IT Management  >   Systems Operations  >   Security  >  

Cybersecurity

RSS Feed   
ALSO CALLED: Cyber Security, Cyber Security Enhancement Act of 2002
DEFINITION: Information assurance, including information security, information technology disaster recovery, and information privacy. See Section 225, Cyber Security Enhancement Act of 2002, of the Homeland Security Act.
Cybersecurity Reports
1 - 25 of 1034 Matches Previous Page  |  Next Page
Definitive Guide to SOC-as-a-Service
sponsored by Arctic Wolf
WHITE PAPER: Explore this e-book for insights on cyberattacks and threats, security operation centers as-a-service, and much more.
Posted: 20 Jul 2018 | Published: 20 Jul 2018

Arctic Wolf

How to Build a Micro-Segmentation Strategy
sponsored by Illumio
WHITE PAPER: Learn how micro-segmentation reduces your attack surface, frustrates intruders, can be used as a compensating control against vulnerabilities, and hardens your data center.
Posted: 20 Jul 2018 | Published: 20 Jul 2018

Illumio

Cybersecurity: A Veracode Case Study
sponsored by BitSight
CASE STUDY: Find out why CIO of Veracode, Bill Brown, presents the cybersecurity data from BitSight to his Board of Directors and how your risk management team can benefit from continuous security monitoring too.
Posted: 18 Jul 2018 | Published: 18 Jul 2018

BitSight

How Continuous Monitoring is Revolutionizing Risk Management
sponsored by BitSight
WHITE PAPER: Organizations with continuous monitoring tools put themselves in a position to make more informed decisions that help their businesses succeed. Learn more about how you can help your enterprise continuously monitor vendor, reputational, and strategic risks.
Posted: 18 Jul 2018 | Published: 18 Jul 2018

BitSight

Threat Hunting eBook
sponsored by Digital Guardian
RESOURCE: Cyberthreat hunting is the new threat management. Access this e-book for a step-by-step guide on how to stay on top of the ever evolving threat landscape.
Posted: 18 Jul 2018 | Published: 31 Dec 2016

Digital Guardian

Incident Responder's Field Guide
sponsored by Digital Guardian
RESOURCE: You've been breached. Now what? Get access to these easy-to-follow steps for creating an incident response plan in the event of a cybersecurity attack.
Posted: 18 Jul 2018 | Published: 31 Dec 2016

Digital Guardian

Protect Legacy Applications without Touching Your Apps with Okta and Palo Alto Networks
sponsored by Okta
VIDEO: Find out the latest trends in credential-based attacks and why every sensitive cloud application needs multi-factor authentication.
Posted: 17 Jul 2018 | Premiered: 31 Oct 2017

Okta

Automate Security Incident Response with Okta
sponsored by Okta
RESOURCE: Cybercrime isn't new—but increasingly, exploitable user credentials are the target. Find out how your enterprise can stay on top of security threats and achieve maximum security efficiency.
Posted: 17 Jul 2018 | Published: 17 Jul 2018

Okta

The Secret to Creating a Cyber Risk-Aware Organization
sponsored by BitSight
WHITE PAPER: Cybersecurity within an organization is no longer just the security pro's responsibility. It's everyone's. Find out why your business could benefit from a security awareness training and become a cyber risk-aware organization.
Posted: 17 Jul 2018 | Published: 17 Jul 2018

BitSight

Now Tech: Endpoint Detection And Response
sponsored by Carbon Black
RESEARCH CONTENT: Learn how you can improve your enterprise security with endpoint detection and response vendors in this 2018 Forrester Research Report.
Posted: 12 Jul 2018 | Published: 01 Feb 2018

Carbon Black

How Fortinet Security Fabric Addresses Enterprise Security Concerns
sponsored by GreenPages Inc.
RESOURCE: Find out what's happening in the threat landscape and how to address your enterprise security concerns.
Posted: 12 Jul 2018 | Published: 12 Jul 2018

GreenPages Inc.

Email Security that Matters at the Macro-Security Level
sponsored by GreenPages Inc.
WHITE PAPER: Find out how digital transformation is expanding attack surfaces and learn how to defend against the email threats that traditional security approaches have failed to keep up with.
Posted: 12 Jul 2018 | Published: 12 Jul 2018

GreenPages Inc.

Market Guide for Managed Detection and Response Services
sponsored by Arctic Wolf
RESEARCH CONTENT: Find out which managed detection and response (MDR) provider is best for your enterprise security.
Posted: 12 Jul 2018 | Published: 11 Jun 2018

Arctic Wolf

The Top 3 Cyberthreats Overheard in the C-suite
sponsored by RSA Conference
RESOURCE: Take a closer look at security challenges affecting the C-suite and what CSOs remain up against.
Posted: 12 Jul 2018 | Published: 12 Jul 2018

RSA Conference

CW ANZ – July 2018: Fix the weak links
sponsored by ComputerWeekly.com
EZINE: In this edition of CW ANZ, we look at how Australia is securing its industrial control systems and how it is bridging the security gap between IT and OT teams. Read the issue now.
Posted: 12 Jul 2018 | Published: 12 Jul 2018

ComputerWeekly.com

CW ASEAN – July 2018: Defend against disruption
sponsored by ComputerWeekly.com
EZINE: In this month's issue of CW ASEAN, we take a closer look at how industrial control systems operators are improving the visibility of ICS environments without jeopardizing operations, addressing security vulnerabilities and enhancing cooperation between IT and operational technology teams. Read the issue now.
Posted: 12 Jul 2018 | Published: 12 Jul 2018

ComputerWeekly.com

6 Ways to Prevent Ransomware in Health IT
sponsored by Cisco Umbrella
EGUIDE: With so much at risk for healthcare organizations, IT must implement proactive steps to help mitigate their risks and keep attacks at bay. In this e-guide, you'll uncover the ins and outs of 6 ransomware prevention tips healthcare organizations should include as part of their ongoing security strategy.
Posted: 12 Jul 2018 | Published: 12 Jul 2018

Cisco Umbrella

Ransomware Attacks Plaguing Health IT
sponsored by Cisco Umbrella
EGUIDE: Learn from Mike Fisher, health IT privacy lawyer about how cybersecurity concerns have shifted from data breaches to ransomware and malware exploits that shut down hospitals and threaten patient safety.
Posted: 12 Jul 2018 | Published: 12 Jul 2018

Cisco Umbrella

Ransomware Defense for Healthcare in 45 Seconds
sponsored by Cisco Umbrella
VIDEO: Hacking is big business, and healthcare is the number one targeted industry. Find out how advanced malware protection can keep patient data, research and your network safe.
Posted: 10 Jul 2018 | Premiered: 10 Jul 2018

Cisco Umbrella

How Cloud Security Keeps Patient and Employee Data Safe at Memorial Hermann Health System
sponsored by Cisco Umbrella
CASE STUDY: In this case study, learn about how Memorial Hermann Health System found a solution that integrated with their existing security stack, to better protect patients and providers against ever-evolving threats.
Posted: 10 Jul 2018 | Published: 29 Dec 2017

Cisco Umbrella

6 Myths about ATO Prevention Strategies
sponsored by SpyCloud
RESEARCH CONTENT: Stolen credentials are no joke. Uncover the truth about account takeovers and the steps your enterprise should be taking to prevent cybercriminals from accessing company sensitive data.
Posted: 10 Jul 2018 | Published: 10 Jul 2018

SpyCloud

McAfee Cloud Security for Salesforce
sponsored by McAfee, Inc.
WHITE PAPER: McAfee® Skyhigh Security Cloud for Salesforce helps organizations securely accelerate their business by providing total control over data and user activity in Salesforce. Learn more about 25 key features of the software in this data sheet.
Posted: 05 Jul 2018 | Published: 05 Jul 2018

McAfee, Inc.

The Inside Story of Data Breaches and Mainframe Security
sponsored by CA Technologies
RESEARCH CONTENT: 31% of consumers discontinued their relationship with a company that had a data breach (Reputation Risk Study 2017). Don't let your organization become a statistic. Read on.
Posted: 05 Jul 2018 | Published: 31 Dec 2017

CA Technologies

Top Priorities as New Cyber Threats Plague Healthcare
sponsored by Fortinet, Inc.
WEBCAST: Listen to security professional, Anthony K Giandomenico, give insights on how to help slow down and prevent fast moving cyberattacks and threats in the health care industry.
Posted: 05 Jul 2018 | Premiered: Jul 5, 2018

Fortinet, Inc.

Five Ways Privileged Access Management Prevents Insider Threats
sponsored by HelpSystems
WHITE PAPER: Over a quarter of attacks are perpetrated by insiders, according to The Verizon Data Breach Report (2018) and threats coming from the inside are notoriously tough to spot. Find out how you can determine a potential threat without preventing employees from accessing the data they need to do their jobs.
Posted: 05 Jul 2018 | Published: 05 Jul 2018

HelpSystems
1 - 25 of 1034 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement