IT Management  >   Systems Operations  >   Security  >  

Cybersecurity

RSS Feed   
ALSO CALLED: Cyber Security, Cyber Security Enhancement Act of 2002
DEFINITION: Information assurance, including information security, information technology disaster recovery, and information privacy. See Section 225, Cyber Security Enhancement Act of 2002, of the Homeland Security Act.
Cybersecurity Reports
1 - 25 of 1434 Matches Previous Page  |  Next Page
Simplifying GDPR Compliance
sponsored by PKWare
EBOOK: Since its inception in 2018, the General Data Protection Regulation (GDPR) has cost organizations in the EU more than $330 million USD in collective fines as a result of non-compliance. Read this e-book to learn more about the costs of non-compliance and discover insights for simplifying GDPR efforts.
Posted: 16 Apr 2021 | Published: 16 Apr 2021

TOPICS:  Cybersecurity
PKWare

Is Sensitive Data Safe in the Cloud?
sponsored by PKWare
EBOOK: Whether you’re pondering a move to the cloud, already in the cloud or expending to a multi-cloud environment, this e-book provides you with the insight and guidance needed to assess your risk and manage sensitive data in the cloud – read on to get started.
Posted: 16 Apr 2021 | Published: 16 Apr 2021

TOPICS:  Cybersecurity
PKWare

Forcepoint Data Loss Prevention (Dlp)
sponsored by Forcepoint
BROCHURE: Effective and scalable data protection has become an invaluable resource for today’s dynamic organizations in the fight against targeted attacks and accidental exposure. Read this brochure for an exclusive look at the key features and capabilities of Forcepoint’s Data Loss Prevention (DLP) offering.
Posted: 16 Apr 2021 | Published: 16 Apr 2021

TOPICS:  Cybersecurity
Forcepoint

Your Path To Zero Trust
sponsored by Forcepoint
EBOOK: Zero Trust be gaining popularity as the new way of implementing cybersecurity effectively and equally across today’s dynamic organizations. This e-book looks closer at the pillars of modern Zero Trust, common challenges, best practices and more – read on to unlock this exclusive e-book.
Posted: 16 Apr 2021 | Published: 16 Apr 2021

TOPICS:  Cybersecurity
Forcepoint

Crowdstrike Video 1
sponsored by CrowdStrike
WEBCAST: What did cybercriminals get up to last year? How did they exploit the global health crisis to become more dangerous than ever? View this webinar detailing CrowdStrike’s 2021 Global Threat Report, which uncovers trends in attackers’ ever-evolving tactics, techniques and procedures observed by CrowdStrike teams in 2020.
Posted: 16 Apr 2021 | Premiered: Apr 16, 2021

CrowdStrike

DETECT, DEFEND AND DETER: THE 3 D’S OF SECURE DIGITAL TRANSFORMATION
sponsored by ESET
WHITE PAPER: The COVID-19 pandemic served as a major accelerator for digital transformations, enabling organizations to modify and migrate their operations to a work-from-home model. Read this e-guide to discover the 3 D’s of digital transformation and learn how they can be used to determine the best combination of tools to meet your security needs.
Posted: 16 Apr 2021 | Published: 16 Apr 2021

TOPICS:  Cybersecurity
ESET

Implementing Dynamic SAP Data Masking in ECC & S/4HANA Using Appsian
sponsored by Appsian
WHITE PAPER: SAP data protection can be tricky to master – out-of-the-box options are often underwhelming, and large-scale projects can be complicated and expensive. Read this white paper to learn about Appsian’s alternative, designed to provide a centralized ruleset to help define and mask data across the entire application.
Posted: 16 Apr 2021 | Published: 16 Apr 2021

TOPICS:  Cybersecurity
Appsian

Crowdstrike Video 2
sponsored by CrowdStrike
VIDEO: In this webinar, join Michael Sentonas, the CTO of CrowdStrike, as he provides a comprehensive deep dive into the evolving dynamics of containers, cloud-native apps and next-gen workloads – providing insight into common security challenges and best practices. Watch now to get started.
Posted: 15 Apr 2021 | Premiered: 15 Apr 2021

TOPICS:  Cybersecurity
CrowdStrike

Crowdstrike Services Cyber Front Lines Report
sponsored by CrowdStrike
RESEARCH CONTENT: When it comes to threat readiness, are you confident in your organization’s posture? View the CrowdStrike Services Cyber Front Lines report to learn 6 key observed themes on how adversaries are adapting to today’s realities and learn concrete recommendations that you can implement today to improve your cybersecurity.
Posted: 15 Apr 2021 | Published: 15 Apr 2021

TOPICS:  Cybersecurity
CrowdStrike

The Forrester Wave™: Global Managed Security Services Providers, Q3 2020
sponsored by AT&T Cybersecurity
ANALYST REPORT: In this Forrester Wave report, take a closer look at the managed security services market, including a comprehensive evaluation of the today’s top vendors and their offerings. Read on to unlock the full report.
Posted: 15 Apr 2021 | Published: 27 Jul 2020

TOPICS:  Cybersecurity
AT&T Cybersecurity

Simplify PCI Compliance with Smarter Scope Management
sponsored by PKWare
WHITE PAPER: As organizations around the globe prepare for the newest version of PCI DSS, it’s important to revisit some of the basics of the regulation. Read this white paper for an overview of PCI DSS and discover how to minimize risk and cost without sacrificing compliance.
Posted: 15 Apr 2021 | Published: 15 Apr 2021

TOPICS:  Cybersecurity
PKWare

Securely and Selectively Migrating Enterprise Data To the Cloud
sponsored by PKWare
EBOOK: In order to better secure and manage a growing amount of data, organizations are looking towards cloud capabilities for help. But security in the cloud looks much different than traditional on-premise security. Read this e-book to learn more about the basics of cloud security and how to migrate your sensitive data.
Posted: 15 Apr 2021 | Published: 15 Apr 2021

TOPICS:  Cybersecurity
PKWare

5 Steps To Sase Your Executive’s Guide To Sase-Enabling The “Anywhere” Worker
sponsored by Forcepoint
EGUIDE: Today’s remote workforces require secure access from anywhere – a project that is at the top of the to-do list for most security and IT leaders. Read this e-guide to learn more about cloud-based approach like Secure Access Service Edge (SASE) and discover why so many organizations are embracing it.
Posted: 15 Apr 2021 | Published: 15 Apr 2021

TOPICS:  Cybersecurity
Forcepoint

SolarWinds Compromise and ICS/OT Networks Webinar Recording
sponsored by Dragos
VIDEO: Watch this webinar to join a panel of cybersecurity experts at Dragos as they discuss the facts, impacts and remediation recommendations surrounding the SolarWinds compromise.
Posted: 14 Apr 2021 | Premiered: 22 Dec 2020

TOPICS:  Cybersecurity
Dragos

Detecting fraud in banking with the help of AI and ML software
sponsored by Innovecs LLC
WHITE PAPER: To address the challenges of modern fraud in banking, institutions are turning towards artificial intelligence (AI) and machine learning (ML) capabilities to better detect and mitigate fraud. Read this white paper to learn how AI and ML can help detect fraud in banking.
Posted: 14 Apr 2021 | Published: 14 Apr 2021

TOPICS:  Cybersecurity
Innovecs LLC

Insight Video 1
sponsored by Insight
WEBCAST: With the needs of the new workforce quickly evolving, and with threats always advancing, IT faces the challenge of securely and compliantly managing different working environments. Access this webinar to learn recent trends and developments in security and discover how you can face this challenge by utilizing a 3-layered approach.
Posted: 14 Apr 2021 | Premiered: Mar 25, 2021

TOPICS:  Cybersecurity
Insight

A Blueprint for Data-Centric Security
sponsored by PKWare
WHITE PAPER: Data-centric security is a fundamentally different approach for protecting sensitive data from theft or misuse – but how should organizations go about embracing this new approach? Read this white paper to discover the key principles of data-centric security, along with best practices for designing and building an effective program.
Posted: 14 Apr 2021 | Published: 14 Apr 2021

TOPICS:  Cybersecurity
PKWare

_beta access: General Use Cases
sponsored by Beta Systems
VIDEO: In this short video, take a closer look at some of the common challenges organizations face when using Resource Access Control Facility (RACF) and discover how Beta Systems can help to address these pain points – watch now to get started.
Posted: 14 Apr 2021 | Premiered: 26 Mar 2021

TOPICS:  Cybersecurity
Beta Systems

Introducing MVISION XDR Demo
sponsored by McAfee
VIDEO: As threats become more advanced, more organizations will need security that gets ahead of adversaries before they attack. View this video demo of cloud-delivered MVISION extended detection and response (XDR) – a platform that strives to improve SOC effectiveness by unifying visibility and control across endpoints, networks and cloud.
Posted: 14 Apr 2021 | Premiered: 14 Apr 2021

TOPICS:  Cybersecurity
McAfee

Introducing MVision XDR
sponsored by McAfee
VIDEO: Extended detection and response (XDR) are taking security operations by storm, but are they any better than tried-and-true EDR tools? Watch this short video for a closer look at the key features and capabilities of McAfee’s MVision XDR offering, and discover a virtual demo of the tool in-use.
Posted: 13 Apr 2021 | Premiered: 13 Apr 2021

TOPICS:  Cybersecurity
McAfee

The Soar Buyer’s Guide
sponsored by Splunk
EGUIDE: To address today’s growing security workload, many teams have turned to security orchestration, automation and response (SOAR). In this SOAR buyer’s guide, discover the 10 essential capabilities that should be top-of-mind when evaluating SOAR, and unlock expert guidance for choosing the right tool or technology.
Posted: 13 Apr 2021 | Published: 13 Apr 2021

TOPICS:  Cybersecurity
Splunk

Digital Signing Service
sponsored by GlobalSign
DATA SHEET: In this data sheet, take a closer look at the key features, potential benefits and additional capabilities provided by GlobalSign’s Digital Signing Services (DSS), designed to deploy digital signature capabilities to any application in one simple API integration – read on to get started.
Posted: 13 Apr 2021 | Published: 30 Sep 2020

TOPICS:  Cybersecurity
GlobalSign

How IT & Security Teams Can Be Ready for 2021 and Beyond
sponsored by Tanium
WHITE PAPER: A recent study revealed that over 80% of companies will offer more flexible workplaces post-pandemic. Read this white paper to learn more about how IT and security teams can be ready for the endpoint security and remote workforce challenges of 2021 and beyond.
Posted: 13 Apr 2021 | Published: 13 Apr 2021

TOPICS:  Cybersecurity
Tanium

Preparing for Incident Handling and Response in ICS
sponsored by Dragos
WHITE PAPER: Whether or not it’s formally required, incident response plans (IRPs) play a critical role in preparing for and addressing security incidents. This white paper provides a comprehensive guide of considerations and advice for building an IRP in the industrial sector – read on to get started.
Posted: 13 Apr 2021 | Published: 13 Apr 2021

TOPICS:  Cybersecurity
Dragos

Ransomware in ICS Environment
sponsored by Dragos
RESEARCH CONTENT: Ransomware has steadily become one of the most prevalent and destructive cyberthreats, especially across the industrial sector. Read this research report to dive deeper into ransomware observations, research findings, common attack patterns, predictions, and more.
Posted: 13 Apr 2021 | Published: 31 Dec 2020

TOPICS:  Cybersecurity
Dragos
1 - 25 of 1434 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences