IT Management  >   Systems Operations  >   Security  >  

Cybersecurity

RSS Feed   
ALSO CALLED: Cyber Security, Cyber Security Enhancement Act of 2002
DEFINITION: Information assurance, including information security, information technology disaster recovery, and information privacy. See Section 225, Cyber Security Enhancement Act of 2002, of the Homeland Security Act.
Cybersecurity Reports
1 - 25 of 1197 Matches Previous Page  |  Next Page
Top 10 Ransomware from 2017
sponsored by Versa Networks
RESEARCH CONTENT: Discover the top 10 ransomware attacks of 2017 in Versa Network's Threat Research Lab report, where they analyze the samples that negatively impacted businesses worldwide.
Posted: 20 Sep 2018 | Published: 20 Sep 2018

Versa Networks

Closing the IT Security Gap with Automation & AI in the Era of IoT: Global
sponsored by Hewlett Packard Enterprise
RESEARCH CONTENT: In this report, discover the research the Ponemon Institure conducted to further understand the reasons for the gap in modern IT security programs and strategies.
Posted: 20 Sep 2018 | Published: 20 Sep 2018

Hewlett Packard Enterprise

Balancing Security and Digital Transformation
sponsored by British Telecommunications PLC
EBRIEF: This e-brief examines security across three domains—cloud, compliance, and cyber threats—and makes recommendations that can help CISOs and their companies make security integral to the business. Read on to learn more.
Posted: 18 Sep 2018 | Published: 18 Sep 2018

British Telecommunications PLC

Helping Noble Group to Secure its Global Network
sponsored by British Telecommunications PLC
CASE STUDY: The Noble Group, a Hong Kong-based global banking company needed to maintain their highest standards of network security. Since their whole business revolved around real-time, online global trading, it was crucial to have a secure and dependable network. Read on to learn about the security services they implemented.
Posted: 17 Sep 2018 | Published: 17 Sep 2018

British Telecommunications PLC

Cybersecurity for the Modern Era: 3 Steps to Stopping Malware, Credentials Phishing, Email Fraud and More
sponsored by Proofpoint, Inc.
EBOOK: Discover 3 tips for choosing tools and solutions that will improve behaviors, outcomes, and next steps for combatting people-centered attacks with people-centered platforms.
Posted: 17 Sep 2018 | Published: 17 Sep 2018

Proofpoint, Inc.

Protecting People: A Quarterly Analysis of Highly Targeted Attacks
sponsored by Proofpoint, Inc.
RESOURCE: Uncover the shocking survey results from this summer 2018 report where you can find for some key insights into whose being attacked, how they're being targeted, and what you can do about it.
Posted: 17 Sep 2018 | Published: 17 Sep 2018

Proofpoint, Inc.

Cybercrime's Most Wanted: Guide to Protection
sponsored by Juniper Networks
RESOURCE CENTER: Find a lineup of today's most wanted cybercriminals, as well as an action plan to help you protect yourself, your data, your reputation, and your enterprise. Read on to find out the details.
Posted: 17 Sep 2018 | Published: 17 Sep 2018

Juniper Networks

Building Nation-Level Defenses to Fight Cybercrime
sponsored by British Telecommunications PLC
RESOURCE: Download this resource learn about a defensive strategy to protect your organization's assets and fight cybercrime, today.
Posted: 14 Sep 2018 | Published: 14 Sep 2018

British Telecommunications PLC

How We Stay Ahead of a Changing Threat Landscape
sponsored by British Telecommunications PLC
RESOURCE: The security threat landscape is confusing and changing rapidly – there's so much out there, how do you understand where the true risks are? In this article, learn about how British Telecommunications is responding to the changing threat landscape and how you can apply this to your organization.
Posted: 14 Sep 2018 | Published: 14 Sep 2018

British Telecommunications PLC

The Federal Cyber AI IQ Test
sponsored by IBM
RESEARCH CONTENT: With the abilities to track human behavior and detect threats with greater speed and efficiency, AI has the potential to change the course of cybersecurity for government agencies and keep them a step ahead at all times. Download The Federal Cyber AI IQ Test to learn more.
Posted: 14 Sep 2018 | Published: 14 Nov 2017

IBM

AI: The Good, The Bad and The Ugly
sponsored by Empow Cyber Security
RESOURCE: AI technology is constantly evolving and progressing in "human" areas like strategic thinking, judgment and inference. So what are the security implications if AI technology falls into the wrong hands? Read on to find out the 6 principles for preventing AI abuse and why AI cybersecurity is necessary in your organization.
Posted: 14 Sep 2018 | Published: 21 May 2017

Empow Cyber Security

Supplement Your Security Teams with a Managed SOC
sponsored by Oracle Dyn
RESOURCE CENTER: More IT and security leaders are leveraging a managed security operations center (SOC) as a critical line of defense in protecting their organization's assets, data, operations, and reputation. Download this custom article to explore the top 5 reasons to consider a managed SOC and what to look for in a provider.
Posted: 13 Sep 2018 | Published: 13 Sep 2018

Oracle Dyn

Reporting to the Board - A Toolkit for CISOs
sponsored by Dell SecureWorks
RESOURCE: Boards oversee risk, not operations. Rather than tell them how your cybersecurity program works, show them how and how well risks are being managed. Download this CISO toolkit for tips and techniques to approach your board of directors about cybersecurity.
Posted: 13 Sep 2018 | Published: 13 Sep 2018

Dell SecureWorks

Fighting Cybercrime: Discover the Top 5 Attack Vectors to Watch For
sponsored by Arctic Wolf
WEBCAST: Watch this upcoming webinar to learn the essential components needed to defend your business against the top 5 attack vectors we see in a Cyber Security Operations Center (SOC).
Posted: 12 Sep 2018 | Premiered: Sep 12, 2018

Arctic Wolf

Donnelley Financial Solutions Case Study
sponsored by Empow Cyber Security
CASE STUDY: Discover how Donnelley Financial Solutions, a global financial risk and compliance provider, was able to meet its security and compliance objectives after adopting a new SIEM strategy.
Posted: 12 Sep 2018 | Published: 12 Sep 2018

Empow Cyber Security

IT Security Roadmap 2019; How to survive emerging threats and thrive in complexity
sponsored by SearchSecurity.com
VIRTUAL TRADESHOW: In this virtual conference, produced jointly by ISACA, SearchSecurity.com, and SearchCompliance.com, our experts will examine the shifts in enterprise IT, the future of endpoint security, and how to mitigate IT complexity new technology trends bring. We'll bring together expert insights for achieving a secure and compliant infrastructure.
Posted: 12 Sep 2018 | Premiered: Sep 7, 2018

SearchSecurity.com

3 Components of an Effective Anti-Phishing Strategy
sponsored by Rapid7
RESOURCE: According to the 2018 Verizon Data Breach Investigations Report, phishing attacks are the number one threat to businesses today as email and social engineering are the most common methods of attack. Read on to learn how a comprehensive anti-phishing program can be built with just 3 foundational elements.
Posted: 11 Sep 2018 | Published: 11 Sep 2018

Rapid7

Quarterly Threat Report
sponsored by Rapid7
RESEARCH CONTENT: In this 2018 Q2 review, get a clear picture of the threat landscape within your unique industry, how these threats have changed, and what to expect for the rest of the year.
Posted: 11 Sep 2018 | Published: 21 Aug 2018

Rapid7

It's Time to Make Security Integral to Your Business
sponsored by British Telecommunications PLC
RESOURCE: No system or network is 100% secure. Attacks can happen to anyone, or any business, at any time. Find out how you can make security central to your business, and protect it against the likely threats that it will encounter.
Posted: 11 Sep 2018 | Published: 11 Sep 2018

British Telecommunications PLC

The SIEM that Gives SIEM a Good Name
sponsored by Empow Cyber Security
RESOURCE: Organizations are purchasing more and more security systems due to the increased volume of advanced cyberattacks. While SIEM systems are supposed to help this problem, some aren't meeting expectations. Read on to learn about a new SIEM platform that is used, and loved, by MIT Media Labs and other innovative companies.
Posted: 11 Sep 2018 | Published: 11 Sep 2018

Empow Cyber Security

Intelligent Orchestration
sponsored by IBM Resilient
WHITE PAPER: Learn how your organization can battle complex cyberattacks with this intelligent approach to incident response and security operations.
Posted: 10 Sep 2018 | Published: 10 Sep 2018

IBM Resilient

Cyber Resilience for Email: Technical Deep Dive
sponsored by Mimecast
WHITE PAPER: Email is the number one application that organizations depend on for communications. Unfortunately, it is also the number-one attack vector used by cybercriminals. Learn how your organization can stay protected against advanced email-borne threats, today.
Posted: 05 Sep 2018 | Published: 05 Sep 2018

Mimecast

2018 Cyberthreat Defense Report
sponsored by Gigamon
RESOURCE: Did you know that 77.2% of businesses were victim to at least 1 cyberattack in 2017, and 62.3% expect to be targets by the end 2018? Download this Cyberthreat Defense Report resource and uncover more key results.
Posted: 04 Sep 2018 | Published: 04 Sep 2018

Gigamon

Cyber Resilience for Email: Solution Brief
sponsored by Mimecast
EBRIEF: Learn how your organization can stay protected against advanced email-borne threats through Mimecast's threat protection, adaptability recoverability and durability solution.
Posted: 04 Sep 2018 | Published: 04 Sep 2018

Mimecast

Security Change is Inevitable in the Cloud Era
sponsored by Cisco Umbrella
WEBCAST: Hear from Eric Ahlm, research director at Gartner and Meg Diaz, head of product marketing for Cisco Umbrella as they discuss how modern conveniences in the way we access data can lead to security risks as organizations move their sensitive data to the cloud.
Posted: 31 Aug 2018 | Premiered: Aug 31, 2018

Cisco Umbrella
1 - 25 of 1197 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement