IT Management  >   Systems Operations  >   Security  >  

Cybersecurity

RSS Feed   
ALSO CALLED: Cyber Security, Cyber Security Enhancement Act of 2002
DEFINITION: Information assurance, including information security, information technology disaster recovery, and information privacy. See Section 225, Cyber Security Enhancement Act of 2002, of the Homeland Security Act.
Cybersecurity Reports
1 - 25 of 993 Matches Previous Page  |  Next Page
Types of Cybersecurity Controls and How to Place Them
sponsored by AT&T
EBOOK: PH
Posted: 25 Jan 2022 | Published: 25 Jan 2022

TOPICS:  Cybersecurity
AT&T

Infographic: Top IT predictions in APAC in 2022
sponsored by ComputerWeekly.com
INFOGRAPHIC: As one of the first in the world to emerge from the throes of the pandemic, Asia-Pacific (APAC) organisations are expected to invest more in cyber security, cloud computing and automation in 2022 to secure their digital future. In this infographic, we review some of the key IT trends that are likely to shape the industry in the next months.
Posted: 19 Jan 2022 | Published: 19 Jan 2022

ComputerWeekly.com

Computer Weekly - 18 January 2022: The race to quantum computing
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, researchers are racing to create the first commercially useful quantum computer – we look at one of the European candidates. Cyber security is one of the greatest risks facing the global economy, warns the World Economic Forum. And we examine the role of employee experience in hybrid working. Read the issue now.
Posted: 18 Jan 2022 | Published: 18 Jan 2022

ComputerWeekly.com

MITRE ATT&CK, a guide for businesses in 2022
sponsored by ComputerWeekly.com
EBOOK: Mitre ATT&CK is a framework, but it can also serve as a foundation to address cybersecurity as a whole moving forward. Download this e-guide and learn more about the Mitre ATT&CK framework, and which trends are shaping the way this tool can be applied to cyber security around the globe.
Posted: 11 Jan 2022 | Published: 06 Jan 2022

ComputerWeekly.com

Infographic: 5 cybersecurity predictions for 2022
sponsored by ComputerWeekly.com
INFOGRAPHIC: Cybercrime showed no sign of slowing down in 2021 and enterprises continue to fall victim to cyberattacks, with gangs targeting larger organizations with increasingly large demands. In good news, we can always take stock of the recent past and know what to prepare for. In this infographic, we point out five forecasts for cybersecurity in 2022.
Posted: 06 Jan 2022 | Published: 06 Jan 2022

ComputerWeekly.com

Computer Weekly - 21 December 2021: What is Log4Shell - and why the panic?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we assess the risks from Log4Shell, a new web software vulnerability described as "catastrophic". We look at SASE – secure access service edge – which is set to be one of the networking priorities for 2022. And some victims of the Post Office IT scandal are still waiting for proper compensation. Read the issue now.
Posted: 20 Dec 2021 | Published: 21 Dec 2021

ComputerWeekly.com

Everything You Need to Know About the Log4j Vulnerability
sponsored by TechTarget
EGUIDE: Here, dig into the origins of the Log4J vulnerability, the severity, and what needs to change to ensure enterprise systems aren't at risk in the future.
Posted: 17 Dec 2021 | Published: 17 Dec 2021

TechTarget

Computer Weekly - 14 December 2021: The rules for a safer internet
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, as the government publishes the Online Safety Bill, we look at what the laws mean for internet services. A ransomware victim shares the insider story of the trauma of losing their corporate IT systems. And we ask, what happens when quantum computers get too powerful to verify their output? Read the issue now.
Posted: 12 Dec 2021 | Published: 14 Dec 2021

ComputerWeekly.com

A Computer Weekly buyer's guide to post-Covid-19 supply chain management
sponsored by ComputerWeekly.com
EGUIDE: The supply chain has been under great pressure during the Covid-19 pandemic, not helped by several high-profile cyber attacks. In this 15-page buyer's guide, Computer Weekly looks at the key considerations for business leaders going forward, the importance of data transparency and how cyber attacks on the supply chain have increased.
Posted: 03 Dec 2021 | Published: 03 Dec 2021

ComputerWeekly.com

Computer Weekly - 23 November 2021: Can the tech community show how to save the world?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we report from the COP26 conference on how the tech world's collaborative open source model could help tackle climate change. Gartner has urged IT leaders to rethink their role as business come to rely on digital technologies. And we ask if your office security is at risk as staff return. Read the issue now.
Posted: 22 Nov 2021 | Published: 23 Nov 2021

ComputerWeekly.com

MSPs: REQUIREMENTS FOR PROVIDING YOUR CLIENTS WITH LEADING RANSOMWARE PROTECTION
sponsored by Malwarebytes
WHITE PAPER: Ransomware is a major threat to any MSP’s clients—including yours—as 68.5% of organizations worldwide are impacted by it, according to Statistica. Access this short white paper to learn what sort of endpoint protection MSPs should look for and see how Malwarebytes meets your ransomware needs.
Posted: 17 Nov 2021 | Published: 17 Nov 2021

TOPICS:  Cybersecurity
Malwarebytes

FINANCIAL SERVICES AND CYBER SECURITY
sponsored by Check Point
EBOOK: This e-book explores common cybersecurity issues and challenges facing the financial services industry and highlights how Check Point’s offerings can help address these challenges. Read on to get started.
Posted: 17 Nov 2021 | Published: 17 Nov 2021

TOPICS:  Cybersecurity
Check Point

ESSENTIAL EIGHT STRATEGIES TO MITIGATE CYBER SECURITY INCIDENTS
sponsored by Check Point
WHITE PAPER: The Essential 8 mitigation strategies are a recommendation by the ACSC as a baseline practice towards cyber maturity. This document was created to help organisations understand how to address security across your entire digital footprint and help you understand your current cyber maturity levels against the Essential 8.
Posted: 17 Nov 2021 | Published: 17 Nov 2021

TOPICS:  Cybersecurity
Check Point

Infographic: 4 types of ransomware
sponsored by ComputerWeekly.com
INFOGRAPHIC: Ransomware is one of the most effective strategies for attacking critical infrastructures. This type of malware infects computers and prohibits or severely restricts users from accessing entire systems until ransom demands have been met. In this infographic, we take a look at the four types of ransomware and their effect on the security landscape.
Posted: 16 Nov 2021 | Published: 16 Nov 2021

ComputerWeekly.com

Computer Weekly - 16 November 2021: How cosmetics retailer Lush authenticates with ease
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how Lush has modernised authentication, governed by a desire to care for customer data. We talk to Nasa's CDO about data as a strategic asset. And we foreground a call for the government and the Post Office to compensate Horizon victims without delay. Read the issue now.
Posted: 12 Nov 2021 | Published: 16 Nov 2021

ComputerWeekly.com

Ransomware Weather Report - July 2021
sponsored by ComputerWeekly.com
EGUIDE: In this infographic: We take a look at the worldwide Ransomware landscape from the past 12 months. We will be diving into which areas of the globe have been affected the most, which times of year attacks are most likely to happen and which hackers and groups have been causing most of the trouble.
Posted: 12 Nov 2021 | Published: 12 Nov 2021

ComputerWeekly.com

Computer Weekly - 9 November 2021: How a cloud-first strategy helped save animals in the pandemic
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to the RSPCA about how its cloud-first strategy helped to save animals throughout the pandemic. Data warehouses have been part of the IT landscape for 30 years – but are they now old technology, and what's next? And we assess how Brexit has affected risk and resilience in the datacentre. Read the issue now.
Posted: 08 Nov 2021 | Published: 09 Nov 2021

ComputerWeekly.com

Infographic: Ransomware timeline
sponsored by ComputerWeekly.com
INFOGRAPHIC: Ransomware isn't anything new, but it remains a major challenge for individuals, companies, governments and organizations. In this infographic, we take a look at some of the most notable examples of ransomware from the past 30-plus years here.
Posted: 03 Nov 2021 | Published: 03 Nov 2021

ComputerWeekly.com

Cyber-Security Checklist
sponsored by Vodafone
WHITE PAPER: Today’s workforce handling sensitive data remotely is essential to keep your business operational and profitable. But, according to a recent report, 10,000 cyberattacks are made against small businesses in the UK every day. Download this e-guide to unlock a checklist of the 13 cybersecurity best practices.
Posted: 26 Oct 2021 | Published: 26 Oct 2021

TOPICS:  Cybersecurity
Vodafone

Enterprise Data Loss Prevention, Revisited
sponsored by Palo Alto Networks
ANALYST REPORT: To protect data assets both in motion and at rest, a modern approach to data loss prevention (DLP), designed for today’s digital enterprise, is paramount. Read this exclusive ESG white paper to learn more about rethinking DLP for the modern workflow.
Posted: 22 Oct 2021 | Published: 22 Oct 2021

TOPICS:  Cybersecurity
Palo Alto Networks

Overcoming Enterprise Data Protection Challenges
sponsored by Palo Alto Networks
EBOOK: Data usage and dependence has evolved rapidly in recent years – which has led to a rise in the necessity for effective data loss prevention (DLP), especially as organization migrate their data to the cloud. Access this exclusive e-book for a closer look at modern data protection challenges and requirements and an intro to cloud-based DLP.
Posted: 22 Oct 2021 | Published: 22 Oct 2021

TOPICS:  Cybersecurity
Palo Alto Networks

Computer Weekly - 26 October 2021: Managing cyber risk by integrating supply chains
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, our new Buyer's Guide examines the security and IT integration challenges of modern supply chains – we also talk to the CEO of SolarWinds about how the company overcame its huge supply chain attack. And we look at how a small town in Lancashire was chosen to host the UK's National Cyber Force. Read the issue now.
Posted: 22 Oct 2021 | Published: 26 Oct 2021

ComputerWeekly.com

Email Security in Finance
sponsored by Mimecast
EBOOK: Since this perfect storm of digital communications and transactions, new data privacy regulations, and COVID-19 shows no signs of slowing down, organizations need to be prepared if things were to hit the fan. Explore this e-book to learn 5 ways to secure a safer future for financial services firms.
Posted: 21 Oct 2021 | Published: 21 Oct 2021

TOPICS:  Cybersecurity
Mimecast

Hype Cycle for Security Operations, 2021
sponsored by Cycognito
ANALYST REPORT: Security operations technologies and services defend IT systems from attack by identifying threats and exposure to vulnerability — enabling effective response and remediation. This Gartner Hype Cycle for Security Operations report highlights some of the most exciting and important technology trends of 2021.
Posted: 20 Oct 2021 | Published: 23 Jul 2021

TOPICS:  Cybersecurity
Cycognito

Prevent Cyber Security Breaches: The CyCognito Platform and MITRE ATT&CK
sponsored by Cycognito
INFOGRAPHIC: This interactive graphical map of the MITRE ATT&CK Matrix shows where the capabilities of the CyCognito platform simulate or otherwise address ATT&CK tactics, techniques, and sub-techniques. Read on for a closer look at the map.
Posted: 20 Oct 2021 | Published: 20 Oct 2021

TOPICS:  Cybersecurity
Cycognito
1 - 25 of 993 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2022, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences