybersecurity

RSS Feed   
ALSO CALLED: Cyber Security, Cyber Security Enhancement Act of 2002
DEFINITION: Information assurance, including information security, information technology disaster recovery, and information privacy. See Section 225, Cyber Security Enhancement Act of 2002, of the Homeland Security Act.
Cybersecurity Reports
1 - 25 of 989 Matches Previous Page  |  Next Page
Secure Your Business-Critical Applications
sponsored by Onapsis
PRODUCT OVERVIEW: An attack on your SAP and Oracle EBS applications would have a devastating impact on your organization's financial well-being and reputation, yet security remains a blind spot. In this solution brief, learn how Secure the Core by Onapsis protects your ERP systems from internal and external threats.
Posted: 23 Aug 2019 | Published: 23 Aug 2019

Onapsis

Proofpoint Email Isolation
sponsored by Proofpoint
PRODUCT OVERVIEW: It's an ongoing struggle to protect your employees against targeted phishing attacks and credential theft. To make matters worse, attackers are quickly getting the upper hand by using malicious URLs for large-scale campaigns. In this brief, learn how Proofpoint Email Isolation can help you isolate your employees from advanced threats.
Posted: 23 Aug 2019 | Published: 23 Aug 2019

Proofpoint

6 Reasons Why Your Security Appliance Solution is Failing Your Business
sponsored by Avast Software
WHITE PAPER: A decade ago it was easier to secure most businesses. With less advanced threats, most SMBs were protected with a combination of Unified Threat Management and Secure Web Gateways. In this white paper, uncover the most common reasons these security application solutions are now failing your business.
Posted: 23 Aug 2019 | Published: 23 Aug 2019

Avast Software

The Role of Breach and Attack Simulation
sponsored by Cymulate
VIDEO: The volume of data breaches and cyberattacks are continuing to rise. As a result, organizations are relying on breach and attack simulation tools to provide more consistent and automated validation of controls. In this video, Tim Ager from Cymulate discusses today's cyberthreats landscape and the rise of breach and attack simulation tools.
Posted: 23 Aug 2019 | Premiered: 23 Aug 2019

Cymulate

Protect Your Business-Critical Applications in the Cloud
sponsored by Onapsis
PRODUCT OVERVIEW: Moving your business-critical applications to the cloud has many benefits including cost savings and agility. However, you need visibility and insights into your cloud environment to ensure security and compliance. In this brief, learn how Onapsis can help your organization prepare for potential cyberattacks, compliance audits, and more.
Posted: 23 Aug 2019 | Published: 23 Aug 2019

Onapsis

Cyber attackers exploiting poor cloud security
sponsored by ComputerWeekly.com
EGUIDE: More than a third of organisations report a cyber attack on the cloud environment due to a lack of basic cloud security hygiene
Posted: 23 Aug 2019 | Published: 23 Aug 2019

ComputerWeekly.com

Market Guide for User and Entity Behavior Analytics
sponsored by LogRhythm, Inc.
ANALYST REPORT: Security and risk management leaders considering UEBA are finding that the market keeps shifting away from pure-play vendors, toward a wider set of traditional security products that embed core UEBA technologies and features. Download this Gartner report to learn more.
Posted: 23 Aug 2019 | Published: 21 May 2019

LogRhythm, Inc.

Top 10 Reasons Customers Choose Proofpoint to Protect Office365
sponsored by Proofpoint
RESOURCE: For organizations migrating to the cloud, Microsoft Office 365 is a whole new way of working—one that requires a whole new approach to security and compliance. Dive into this infographic to discover the top 10 reasons customers may be choosing Proofpoint to protect Office 365.
Posted: 22 Aug 2019 | Published: 22 Aug 2019

Proofpoint

Security Powered by Understanding
sponsored by Armorblox
PRODUCT OVERVIEW: Social engineering has become the top attack vector for stealing data, and even experienced users struggle to mitigate these risks. Traditional DLP solutions are ineffective in detecting such risks because they lack context. In this brief, learn how Armorblox brings contextual understanding to security.
Posted: 22 Aug 2019 | Published: 22 Aug 2019

Armorblox

Ransom(Every)Ware
sponsored by Neustar
WHITE PAPER: In what would become a troubling theme, WannaCry, and subsequent strains of ransomware, could have been prevented from becoming a public nuisance had proper maintenance and diligence been employed. In this white paper, learn how to prevent a ransomware attack at your organization.
Posted: 22 Aug 2019 | Published: 22 May 2019

Neustar

Security Powered by Understanding
sponsored by Armorblox
DATA SHEET: In this brief, learn how Armorblox brings understanding to security to address security's weakest link: the human layer.
Posted: 22 Aug 2019 | Published: 22 Aug 2019

Armorblox

Mobile Security Case Study
sponsored by Symantec
CASE STUDY: Your business could not survive without users being empowered by mobile technology. Yet one quarter of organizations have been affected by a security breach that has either resulted in lost data or downtime. In this resource, learn how Symantec is helping 3 companies overcome their mobile endpoint protection challenges.
Posted: 22 Aug 2019 | Published: 22 Aug 2019

Symantec

Adapting to the New Reality of Evolving Cloud Threats: Executive Summary
sponsored by Symantec
EBOOK: In the executive summary of Symantec's Cloud Security Threat Report, explore best practices for building an effective cloud security strategy to help address these challenges.
Posted: 22 Aug 2019 | Published: 22 Aug 2019

Symantec

High Alert Chapter 1: Perfect Storm
sponsored by Symantec
EBOOK: Could burnout in your security teams be putting your business and your data at risk? In Chapter 1 of Symantec's High Alert Series, discover key findings on why cybersecurity teams feel overwhelmed and how you can tackle the cybersecurity overload in 2019.
Posted: 22 Aug 2019 | Published: 22 Aug 2019

Symantec

Work Less. Secure More
sponsored by Symantec
RESOURCE: Today, your InfoSec teams simply can't deal with the exploding number of threats in the cloud and keep pace with your continuous integration and development processes. But intelligent automation can. In this infographic, learn how Symantec Cloud Workload Protection makes sure you never have to sacrifice safety for speed.
Posted: 22 Aug 2019 | Published: 22 Aug 2019

Symantec

Armorblox NLU Platform
sponsored by Armorblox
PRODUCT OVERVIEW: Using natural language understanding (NLU), deep learning, analytics, automation, and distributed remediation, Armorblox can help defend your organization against business email compromise attacks, prevent data leaks, and inject integrity into your business workflows. In this solution brief, explore key features of the Armorblox NLU Platform.
Posted: 22 Aug 2019 | Published: 22 Aug 2019

Armorblox

High Alert Chapter 2: Skills Crisis Infographic
sponsored by Symantec
RESOURCE: New research from Symantec uncovers the huge challenge organizations face in attracting, retaining and nurturing the right caliber of cybersecurity professionals. Download this infographic to find key statistics from the research. Also, explore 3 ideas for tackling the skills shortage.
Posted: 22 Aug 2019 | Published: 22 Aug 2019

Symantec

Protecting Your Organization from Password Breaches
sponsored by OneLogin
EGUIDE: With a large number of password breaches happening, enterprises should look into methods for protecting their resources. Although there are many methods for protecting passwords and accounts, finding the right one can be challenging. In this e-guide, explore a number of tools organizations can use to help secure their passwords and accounts.
Posted: 21 Aug 2019 | Published: 19 Aug 2019

OneLogin

Choosing the Right Endpoint Security Controls for your Security Lifecycle
sponsored by Symantec
ANALYST REPORT: In the modern world of cloud-enabled digital transformation initiatives, endpoint security has gained importance. Download this report for key points to consider when evaluating endpoint security software such as endpoint protection and endpoint detection and response.
Posted: 21 Aug 2019 | Published: 30 Apr 2019

Symantec

High Alert Chapter 1: Perfect Storm Infographic
sponsored by Symantec
RESOURCE: Could burnout in your security teams be putting your business and your data at risk? Download this infographic for key findings on why cybersecurity teams feel overwhelmed and how you can tackle the cybersecurity overload in 2019.
Posted: 21 Aug 2019 | Published: 21 Aug 2019

Symantec

High Alert: Tackling Cybersecurity Overload in 2019
sponsored by Symantec
EBOOK: Download this e-book for exclusive new research from Symantec that highlights the challenge that CISOs and security leaders face in trying to find, attract and retain cybersecurity professionals.
Posted: 21 Aug 2019 | Published: 21 Aug 2019

Symantec

The Perimeter is Dead. Long Live the Perimeter
sponsored by Symantec
RESOURCE: The traditional network perimeter is vanishing and so is the security built into that perimeter. In order to stay secure in today's cloud generation workforce, organizations need a better way to extend their security controls while still supporting anytime and anywhere access. In this infographic, learn 5 tips for securing your network.
Posted: 21 Aug 2019 | Published: 21 Aug 2019

Symantec

Office 365: 5 Things to Ask Yourself Before Migrating
sponsored by Symantec
RESOURCE: Although the cloud has been a game changer for IT, allowing organizations to quickly and cost-effectively adopt apps and services like Office 365, it also brings with it a new set of security challenges. In this resource, explore 5 questions you should ask when migrating to cloud services like Office 365.
Posted: 21 Aug 2019 | Published: 21 Aug 2019

Symantec

Office 365 Business Case Builder
sponsored by Symantec
PRODUCT OVERVIEW: Office 365 is a broad and diverse platform that can present a complex security risk. In this resource, discover a 6-point business case builder to demonstrate how Symantec CloudSOC and Email Security.cloud can help provide protection for not just Office 365 but your wider cloud environment.
Posted: 21 Aug 2019 | Published: 21 Aug 2019

Symantec

CloudSOC and Email Security.cloud for Microsoft Office 365
sponsored by Symantec
PRODUCT OVERVIEW: Email is the #1 attack vector with 71% of targeted attacks coming from spear phishing emails, according to the 2018 Symantec Internet Security Threat Report. In this solution brief, learn how Symantec CloudSOC CASB and Email Security.cloud for Office 365 can help you secure your email and apps against threats.
Posted: 21 Aug 2019 | Published: 21 Aug 2019

Symantec
1 - 25 of 989 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement