IT Management  >   Systems Operations  >   Security  >  

Cybersecurity

RSS Feed   
ALSO CALLED: Cyber Security, Cyber Security Enhancement Act of 2002
DEFINITION: Information assurance, including information security, information technology disaster recovery, and information privacy. See Section 225, Cyber Security Enhancement Act of 2002, of the Homeland Security Act.
Cybersecurity Reports
1 - 25 of 986 Matches Previous Page  |  Next Page
CISOs Map Out Their 2018 Cybersecurity Plans
sponsored by SearchSecurity.com
EZINE: As attack vectors increase and cyberattacks become more sophisticated, how are CISOs preparing? Find out inside this issue of Information Security magazine, where security professionals detail the process of developing effective one-year cybersecurity plans.
Posted: 23 Apr 2018 | Published: 23 Apr 2018

SearchSecurity.com

Multi-Vector Protection: Defense-in-Depth With Layered Techniques for Corporate Endpoints
sponsored by Tech Data - MalwareBytes
RESOURCE: Access this resource to find out why securing your organization's endpoints requires multi-vendor protection.
Posted: 23 Apr 2018 | Published: 23 Apr 2018

Tech Data - MalwareBytes

Anatomy of a Cyber Attack
sponsored by Oracle Corporation
WHITE PAPER: Security is everyone's job today, from consumers, to system administrators, to executives. Explore this resource to gain insight into the anatomy of a cyberattack, the lifecycle of a security breach and how to augment your current approach to protect your sensitive data.
Posted: 20 Apr 2018 | Published: 20 Apr 2018

Oracle Corporation

Ransomware Protection: A Best Practices Approach to Securing Your Enterprise
sponsored by Tech Data - MalwareBytes
WHITE PAPER: The primary goal of all ransomware is to gain access and to encrypt the endpoint. Explore this resource to uncover a best practices approach to securing your enterprise against malware.
Posted: 20 Apr 2018 | Published: 20 Apr 2018

Tech Data - MalwareBytes

A Look Into the Global "Drive-by Cryptocurrency Mining" Phenomenon
sponsored by Tech Data - MalwareBytes
WHITE PAPER: Cryptocurrencies were bound to trigger the interest of criminals and it wasn't long before coin mining malware made an appearance. Explore this resource to gain insight into the phenomenon known as "drive-by cryptocurrency mining".
Posted: 20 Apr 2018 | Published: 20 Apr 2018

Tech Data - MalwareBytes

The Year of Internal Threats and Accidental Data Breaches
sponsored by Gemalto
RESEARCH CONTENT: According to the Breach Level Index report, there were 2,600,968,280 records breached in 2017 making it a record year for stolen data. Explore the report to gain insight into why 2017 is being referred to as the year of internal threats and accidental data breaches.
Posted: 20 Apr 2018 | Published: 18 Apr 2018

Gemalto

Crypto-Agility: Security Without Compromise
sponsored by Gemalto
WHITE PAPER: Cryptographic protocols and algorithms evolve over time to counter new security threats. This resource explores Gemalto's encryption strategy, which can help you gain certified high-assurance network security, maximum network and application performance, and more.
Posted: 20 Apr 2018 | Published: 18 Apr 2018

Gemalto

Zero Trust Identity and Access Management Webinar
sponsored by Centrify Corporation
WEBCAST: How does your enterprise plan to improve identity security? Tune into this on-demand webinar to uncover how a zero trust concepts can be applied to enhance IAM.
Posted: 18 Apr 2018 | Premiered: Apr 18, 2018

Centrify Corporation

Security's Password Crisis
sponsored by Centrify Corporation
WHITE PAPER: Are you neglecting secure access to apps and endpoints? This ebook offers an approach to lower your risk of getting breached by increasing your IAM maturity through adopting a Zero Trust approach with the right IDaaS strategy.
Posted: 18 Apr 2018 | Published: 18 Apr 2018

Centrify Corporation

Security's Privilege Crisis
sponsored by Centrify Corporation
WHITE PAPER: With compromised credentials as today's #1 threat vector, and the premium hackers place on privileged access, status quo is a treacherous security path to remain on. This ebook looks at what's behind the privilege crisis, helps you assess how your privileged access management strategy stacks up and proposes a rethink in your approach.
Posted: 18 Apr 2018 | Published: 18 Apr 2018

Centrify Corporation

CEO Disconnect Is Weakening Cybersecurity
sponsored by Centrify Corporation
RESEARCH CONTENT: As business models have become increasingly digital, high-profile, reputation-damaging security breaches are grabbing more news media headlines. This resource offers insights into senior-level thinking on the issue of cybersecurity, including current security priorities and the perceived degree of alignment between threats and solutions.
Posted: 18 Apr 2018 | Published: 18 Apr 2018

Centrify Corporation

How to Prepare for GDPR
sponsored by AlienVault
WEBCAST: The GDPR requires organizations to maintain a plan to detect data breaches, regularly evaluate the effectiveness of security practices, and document evidence of compliance. Take a look at this webcast to uncover a compliance and unified security management approach to prepare for the GDPR.
Posted: 18 Apr 2018 | Premiered: Apr 18, 2018

AlienVault

Operationalize Security To Secure Your Data Perimeter
sponsored by IBM
RESEARCH CONTENT: According to a Forrester report, 46% of organizations encrypt little to none of their data. Take a look at this report to gain insight into how organizations are attempting to operationalize security in order to protect their vast stores of data.
Posted: 17 Apr 2018 | Published: 17 Apr 2018

IBM

Managing Fraud Risks in the Digital World
sponsored by SAS
WHITE PAPER: New digital product and payment methodologies have presented fresh opportunities for fraudsters and different challenges for fraud managers. Access this resource to uncover how to stay secure and manage fraud risks in the digital world.
Posted: 17 Apr 2018 | Published: 17 Apr 2018

SAS

Simplifying Fraud Analytics
sponsored by SAS
WHITE PAPER: According to SAS, as losses continue to grow, detecting and preventing fraud is consistently ranked among the top three investment and strategic priorities for insurance executives. Explore this resource to uncover 10 steps to detecting and preventing insurance fraud.
Posted: 17 Apr 2018 | Published: 17 Apr 2018

SAS

10 Tips for Selecting a Managed Security Service Provider (MSSP)
sponsored by AlienVault
WHITE PAPER: Many businesses are turning to managed security service providers (MSSPs) to keep up with the constant barrage of cyber threats. Explore this resource to uncover 10 tips for selecting an MSSP.
Posted: 17 Apr 2018 | Published: 17 Apr 2018

AlienVault

Detect Ransomware Before it's Too Late with AlienVault USM Anywhere
sponsored by AlienVault
WEBCAST: Ransomware alone is the fastest growing security threat. Take a look at this webcast to uncover how to detect ransomware before it's too late with a unified security management (USM) strategy.
Posted: 17 Apr 2018 | Premiered: Apr 17, 2018

AlienVault

Forrester Study: The Total Economic Impactâ„¢ of AlienVault USM
sponsored by AlienVault
WHITE PAPER: Based on a 2017 study conducted by the Ponemon Institute, the probability that an organization will experience a breach greater than 1,000 records is 14%. Take a look at this Forester report to gain insight into the impact of unified security management.
Posted: 16 Apr 2018 | Published: 16 Apr 2018

AlienVault

Security Event Monitoring Report
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Organizations are facing increasing pressure to implement security event monitoring to improve threat detection capabilities and address regulatory compliance requirements. Inside this Gartner report uncover key challenges and recommendations for improving SIEM strategies.
Posted: 16 Apr 2018 | Published: 16 Apr 2018

Arctic Wolf Networks, Inc.

Malware Quiz
sponsored by Cisco Umbrella
RESOURCE: Every good story needs a villain, and the world of network security has plenty. Explore this resource to test your malware IQ (and your knowledge of fairy tales) by taking our quick quiz on famous villains.
Posted: 12 Apr 2018 | Published: 12 Apr 2018

Cisco Umbrella

Tips and Tricks for Deploying Next-Generation Cybersecurity Using Micro-Segmentation
sponsored by VMware
WHITE PAPER: According to the Ponemon Institute, 89% of organizations have experienced a data breach. Take a look at this resource to uncover a strategy for rethinking your security strategy to meet next-generation security challenges by utilizing micro-segmentation.
Posted: 12 Apr 2018 | Published: 12 Apr 2018

VMware

4 Opportunities to Create a Strategic Cybersecurity Advantage
sponsored by Nuix
WHITE PAPER: Cybersecurity breaches are a pandemic weakness exposing the whole world. Let's face it, they're going to happen. Take a look at this resource to uncover 4 opportunities to create a strategic cybersecurity advantage.
Posted: 12 Apr 2018 | Published: 12 Apr 2018

Nuix

Manufacturing Solution Brief
sponsored by enSilo
WHITE PAPER: According to enSilo, cyberattacks increased 24% globally, during the second quarter of 2017, compared to the first 3 months of the year. Take a look at this resource to uncover an endpoint protection platform that provides pre and post infection security and is able to uniquely meet operational needs of the manufacturing industry.
Posted: 12 Apr 2018 | Published: 12 Apr 2018


The Black Report 2018 - Decoding the Minds of Hackers
sponsored by Nuix
WHITE PAPER: According to the 2018 Black Report, 34% of respondents have been hacking for more than 10 years. Take a look at this report to learn more about the hackers targeting your enterprise.
Posted: 12 Apr 2018 | Published: 12 Apr 2018

Nuix

Driving Innovation with GDPR
sponsored by DXC
WHITE PAPER: GDPR is a compliance challenge. Given the digital, complex and fast-evolving nature of its subject, it's also inherently a technology challenge. Explore this resource to learn about driving innovation with GDPR.
Posted: 12 Apr 2018 | Published: 12 Apr 2018

DXC
1 - 25 of 986 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement