IT Management  >   Systems Operations  >   Security  >  

Cybersecurity

RSS Feed   
ALSO CALLED: Cyber Security, Cyber Security Enhancement Act of 2002
DEFINITION: Information assurance, including information security, information technology disaster recovery, and information privacy. See Section 225, Cyber Security Enhancement Act of 2002, of the Homeland Security Act.
Cybersecurity Reports
1 - 25 of 1098 Matches Previous Page  |  Next Page
Mitigating Security Risks for State and Local Government
sponsored by Cyber-Ark Software
WEBCAST: Privileged access management (PAM) is a scalable approach to security that focuses on users rather than relying on a perimeter. The nature of PAM is especially beneficial for addressing the challenges that state & local government agencies face today. Watch this webinar to learn more about PAM and view a demo of CyberArk’s PAM offering.
Posted: 03 Apr 2020 | Premiered: Apr 3, 2020

Cyber-Ark Software

6 Key Use Cases for Securing Your Organization’s Cloud Workloads
sponsored by Cyber-Ark Software
CASE STUDY: In order to ensure organizations are transitioning to the cloud responsibly, security programs need to be implemented that address the unique challenges each organization faces. In this collection of use cases, discover how 6 organizations overcame various cloud security challenges to ensure their data was protected.
Posted: 03 Apr 2020 | Published: 03 Apr 2020

Cyber-Ark Software

The 4 Levels of Automated Remediation
sponsored by DivvyCloud
WHITE PAPER: Automated remediation allows for organizations to save time and resources by automating security tasks that previously required manual attention. Contrary to popular belief, organizations don’t need to be at 100% automation on day 1. In this guide, discover the various levels of automation and learn how to choose the right one for you.
Posted: 03 Apr 2020 | Published: 03 Apr 2020

DivvyCloud

Guide to Remote Workforce Management: Trends, Tips and Tactics
sponsored by ActivTrak
WHITE PAPER: Inside this guide, find trends, tips, and tactics on how to keep pace with the shift towards remote working.
Posted: 03 Apr 2020 | Published: 03 Apr 2020

ActivTrak

Gaining a Hacker's Perspective of API Vulnerabilities
sponsored by Ping Identity Corporation
WEBCAST: While APIs have enabled organizations to modernize their business operations, most organizations feel that they are also an area of potential weakness. This webinar aims to better understand today’s challenges and how to mitigate them by examining key API threats through the perspective of a hacker.
Posted: 03 Apr 2020 | Premiered: Apr 3, 2020

Ping Identity Corporation

Getting Customer IAM Right
sponsored by Ping Identity Corporation
WHITE PAPER: For organizations that interact directly with end-users, customer IAM (CIAM) has been a growing necessity for several years. Regardless of the name, CIAM is vastly different from employee IAM, both in terms of approach and end goals. This white paper highlights the differences between the two and offers tips for getting started with CIAM.
Posted: 03 Apr 2020 | Published: 03 Apr 2020

Ping Identity Corporation

Principles for Securing DevOps
sponsored by Veracode, Inc.
WHITE PAPER: DevOps is transforming the way organizations create, test and release software. An emerging advancement in DevOps is the inclusion of security into software development lifecycle. This white paper highlights 5 key principles for integrating security into the software development lifecycle in order to meet security goals.
Posted: 03 Apr 2020 | Published: 03 Apr 2020

Veracode, Inc.

Data security success at financial institutions around the world
sponsored by TITUS
CASE STUDY: In order to protect their sensitive data and critical applications, security leaders at financial institutions have worked to integrate adequate cybersecurity methods. This white paper highlights a few key examples of global financial institutions who saw success from their partnerships with Titus. Read on to learn more.
Posted: 03 Apr 2020 | Published: 03 Apr 2020

TITUS

Augmenting Security with Always-On
sponsored by Radware
ANALYST REPORT: The impact of a DDoS attack is massive. Web Services remain unavailable due to volumetric attacks and enterprises incur hefty losses that run into millions. In this Frost & Sullivan report, learn why a hybrid always-on deployment model is the ideal solution to combat sophisticated DDoS attacks.
Posted: 03 Apr 2020 | Published: 03 Apr 2020

Radware

The Move to Multiple Public Clouds Creates Security Silos
sponsored by Radware
WHITE PAPER: The migration of data to the cloud appears to be a trend that isn’t slowing down. Luckily for security teams, ensuring the protection of this critical data has come a long way. This report highlights the key findings of a study designed to further understand the impact of cloud migration on cybersecurity. Read on to unlock the results.
Posted: 03 Apr 2020 | Published: 03 Apr 2020

Radware

Cyber Resilience for Dummies
sponsored by Mimecast
EBOOK: Today’s organizations are more connected than ever – IoT and cloud technologies enable massive, interconnected ecosystems. In order to ensure the security of these fragile networks, security leaders are opting for cyber resilience practices. Download your copy of Cyber Resilience for Dummies to learn more about the cyber resilience imperative.
Posted: 03 Apr 2020 | Published: 03 Apr 2020

Mimecast

The Perimeter: An Identity Crisis
sponsored by F5 Networks
WHITE PAPER: Identity and access management (IAM) is growing in popularity as a scalable and pragmatic security approach. This white paper highlights how IAM works, discusses the challenges to adopt this approach and provides IAM best practices to help you get started.
Posted: 02 Apr 2020 | Published: 02 Apr 2020

F5 Networks

How Microsoft 365 Business Premium Protects Your Data
sponsored by TechData - Microsoft
VIDEO: Monitoring your network for potential risks is a lot like managing a large dam – one small leak can lead to a catastrophic breach. In this video, explore the capabilities of Microsoft Office 365, and discover if this is the right email security tool for your needs.
Posted: 02 Apr 2020 | Premiered: 24 Jan 2020

TechData - Microsoft

How Privileged Access Management Protects State and Local Agencies
sponsored by Cyber-Ark Software
PRODUCT OVERVIEW: Ensuring the security of personally identifiable information (PII) is a key responsibility for state and local government agencies. In this solution brief, explore the features and capabilities of the Privileged Access Management platform and discover how agencies are leveraging it to enhance their security posture and protect access to PII.
Posted: 02 Apr 2020 | Published: 02 Apr 2020

Cyber-Ark Software

Consumer Authentication
sponsored by Ping Identity Corporation
WHITE PAPER: Consumer authentication services enable online retailers and eCommerce organizations to shift away from passwords, which continue to pose a security risk. This report highlights some of the key players and offerings in the consumer authentication market, as well as a guide for choosing the right vendor. Read on to learn more.
Posted: 02 Apr 2020 | Published: 26 Sep 2019

Ping Identity Corporation

4 Actions to Secure Work from Home Employees
sponsored by Ping Identity Corporation
WEBCAST: Current events have led to a sudden and dramatic shift towards remote workers and devices. Even though identity and access management has been a trend in cybersecurity for some time, the massive shift towards working from home has made this paramount. In this webinar, discover 4 actions you can take to secure remote workers.
Posted: 02 Apr 2020 | Premiered: Apr 2, 2020

Ping Identity Corporation

Finding Peace of Mind in Your Security Strategy
sponsored by Rackspace
WEBCAST: As successful breaches continue to plague organizations, it’s more important than ever to evaluate common risk areas and address them accordingly. In this webcast, join the SVP of Security at Alert Logic as they highlight key areas of vulnerabilities and how threats are evolving with organizational infrastructure. Read on to learn more.
Posted: 02 Apr 2020 | Premiered: Apr 2, 2020

Rackspace

Season 2 Episode 3 Diving into WAF and on Ways to Prevent DDoS
sponsored by Rackspace
PODCAST: In this episode of ‘CloudSpotting’ by Rackspace, join the hosts as they explore Web Application Firewalls (WAFs) and the business impacts of DDoS. Give the podcast a listen now.
Posted: 02 Apr 2020 | Premiered: Mar 29, 2019

Rackspace

Enterprise Security: At the Intersection of DNS and Phishing
sponsored by Nominet
WHITE PAPER: An emerging trend amongst phishing attackers is to target newly registered web domains – which can create significant turmoil in the time it takes to blacklist it. In this white paper, learn more about this emerging threat and discover how security leaders can better combat it.
Posted: 01 Apr 2020 | Published: 01 Apr 2020


Cyber Confidence: Building a Trustworthy Security Posture
sponsored by Nominet
WHITE PAPER: As cyberattacks continue to grow more costly and disruptive, IT security teams are put under an increasing amount of pressure to address these challenges. To better understand the security landscape, Nominet conducted a study designed to answer key questions related to cyber confidence and threat management. Read on to unlock the results.
Posted: 01 Apr 2020 | Published: 01 Apr 2020


Locking Down Private Security
sponsored by Rackspace
WHITE PAPER: The most common concerns related to cloud migrations are typically related to security. However, cloud users – especially private cloud users – often realize improvements to their security. In this white paper, discover key security challenges and learn how organizations are evolving their defenses to meet the needs of the private cloud.
Posted: 01 Apr 2020 | Published: 01 Apr 2020

Rackspace

How Do Vulnerabilities Get into Software?
sponsored by Veracode, Inc.
WHITE PAPER: Despite the best efforts of IT security teams, vulnerabilities in applications are bound to happen. In fact, research shows that 3 out of 4 apps produced by software vendors fail to meet security standards. Download this white paper to discover the 4 most common causes that lead to software vulnerabilities and ensure your readiness.
Posted: 01 Apr 2020 | Published: 01 Apr 2020

Veracode, Inc.

Your Path to a Mature AppSec Program
sponsored by Veracode, Inc.
WHITE PAPER: Although applications are critical to how businesses operate, web apps are among the top risk areas that hackers attempt to expose. In fact, nearly 40% of global data breaches originate at the application-layer. In this guide, discover what effective application security looks like and learn the steps you can take to reach app sec maturity.
Posted: 01 Apr 2020 | Published: 01 Apr 2020

Veracode, Inc.

Re-thinking Application Security
sponsored by Tala Security
WHITE PAPER: Although customer-facing applications enable a better user experience, they remain one of the most vulnerable areas of an organization. Traditional security fails to prevent attacks targeting apps – so, how can organizations ensure security? This white paper outlines how to re-think application security in order to address modern threats.
Posted: 01 Apr 2020 | Published: 01 Apr 2020

Tala Security

Prioritizing Client-Side Website Security: Doing Nothing Is the Most Expensive Choice
sponsored by Tala Security
WHITE PAPER: When it comes to budgeting for investments in website security, the high price tags associated with acquiring additional tools or personnel makes some business leaders hesitant. In this white paper, learn how to calculate ROI by looking at the cost of breaches and discover the price of inaction.
Posted: 01 Apr 2020 | Published: 01 Apr 2020

Tala Security
1 - 25 of 1098 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info