IT Management  >   Systems Operations  >   Security  >  

Cybersecurity

RSS Feed   
ALSO CALLED: Cyber Security, Cyber Security Enhancement Act of 2002
DEFINITION: Information assurance, including information security, information technology disaster recovery, and information privacy. See Section 225, Cyber Security Enhancement Act of 2002, of the Homeland Security Act.
Cybersecurity Reports
1 - 25 of 1283 Matches Previous Page  |  Next Page
Armor Dynamic Threat Blocking (DTB)
sponsored by Armor
WHITE PAPER: Download this white paper to learn about a dynamic threat blocking (DTB) tool that is designed to allow security teams to assess and automatically block both incoming and outgoing malicious IP traffic at any layer of their security stack, dynamically.
Posted: 21 Nov 2018 | Published: 21 Nov 2018

Armor

A Guide to Protecting Microsoft Office 365 from Security Threats
sponsored by Symantec
RESOURCE: Explore how you can achieve your Office 365 migration goals through a set of security and information compliance controls that protect O365.
Posted: 20 Nov 2018 | Published: 20 Nov 2018

Symantec

Intrusion Detection Systems (IDS)
sponsored by Armor
WHITE PAPER: In this white paper, learn about 2 different Intrusion Detection Systems (IDS) that can analyze and correlate all security events, and trigger further investigation by a Security Operations Center when necessary.
Posted: 19 Nov 2018 | Published: 19 Nov 2018

Armor

Exploring the Past, Present, and Future of Blockchain Technology
sponsored by Armor
WHITE PAPER: Download this report for an overview of blockchain's origins, its evolution to Blockchain 2.0, attraction for cryptopirates, and potential to expand into more legitimate industries.
Posted: 19 Nov 2018 | Published: 19 Nov 2018

Armor

Managing the Risk of Post-Breach or "Resident" Attacks
sponsored by Illusive Networks
RESEARCH CONTENT: Find out what Ponemon Institute discovered about organizations' readiness for insider threats when they surveyed 627 IT and IT security practitioners in the United States about their understanding of attackers who operate internally.
Posted: 16 Nov 2018 | Published: 16 Nov 2018

Illusive Networks

CW Nordics ezine November 2018
sponsored by ComputerWeekly.com
EZINE: Given the controversy surrounding some recent elections and fears of interference by foreign actors, it is hardly surprising that the Swedish government is seeking support from the IT sector as it attempts to guarantee elections remain trustworthy.
Posted: 16 Nov 2018 | Published: 16 Nov 2018

ComputerWeekly.com

Analytics to Fight Tax Fraud
sponsored by SAS
WHITE PAPER: Fraudsters are becoming more and more sophisticated with their cyberattacks, especially when it comes to tax fraud. Download this white paper to explore how machine learning and analytics can help tax agencies fight cybercrime.
Posted: 16 Nov 2018 | Published: 31 Mar 2018

SAS

IT Procurement: The Weak Link in Government Security
sponsored by HP
RESOURCE: In this resource, uncover IDC's findings on the extent to which device security is being considered in public procurement of PCs and printers.
Posted: 16 Nov 2018 | Published: 16 Nov 2018

HP

Remove the Guesswork from Securing your Business
sponsored by CompuCom Systems, Inc.
WHITE PAPER: Discover a security best practices questionnaire and a cybersecurity protection checklist to see how your business's defensive strategies measure up against modern threats.
Posted: 16 Nov 2018 | Published: 16 Nov 2018

CompuCom Systems, Inc.

The Elevation of Security
sponsored by HP
EBOOK: We live in the era of digital disruption, when always-on connectivity, a mobile workforce and globalization leave us more vulnerable than ever to cybersecurity assaults. Access this 28-page e-book to grasp a better understanding of how to detect and prevent security attacks in this changing world.
Posted: 15 Nov 2018 | Published: 15 Nov 2018

HP

How to Build a SOC with Limited Resources: Your Guide to Detecting and Responding to Threats Fast
sponsored by LogRhythm, Inc.
WHITE PAPER: Download this white paper to learn how you can integrate a threat lifecycle management platform to successfully build a SOC, even with limited resources.
Posted: 15 Nov 2018 | Published: 15 Nov 2018

LogRhythm, Inc.

IAM: Key to security and business success in the digital era
sponsored by ComputerWeekly.com
EGUIDE: As more organisations undergo digital transformation and cyber attackers increasingly target individuals as their way into the enterprise, identity and access management (IAM) has become a business challenge and has never been more important to the cyber defence, risk management and data protection capability of organisations.
Posted: 15 Nov 2018 | Published: 15 Nov 2018

ComputerWeekly.com

Infographic: 6 emerging trends in security
sponsored by ComputerWeekly.com
EGUIDE: In this infographic, we outline 6 emerging trends in security that cybersecurity pros - and their employers - need to prep for in the next year. These ideas are taken from a keynote by analyst Peter Firstbrook at Gartner Symposium 2018.
Posted: 15 Nov 2018 | Published: 15 Nov 2018

ComputerWeekly.com

The Threat Intelligence Handbook: A Practical Guide for Security Teams to Unlocking the Power of Intelligence
sponsored by Recorded Future
EBOOK: It's easy to find descriptions of what threat intelligence is. But it's harder to learn how to use it to truly make your organization safe from cybercriminals. Continue reading to learn how threat intelligence can help everyone in cybersecurity anticipate problems, respond faster to attacks, and make better decisions on how to reduce risk.
Posted: 14 Nov 2018 | Published: 14 Nov 2018

Recorded Future

How HP Printers Detected London Airport's 2018 Cyberattack
sponsored by HP
CASE STUDY: On April 23, 2018, the cyberterrorist known only as "The Wolf" was able to spread malware across London airport's network using under-secured endpoints. Access this case study to learn how printer threat logs helped IT staff to isolate the attack quickly enough to avoid disrupting operations, negative publicity, and brand damage.
Posted: 14 Nov 2018 | Published: 14 Nov 2018

HP

DNS Security for Financial Services
sponsored by Nominet
WHITE PAPER: Nearly 92% of malware uses DNS to gain command and control, exfiltrate data or redirect traffic, according to a CISCO report. So, protection at the DNS layer is crucial. Read this white paper to find out how to detect and stop DNS threats.
Posted: 12 Nov 2018 | Published: 12 Nov 2018


The Financial Services Industry is Under Attack
sponsored by Nominet
RESOURCE: This resource brings into focus the dangers that cyberthreats pose for the financial services industry. Read on for more about the threat landscape.
Posted: 12 Nov 2018 | Published: 12 Nov 2018


One Year of Active Cyber Defense
sponsored by Nominet
RESOURCE: Download this resource for statistics from actively protecting subscribers to the UK Public Sector DNS Service from attacks and detecting existing anomalies.
Posted: 08 Nov 2018 | Published: 08 Nov 2018


Commercial Cybersecurity Breaches
sponsored by Nominet
RESOURCE: How prepared is your business in case of a cyberattack? Uncover statistics about real life cybersecurity breaches that could happen to your business any day at any time.
Posted: 08 Nov 2018 | Published: 08 Nov 2018


LogRhythm Defeating Threats Through User Data UEBA Whitepaper 2018
sponsored by LogRhythm, Inc.
RESOURCE: Learn how to detect and respond to threats faster by focusing on user activity and behavior.
Posted: 08 Nov 2018 | Published: 08 Nov 2018

LogRhythm, Inc.

CW ASEAN, November 2018: Blockchain is no 'magic wand' for security
sponsored by ComputerWeekly.com
EZINE: Blockchain is all the rage, although the technology is so much more than just about bitcoin and cryptocurrencies. In this issue of CW ASEAN, we examine how blockchain is being applied in cyber security, and whether the technology is really as secure as claimed by its proponents. Read the issue now.
Posted: 07 Nov 2018 | Published: 07 Nov 2018

ComputerWeekly.com

CW ANZ, November 2018: Exploring blockchain
sponsored by ComputerWeekly.com
EZINE: Blockchain technology has been in the news due to its ability to provide much better security, transparency and efficiency. In this issue of CW ANZ, we look at how enterprises in Australia and New Zealand are using blockchain technology to improve security and efficiency, and what it takes to spur greater adoption among ANZ enterprises.
Posted: 07 Nov 2018 | Published: 07 Nov 2018

ComputerWeekly.com

2018 State of the Internet: Credential Stuffing Attacks Report
sponsored by Akamai Technologies
RESEARCH CONTENT: Discover how credential stuffing, the use of botnets to try to login to a site with stolen or randomly created login information, is continuing to affect companies worldwide.
Posted: 07 Nov 2018 | Published: 07 Nov 2018

Akamai Technologies

Webinar: Impact of Your Business Continuity Program on Cyber Resiliency
sponsored by IBM
WEBCAST: In this webinar, APAC Leader at IBM Mijee Briana Walker stresses the importance of establishing a business continuity management (BCM) program that proactively provides uptime in case of data breaches. Tune in for a proven, 3-pronged framework for BC, 10 areas your BCM should focus on, and more.
Posted: 09 Nov 2018 | Premiered: Nov 9, 2018

IBM

Webinar: Impact of Your Business Continuity Program on Cyber Resiliency
sponsored by IBM
WEBCAST: In this webinar, APAC Leader at IBM Mijee Briana Walker stresses the importance of establishing a business continuity management (BCM) program that proactively provides uptime in case of data breaches. Tune in for a proven, 3-pronged framework for BC, 10 areas your BCM should focus on, and more.
Posted: 09 Nov 2018 | Premiered: Nov 9, 2018

IBM
1 - 25 of 1283 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement