IT Management  >   Systems Operations  >   Security  >  

Cybersecurity

RSS Feed   
ALSO CALLED: Cyber Security, Cyber Security Enhancement Act of 2002
DEFINITION: Information assurance, including information security, information technology disaster recovery, and information privacy. See Section 225, Cyber Security Enhancement Act of 2002, of the Homeland Security Act.
Cybersecurity Reports
1 - 25 of 1272 Matches Previous Page  |  Next Page
CW APAC, October 2021: Tech Career Guide
sponsored by ComputerWeekly.com
EZINE: In this handbook, Computer Weekly looks what is being done to close cyber security’s gender gap in the Asia-Pacific region
Posted: 14 Oct 2021 | Published: 14 Oct 2021

ComputerWeekly.com

Bitdefender Managed Detection and Response
sponsored by Bitdefender
WEBCAST: Managed detection and response (MDR) is one of the fastest growing areas in cybersecurity – and for good reason. Watch this short video for an exclusive overview of the key features and potential benefits of Bitdefender’s MDR offering.
Posted: 11 Oct 2021 | Premiered: Oct 11, 2021

TOPICS:  Cybersecurity
Bitdefender

Bitdefender Customer Solution Center
sponsored by Bitdefender
WEBCAST: This short video provides an exclusive look into Bitdefender’s Customer Solution Center, a resource designed to educate users on their specific security vulnerabilities and needs by providing them with a hands-on learning experience. Watch this video to learn more about the Customer Solution Center.
Posted: 11 Oct 2021 | Premiered: Oct 11, 2021

TOPICS:  Cybersecurity
Bitdefender

Fraud management: A perennial business issue
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide we will explore the current cyber fraud landscape and look at some organisations in the region that are using technology to overcome the challenges posed by fraudsters.
Posted: 08 Oct 2021 | Published: 08 Oct 2021

ComputerWeekly.com

Infographic: Ransomware Weather Report 2021
sponsored by ComputerWeekly.com
EGUIDE: In this infographic: We take a look at the worldwide Ransomware landscape in 2020 and 2021. We will be diving into which areas of the globe have been affected the most, which times of year attacks are most likely to happen and which hackers and groups have been causing most of the trouble.
Posted: 05 Oct 2021 | Published: 05 Oct 2021

ComputerWeekly.com

Infographic: Most valuable cybersecurity certifications
sponsored by ComputerWeekly.com
INFOGRAPHIC: A consensus of industry professionals rank these security certifications as the most coveted by employers and security pros.
Posted: 04 Oct 2021 | Published: 04 Oct 2021

TOPICS:  Cybersecurity
ComputerWeekly.com

Essential Guide: APAC women in cyber security
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: In Asia-Pacific, men continue to outnumber women in the growing field of cyber security - even as more women are entering the industry. The lack of awareness of the profession among students and unconscious biases in hiring processes are just some of the challenges that we must overcome before we can see more women in the profession.
Posted: 04 Oct 2021 | Published: 04 Oct 2021

ComputerWeekly.com

Password Security Guidelines
sponsored by TechTarget
RESOURCE: In this expert guide to Password Security Guidelines, learn how you can keep your enterprise safe by improving your password policies today. We ask you to participate in our Security Market Research Program to receive a free download of the guide.
Posted: 04 Oct 2021 | Published: 12 Jun 2019

TechTarget

Zoom and Re-Imagining the Future of Work in Financial Services
sponsored by Smarsh
WEBCAST: Access this webinar to learn about how the financial services is changing as we emerge from the pandemic, what Zoom’s role will be in enabling remote/hybrid work, and more.
Posted: 29 Sep 2021 | Premiered: Mar 23, 2021

TOPICS:  Cybersecurity
Smarsh

United HealthCare
sponsored by PKWare
CASE STUDY: Across healthcare facilities, protecting safeguarding Protected Health Information (PHI) is a massive yet crucial responsibility – but how can you protect data if you don’t know where it resides? Read this case study to discover how United HealthCare boosted their data discover and protection capabilities thanks to a partnership with PKWare.
Posted: 29 Sep 2021 | Published: 29 Sep 2021

TOPICS:  Cybersecurity
PKWare

Effective Ransomware Response Requires Coordination Between I&O And Security
sponsored by Malwarebytes
ANALYST REPORT: This Forrester Reprint provides exclusive content designed to help you defend your company against today’s vicious ransomware attacks, highlighting the importance of data backup, how to coordinate a ransomware response plan and more. Read on to download this exclusive report.
Posted: 29 Sep 2021 | Published: 29 Sep 2021

TOPICS:  Cybersecurity
Malwarebytes

Threat Intelligence Executive Report
sponsored by Dell SecureWorks
RESEARCH CONTENT: To help organizations better understand and prepare for today’s cyberthreats, the Secureworks Counter Threat Unit (CTU) research team regularly publishes their findings. In this Threat Intelligence Executive Report, unlock exclusive research into notable threat behaviors, emerging cyberattacks, trends and more.
Posted: 27 Sep 2021 | Published: 27 Sep 2021

TOPICS:  Cybersecurity
Dell SecureWorks

The State of Hybrid Workforce Security 2021
sponsored by Palo Alto Networks
RESOURCE: A new report, developed from a survey of more than 3,000 enterprises conducted by research firm ONR on behalf of Palo Alto Networks, takes a closer look at how real organizations define the balance between productivity and security risks for their remote and hybrid environments.
Posted: 27 Sep 2021 | Published: 24 Sep 2021

TOPICS:  Cybersecurity
Palo Alto Networks

3 Steps to Secure Your Remote Workforce
sponsored by Palo Alto Networks
ANALYST REPORT: In Gartner's words, "Designing security for a remote-first workforce requires revisiting where and how security and risk management leaders, including CISOs, direct efforts." In a new report, Gartner shares three steps that need strong execution to build a security posture for distributed work at scale.
Posted: 27 Sep 2021 | Published: 24 Sep 2021

TOPICS:  Cybersecurity
Palo Alto Networks

A Guide to Selling Cybersecurity
sponsored by Huntress
WHITE PAPER: As today’s cyberthreats become more sophisticated, cybersecurity solutions designed to thwart them grow increasingly complex. Download this e-guide to unlock a comprehensive overview of some emerging themes in the world of cybersecurity.
Posted: 23 Sep 2021 | Published: 23 Sep 2021

TOPICS:  Cybersecurity
Huntress

Product applicability guide (PAG): Coalfire opinions to confirm and communicate how your product may be successfully used in a compliance program
sponsored by Coalfire
DATA SHEET: Not many cybersecurity products are subject to regulatory compliance. Access Coalfire’s product applicability guide (PAG) white papers to discover how to assess the security readiness of your IT hardware, software, and Software-as-a-Service (SaaS) offerings with our trusted “eyes of the assessor” viewpoints.
Posted: 17 Sep 2021 | Published: 17 Sep 2021

TOPICS:  Cybersecurity
Coalfire

Reduce the Risk of Ransomware Incidents With Fortinet
sponsored by Fortinet, Inc.
PRODUCT OVERVIEW: Ransomware has grown significantly over the past 2 years – in fact, attacks jumped 7x from the start of the half to the end of 2020. This solution brief provides an inside look at how Fortinet is helping organizations combat these threats – read on to get started.
Posted: 14 Sep 2021 | Published: 14 Sep 2021

TOPICS:  Cybersecurity
Fortinet, Inc.

Top 10 cyber crime stories of 2019
sponsored by ComputerWeekly.com
EGUIDE: Once again, in 2019 the cyber threat landscape proved the old biblical adage correct – there is nothing new under the sun. Data breaches were 10 a penny – indeed, in some cases they can actually be bought for pennies. Here are Computer Weekly's top 10 cyber crime stories of 2019.
Posted: 10 Sep 2021 | Published: 27 Dec 2019

ComputerWeekly.com

A Computer Weekly buyer's guide to SIEM and SOAR
sponsored by ComputerWeekly.com
EGUIDE: The question of how to use data has big implications on a company's performance. In this 16-page buyer's guide, Computer Weekly looks at how SIEM and SOAR tools assist IT teams, why security tools require strong internal security processes to work effectively and what role they have in a rapidly changing cyber threat landscape.
Posted: 09 Sep 2021 | Published: 09 Sep 2021

ComputerWeekly.com

Detect and Defeat Modern Cyber Attacks - Episode 1
sponsored by F5 Networks
WEBCAST: Today’s cyberthreats can have devastating impacts on your organization’s reputation, legal standing and bottom line. Watch episode 1 of the Detect and Defeat Modern Cyber Attacks series for a closer look at today’s threat landscape and how you can adapt.
Posted: 08 Sep 2021 | Premiered: Sep 8, 2021

TOPICS:  Cybersecurity
F5 Networks

CW Europe - September-November 2021: Dutch researchers build security software to mimic human immune system
sponsored by ComputerWeekly.com
EZINE: In this issue of CW Europe, find out how researchers in the Netherlands are attempting to help IT systems fight certain cyber attacks in a similar way to the human immune system works. Also find out about the so-called "Klarna academy" in Stockholm, which has created the next set of Nordic fintech entrepreneurs.
Posted: 31 Aug 2021 | Published: 09 Sep 2021

ComputerWeekly.com

Security Think Tank: Biden's Cyber Security Plan
sponsored by ComputerWeekly.com
EGUIDE: As Biden sets out his agenda for the next four years, the Computer Weekly Security Think Tank considers the opportunities for renewed international collaboration on cyber security, what aspects of cyber policy Biden would be best advised to focus on, and asks how the industry can better make its voice heard.
Posted: 27 Aug 2021 | Published: 27 Aug 2021

ComputerWeekly.com

Managing Cyber Risk As A Business Issue
sponsored by Dell Technologies and Intel
EBRIEF: Ransomware and cyberattacks —insider, outsider and even nation-sponsored—threaten your organization’s ability to operate. You could lose millions of dollars in a single attack – so, how will you guard against the threat? Read this brief to learn about managing cyber risk as a business issue.
Posted: 25 Aug 2021 | Published: 25 Aug 2021

TOPICS:  Cybersecurity
Dell Technologies and Intel

2021 Trends Report
sponsored by RSA Conference
RESEARCH CONTENT: Each year, cybersecurity experts from around the globe submit applications to speak at RSA Conference. Access this exclusive report to explore the trends and unlock reflections from the 2021 RSA Conference.
Posted: 19 Aug 2021 | Published: 19 Aug 2021

TOPICS:  Cybersecurity
RSA Conference

KPMG and SailPoint: Cyber strategy balancing data protection with accessibility for business growth
sponsored by KPMG LLP SailPoint
VIDEO: Technology is causing more disruption than ever before, and opening organizations up to new risks. For today’s security teams, managing digital identities is at the center of reducing risk. Watch this short video to learn how to balance data protection with accessibility and discover how KPMG and SailPoint can help.
Posted: 17 Aug 2021 | Premiered: 29 Jul 2021

TOPICS:  Cybersecurity
KPMG LLP SailPoint
1 - 25 of 1272 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences