IT Management  >   Systems Operations  >   Security  >  

Cybersecurity

RSS Feed   
ALSO CALLED: Cyber Security, Cyber Security Enhancement Act of 2002
DEFINITION: Information assurance, including information security, information technology disaster recovery, and information privacy. See Section 225, Cyber Security Enhancement Act of 2002, of the Homeland Security Act.
Cybersecurity Reports
1 - 25 of 1423 Matches Previous Page  |  Next Page
Six Signs Your Cybersecurity Training Program Needs an Overhaul
sponsored by CyberVista
EBOOK: According to Verizon’s 2020 DBIR, ransomware accounts for 27% of malware incidents, and 18% of organizations blocked at least one attack. The most effective defense against these threats is an effective cybersecurity training program – but how can you tell if yours is in need of an overhaul? Read this e-book for 6 surefire signs.
Posted: 23 Jul 2021 | Published: 23 Jul 2021

TOPICS:  Cybersecurity
CyberVista

Remote Work Is A Risky Business; How Dathena Helps You Identify And Assess Risks In The WFH Era
sponsored by Dathena
BLOG: Thankfully, cloud technology has enabled organizations to maintain collaboration and productivity while the world was shut down – but the work from home (WFH) era brought about several new security challenges. Read this article to learn about how Dathena is helping organizations identify and asses risk in the WFH era.
Posted: 23 Jul 2021 | Published: 10 May 2021

TOPICS:  Cybersecurity
Dathena

Computer Weekly - 27 July 2021: Are we getting cyber security skills all wrong?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, the chair of the new UK Cyber Security Council tells us how she plans to fundamentally reimagine what working in IT security means. Our latest buyer's guide examines ERP modernisation and its role in digital transformation. And we take an in-depth look at the first preview version of Windows 11. Read the issue now.
Posted: 23 Jul 2021 | Published: 27 Jul 2021

ComputerWeekly.com

Democratisation of SIEM
sponsored by Rapid 7
BLOG: Security information and event management (SIEM) has emerged as one of the most effective ways to secure today’s distributed endpoint and remote workers. Take this short survey to unlock an article highlighting how the democratization of SIEM is transforming security operations.
Posted: 21 Jul 2021 | Published: 21 Jul 2021

TOPICS:  Cybersecurity
Rapid 7

SECURITY FOR THE REMOTE WORKFORCE
sponsored by Malwarebytes
WHITE PAPER: The IDC predicts that the post-vaccine remote workforce will be 50% higher than it was pre-pandemic – IT leaders need to prepare for this eventuality and come up with long-term plans to secure and enable remote workers. Read this white paper to get started.
Posted: 16 Jul 2021 | Published: 16 Jul 2021

TOPICS:  Cybersecurity
Malwarebytes

Conforming Network Security to Cloud Native Applications
sponsored by Palo Alto Networks
VIDEO: Cloud and cloud-native applications are revolutionizing SDLCs and challenging traditional network connectivity and security practices. Watch this presentation to learn more about the impacts of cloud apps on network security, the emergence of lateral movement threats, and best practices for protecting the modern network.
Posted: 15 Jul 2021 | Premiered: 23 Jun 2021

TOPICS:  Cybersecurity
Palo Alto Networks

The Mimecast-Netskope-Crowdstrike Triple Play: Integrating Best-Of-Breed Solutions
sponsored by Mimecast
WHITE PAPER: The Mimecast-Netskope-CrowdStrike “Triple Play” is a joint effort created to address the growing information security challenges facing today’s IT pros. Read on to learn how these organizations combined their best-of-breed cybersecurity solutions to help organizations address cyberattacks and data loss.
Posted: 14 Jul 2021 | Published: 14 Jul 2021

TOPICS:  Cybersecurity
Mimecast

From Complex to Cohesive
sponsored by Cisco
EBOOK: To keep up with today's cybersecurity demands, organizations are shifting towards security platforms to help ensure each user, device, environment and workload is protected around the clock. Read this e-book to learn more about security platforms and discover how to evaluate your platform options.
Posted: 14 Jul 2021 | Published: 14 Jul 2021

TOPICS:  Cybersecurity
Cisco

Ransomware Defense
sponsored by Egnyte
PRODUCT OVERVIEW: Defending against today’s advanced ransomware threats requires an understanding of the anatomy of these attacks as well as a streamlined process to detect, remediate and prevent potential threats. Access this data sheet to learn more about getting started with ransomware defense.
Posted: 14 Jul 2021 | Published: 14 Jul 2021

TOPICS:  Cybersecurity
Egnyte

CPP Associates Security Practice
sponsored by CPP Associates
VIDEO: Like any sect of criminal, cybercriminals thrive in times of crisis – such as the COVID-19 pandemic that impacted nearly everyone. This short video highlights some of the changes in the threat landscape and overviews the key functions and capabilities of CPP Associates’ security offerings.
Posted: 14 Jul 2021 | Premiered: 28 Sep 2020

TOPICS:  Cybersecurity
CPP Associates

The Ultimate Guide To Ransomware
sponsored by Egnyte
EGUIDE: The following e-guide provides a comprehensive deep dive into everything you need to know about ransomware, including how attackers think, prevention tactics, remediation best practices, and more. Read on to access this exclusive e-guide.
Posted: 13 Jul 2021 | Published: 13 Jul 2021

TOPICS:  Cybersecurity
Egnyte

Mitigating Ransomware Risks: Learn the Best Defensive Practices
sponsored by Egnyte
PRODUCT DEMO: Ransomware incidents have become a regular occurrence, a trend that’s not expected to die down anytime soon. Watch this demo to learn more about the evolving ransomware landscape and discover the most effective steps for reducing risks.
Posted: 13 Jul 2021 | Premiered: 13 Jul 2021

TOPICS:  Cybersecurity
Egnyte

The Anatomy Of Mobile Attacks
sponsored by Zimperium
WHITE PAPER: With the same level of access as laptops but far less security, mobile devices have become a lucrative vector for cybercriminals. Download this white paper for a breakdown of the anatomy of common mobile attacks, an overview of the Cyber Kill Chain (CKC) Model, and MITRE ATT&CK’s tactics for protecting mobile devices.
Posted: 13 Jul 2021 | Published: 13 Jul 2021

TOPICS:  Cybersecurity
Zimperium

Market Guide For Mobile Threat Defense
sponsored by Zimperium
ANALYST REPORT: In this Gartner e-guide, dive deeper into the trends and challenges of the mobile threat defense (MTD) market and discover the key functions of an effective MTD product as well as Gartner’s strategic recommendations for mobile security. Read on to unlock this exclusive e-guide.
Posted: 13 Jul 2021 | Published: 29 Mar 2021

TOPICS:  Cybersecurity
Zimperium

The State Of Brand Protection 2021 A New Front Opens Up In The War For Brand Safety
sponsored by Mimecast
RESEARCH CONTENT: Brand impersonation saw a massive spike in 2020, both in terms of attacks as well as domains suspected to be fraudulent. Read this research report to learn more about the state of brand impersonation in 2021, including how this threat has evolved and what organizations should be doing to protect their brand.
Posted: 13 Jul 2021 | Published: 13 Jul 2021

TOPICS:  Cybersecurity
Mimecast

Company-Issued Computers: What Are Employees Really Doing With Them?
sponsored by Mimecast
EBOOK: Today’s organizations are issuing laptops, mobile phones and other company-issued devices to their staff in order to accommodate remote work – but are these devices being used for personal use? If so, what are they using it for and, most importantly, what are the associated risks? Read this research report to dive deeper into this recent trend.
Posted: 13 Jul 2021 | Published: 13 Jul 2021

TOPICS:  Cybersecurity
Mimecast

Real-World Machine Identity Management in Action
sponsored by Keyfactor
WEBCAST: The core tenets of identity management for machines (IoT and mobile devices, apps, cloud environments, etc.) aren’t too dissimilar from identity management for people, but there are subtleties to keep an eye out for. Watch this webinar to learn more about machine identity management.
Posted: 13 Jul 2021 | Premiered: Jul 13, 2021

TOPICS:  Cybersecurity
Keyfactor

Mimecast Securing The Enterprise In The Covid World The State Of Email Security
sponsored by Mimecast
EBOOK: Back at the start of the pandemic, organizations rushed to enable their employees to work remotely – and cybercriminals quickly followed with new threats targeting email inboxes. Read this e-book to learn about how the email threat landscape is changing in a post-COVID world and how your organization can protect its digital workforce.
Posted: 12 Jul 2021 | Published: 12 Jul 2021

TOPICS:  Cybersecurity
Mimecast

Tip & Soar: Creating Increased Capability For Less Mature Teams
sponsored by ThreatConnect
BLOG: Threat intelligence platforms (TIPs) with security orchestration, automation and response (SOAR) capabilities are the dynamic duo of today’s cybersecurity programs. Read this article to learn more about the core functions and potential benefits of TIP and SOAR.
Posted: 12 Jul 2021 | Published: 02 Jul 2021

TOPICS:  Cybersecurity
ThreatConnect

Introducing Playbooks 2.0 And Browser Extension: Creating A Foundation Of Collaboration With Threatconnect 6.2
sponsored by ThreatConnect
BLOG: In cybersecurity terms, collaboration can enable disparate teams to share tools, data and capabilities in order to better detect and mitigate potential threats. Read this article to learn about how ThreatConnect’s Browser Extension can help your organization create a foundation of security collaboration.
Posted: 12 Jul 2021 | Published: 02 Jul 2021

TOPICS:  Cybersecurity
ThreatConnect

Kaspersky Cybersecurity Services
sponsored by Kaspersky Lab
EGUIDE: As cyberthreats grow and evolve, so too should the security programs and tools organizations implement in order to combat them. Read this e-guide to explore how the various cybersecurity tools and services offered by Kaspersky may be able to help your organization in its never-ending fight against cyberattacks.
Posted: 09 Jul 2021 | Published: 09 Jul 2021

TOPICS:  Cybersecurity

CW APAC – July 2021: Trend Watch: Supply Chain Security
sponsored by ComputerWeekly.com
EZINE: In this handbook, Computer Weekly looks at rise of supply chain attacks, the challenges that come with zero-trust security and attacks on the Covid-19 vaccine supply chain
Posted: 09 Jul 2021 | Published: 09 Jul 2021

ComputerWeekly.com

Strengthen Your Security Posture with Managed Detection and Response Blog
sponsored by Dell Technologies
BLOG: Check out this blog post to learn about Dell Technologies Managed Detected and Response – a fully managed, end-to-end, 24/7 monitoring service that detects, investigates, and responds to threats across the entire IT environment, and much more.
Posted: 09 Jul 2021 | Published: 26 Apr 2021

TOPICS:  Cybersecurity
Dell Technologies

Computer Weekly – 20 July 2021: Ripe for change – mixing digital innovation with traditional winemaking
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how global winemaker Concha y Toro uses the latest tech to enhance 150-year old traditional processes. Pharma giant GSK explains how an API strategy is changing its business model. And we talk to retailers using video technology to bridge the gap between in-store and online selling. Read the issue now.
Posted: 19 Jul 2021 | Published: 20 Jul 2021

ComputerWeekly.com

Computer Weekly - 13 July 2021: Driving intelligence - behind the scenes of Volkswagen's in-car software
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we go behind the scenes of Volkswagen's in-car software R&D centre. The UK's largest supercomputer has gone live in Cambridge – we find out how it will transform healthcare research. And we talk to DWP's digital chief about the restructuring of its IT capabilities. Read the issue now.
Posted: 12 Jul 2021 | Published: 13 Jul 2021

ComputerWeekly.com
1 - 25 of 1423 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences