IT Management  >   Systems Operations  >   Security  >  

Cybersecurity

RSS Feed   
ALSO CALLED: Cyber Security, Cyber Security Enhancement Act of 2002
DEFINITION: Information assurance, including information security, information technology disaster recovery, and information privacy. See Section 225, Cyber Security Enhancement Act of 2002, of the Homeland Security Act.
Cybersecurity Reports
1 - 25 of 1102 Matches Previous Page  |  Next Page
Computer Weekly - 19 November 2019: Is facial recognition happening too fast?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, as the Information Commissioner calls on police forces to slow down the introduction of facial recognition, we examine the issues. We look at what the use of DevOps methods means for storage strategy. And we talk to Microsoft's global cyber security chief. Read the issue now.
Posted: 15 Nov 2019 | Published: 19 Nov 2019

ComputerWeekly.com

Tanium for Detection and Response: Effectively Address and Remediate Incidents
sponsored by Tanium
WHITE PAPER: Endpoint detection response (EDR) tool effectiveness can be measured by 3 key attributes: the scope of data it provides, its performance and scalability, and its flexibility. In this solution brief, dive deeper into each of the features that distinguish effective EDR tools. Continue reading to learn more.
Posted: 15 Nov 2019 | Published: 15 Nov 2019

Tanium

Transforming Cybersecurity Strategy for the Age of IoT
sponsored by Forescout
WHITE PAPER: In a recent study, the Forescout Research Team looks to better understand the current risks and threats by looking at the IoT in a smart building. The report outlines 3 strategies an attacker might use and discusses ways to mitigate them. Read on to dive deeper into the key findings.
Posted: 15 Nov 2019 | Published: 15 Nov 2019

Forescout

Define Your Role
sponsored by SentinelOne
EBOOK: To be a successful CISO is to think on a tactical level, balancing day-to-day security concerns with long-term projects to position your organizations to handle future threats. In this e-book, discover the 12 fundamental questions CISOs should be asking themselves on a frequent basis to help define their role. Read on to learn more.
Posted: 15 Nov 2019 | Published: 15 Nov 2019

SentinelOne

The Secrets of Evaluating Security Products
sponsored by SentinelOne
EBOOK: Prioritizing security and choosing the right tools is critical for business to maintain their IT environments. This e-book goes in-depth into the trends and challenges of cybersecurity, as well as criteria for evaluating security tools. Read on to learn more.
Posted: 15 Nov 2019 | Published: 31 Aug 2019

SentinelOne

Tricks of the Storage Trade: How to Build an Effective Cyber Resilience Strategy
sponsored by IBM
EBOOK: Download this e-book for an insider look at today’s threat landscape, tactical instruction on how to establish a robust cyber resilience strategy, and to examine the critical role the storage infrastructure plays in this process.
Posted: 15 Nov 2019 | Published: 15 Nov 2019

IBM

Passive Isn’t Good Enough: Moving into Active EDR
sponsored by SentinelOne
WHITE PAPER: As cyberattacks continue to grow in volume and complexity, it’s become more critical than ever for businesses to deploy active endpoint detection and response (EDR) to provide scalability and security to their various endpoints. This whitepaper discusses the differences and benefits of various EDR methods, read on to learn more.
Posted: 14 Nov 2019 | Published: 31 May 2019

SentinelOne

How to Drive Success
sponsored by SentinelOne
EBOOK: The CISO’s job is about balancing risks, balancing expectations and balancing needs. Like any balancing act, it is one that takes practice to perfect. This e-book leverages the expertise of current CISOs to help new CISOs by guiding them through their first 90 days on the job. Read on to learn more.
Posted: 14 Nov 2019 | Published: 14 Nov 2019

SentinelOne

CCPA and Identity Verification
sponsored by IDology
WHITE PAPER: As 2020 approaches, companies should view CCPA as an opportunity to further engage with their customers, rather than an obstacle. In order to adhere to the requirements, implementing policies that follows the CCPA timeline is imperative.Download this whitepaper to discover why identity verification is so critical to ensuring compliance.
Posted: 14 Nov 2019 | Published: 12 Nov 2019

IDology

State of the Firewall
sponsored by FireMon
WHITE PAPER: While firewalls are a critical part of a holistic security approach, enterprises remain challenged by the lack of automation, network security complexity, and lack of overall network visibility. Recently, FireMon conducted research into how organizations are managing security challenges. Read on to uncover the key themes and findings.
Posted: 14 Nov 2019 | Published: 14 Nov 2019

FireMon

Automating Identity & Access Management
sponsored by Hitachi ID
WEBCAST: Identity and access management (IAM) is the process of creating new and modifying existing identities as well as managing the security entitlements associated with those identities. In this webcast, discover an overview of introducing automation to your IAM. Watch now to learn more.
Posted: 14 Nov 2019 | Premiered: Feb 28, 2019

Hitachi ID

Future-Proofing Your Information Security Strategy
sponsored by InteliSecure
WHITE PAPER: In this guide, Jeremy Wittkop, Chief Technology Officer, explains why security leaders should start pivoting their security strategies to emphasize the 2 elements of security that are not likely to be diminished: people and data. Read on to learn more about what he thinks really matters in the future of security and what you can do about it now.
Posted: 13 Nov 2019 | Published: 13 Nov 2019

InteliSecure

Stopping Advanced Malware: A SANS Review of enSilo’s Endpoint Security Platform
sponsored by enSilo
WHITE PAPER: With attackers growing more and more savvy, IT teams require additional resources in order to properly protect increasing endpoints. enSilo conducted a survey with SANS to gain insight into endpoint security challenges and tactics. Read on to uncover the research results.
Posted: 13 Nov 2019 | Published: 31 Mar 2018


Guide to Understanding Ransomware
sponsored by enSilo
WHITE PAPER: Ransomware is an increasingly popular tactic used to steal data and disrupt a system’s operations. In enSilo’s Guide to Understanding Ransomware, discover everything you need to know about protecting and defending against ransomware.
Posted: 13 Nov 2019 | Published: 13 Nov 2019


Exposing the Top Ten Cloud Security Myths
sponsored by Palo Alto Networks
RESOURCE: Regardless of where your company is on its cloud journey, security challenges remain, with cyberattacks becoming more complex. Constantly evolving threats and innovations are requiring IT leaders to re-evaluate their cloud security strategies. Dive into this article to uncover the 10 biggest security myths about cloud computing.
Posted: 13 Nov 2019 | Published: 31 Jan 2019

Palo Alto Networks

Simplify, Strengthen and Unify Your Security with Zero Trust Access
sponsored by PortSys
WHITE PAPER: Given the increasing threats and challenges to IT security, organizations should consider a zero-trust approach for protecting their infrastructure. In this data sheet, uncover the benefits and challenges of incorporating a zero-trust approach and gain insight into the features of Total Access Control’s zero-trust service.Read on to learn more.
Posted: 13 Nov 2019 | Published: 13 Nov 2019

PortSys

Leveraging a Smart Lighting System to Enter a Building Network
sponsored by Forescout
RESOURCE: Although smart lighting systems increase energy efficiency, improve working conditions and optimize space utilization in a building, their connection to the internet provides a potential network entry point for malicious actors. Download this infographic to learn more.
Posted: 13 Nov 2019 | Published: 13 Nov 2019

Forescout

Structuring an IAM program
sponsored by Hitachi ID
WEBCAST: With the increasing complexity of cyberattacks, managing access has become critical to the protection of data. IAM & PAM programs allow IT teams to monitor privileged accounts and defend against attacks.Watch this webinar to understand what goes into these programs, where it fits within your organization & how to justify the investment.
Posted: 13 Nov 2019 | Premiered: Oct 17, 2019

Hitachi ID

Password Management with Hitachi ID Password Manager
sponsored by Hitachi ID
WHITE PAPER: Why do we still use passwords? Despite the prediction of the end of passwords, their cost-effectiveness makes them likely to remain popular. This white paper reviews the benefits of credential and password management, some alternatives, best practices, and a vast array of other topics. Download the report to get started.
Posted: 13 Nov 2019 | Published: 01 Nov 2019

Hitachi ID

Rise of the Machines: Transforming Cybersecurity Strategy for the Age of IoT
sponsored by Forescout
WHITE PAPER: Information technology (IT) & operational technology (OT) were, for a long time, regarded as two distinct areas within an organization. Now these two domains are interconnected, thanks to the Internet of Things (IoT) revolution.But what are these “things”, what do they have to say & are we listening? Read on to learn more.
Posted: 12 Nov 2019 | Published: 12 Nov 2019

Forescout

Asia-Pacific Cloud Security Study
sponsored by Palo Alto Networks
WHITE PAPER: A recently released study by Palo Alto Networks uncovers the truth about the state of cloud security among large enterprises across Asia-Pacific, including many cases where perception doesn’t match the reality of professionals who know best. Download the report to dive deeper into the research.
Posted: 12 Nov 2019 | Published: 12 Nov 2019

Palo Alto Networks

Endpoint Security Buyer’s Guide: Protect, Detect, Respond
sponsored by Tanium
WHITE PAPER: Endpoints are critical to protect, as they are the most common areas for cyberattacks and breaches. This buyer’s guide is designed to help your organization evaluate endpoint security capabilities and identify gaps by focusing on the key aspects of various endpoint security tactics. Download this guide to get started.
Posted: 12 Nov 2019 | Published: 12 Nov 2019

Tanium

The Challenges of Trusted Access in a Cloud-First World
sponsored by Thales
WHITE PAPER: With over 1,050 participants, the 2019 Thales Access Management Index revealed common security trends, concerns and access management technologies around cloud adoption used by today’s organizations. Download the executive summary to uncover the key findings and takeaways towards secure access management.
Posted: 12 Nov 2019 | Published: 31 Jul 2019

Thales

How to Lock Down Git
sponsored by Perforce
WHITE PAPER: While Git allows for developers to collaborate, it can also contribute to loss of intellectual property & significant security issues. This white paper covers tactics designed to mitigate the risks of Git & discusses best practices for securing native Git. Download this report to get started.
Posted: 11 Nov 2019 | Published: 11 Nov 2019

Perforce

Best practices for secure cloud migration
sponsored by Thales
WHITE PAPER: The Cloud Security Alliance (CSA) is an organization whose mission is to promote best practices & provide education for cloud security. Recently, the CSA released a guide that covered best practices, key considerations & use cases. Is your organization considering adoption of cloud services? Read on to enhance your understanding.
Posted: 11 Nov 2019 | Published: 30 Jun 2019

Thales
1 - 25 of 1102 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement