IT Management  >   Systems Operations  >   Security  >  

Cybersecurity

RSS Feed   
ALSO CALLED: Cyber Security, Cyber Security Enhancement Act of 2002
DEFINITION: Information assurance, including information security, information technology disaster recovery, and information privacy. See Section 225, Cyber Security Enhancement Act of 2002, of the Homeland Security Act.
Cybersecurity Reports
201 - 225 of 836 Matches Previous Page  |  Next Page
Cybersecurity Trends: 2017 Spotlight Report
sponsored by Alert Logic
RESOURCE: According to the 2017 Spotlight Report, the 3 biggest obstacles to stronger cybersecurity are lack of skilled employees, lack of budget, and a lack of security awareness among employees. Explore this in-depth 72-page Spotlight Report to uncover top data points and trends in cybersecurity to help advance your company's security approach.
Posted: 27 Nov 2017 | Published: 27 Nov 2017

Alert Logic

Achieve Security and Compliance in the Cloud Without Breaking the Bank
sponsored by Alert Logic
RESOURCE: Take a closer look at this infographic to uncover how IT professionals from 4 large sized companies implemented a security-as-a-service approach without breaking the bank.
Posted: 27 Nov 2017 | Published: 27 Nov 2017

Alert Logic

Web security: Important but often overlooked
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide we take a look at the different approaches you can take in order to bolster your web security. We find out how to identify and address overlooked web security vulnerabilities, how security controls affect web security assessment results and why web opportunities must be met with appropriate security controls.
Posted: 24 Nov 2017 | Published: 24 Nov 2017

ComputerWeekly.com

FBI Cyber Squad Guest Speaking on Emerging Cyber Threats
sponsored by Digital Shadows
WEBCAST: Do you understand your data and susceptibility to being targeted? Watch this webcast to uncover emerging cyber threats, persistent vulnerabilities and strategies for protecting your enterprise.
Posted: 21 Nov 2017 | Premiered: Nov 21, 2017

Digital Shadows

The Evolving Risk Landscape
sponsored by F5 Networks
WHITE PAPER: There was nearly a 22% increase in attacks on web applications from 2016 to 2017. While apps have increased productivity, they have also opened the door to unprecedented threats, expanding the risk landscape and putting corporate data at risk. This e-book offers a guide to protecting against web fraud, credential stuffing, ransomware, and phishing.
Posted: 20 Nov 2017 | Published: 20 Nov 2017

F5 Networks

Damage Control: The Impact of Critical IT Incidents
sponsored by Splunk
WHITE PAPER: IT incidents result in annual costs running into millions of dollars, while the average organization is dealing with hundreds of incidents every week. This Quocirca research report analyzes the impact critical IT incidents have on organizations, which halt business processes and impact users.
Posted: 20 Nov 2017 | Published: 20 Nov 2017

Splunk

The Clock is Ticking on GDPR Obligations
sponsored by IBM
WHITE PAPER: GDPR gives organizations 72 hours to report a data breach, while discovery usually takes a company 150 days. Take a look at this article to discover ways your organization can prepare for GDPR to ensure you are compliance ready by May 2018.
Posted: 20 Nov 2017 | Published: 20 Nov 2017

IBM

Bots Mean Business
sponsored by F5 Networks
EBOOK: While some bots are good, many are malicious and the cybercriminals behind them are targeting your apps. This e-book explores how to optimize business intelligence while protecting your enterprise's apps, network, and data.
Posted: 17 Nov 2017 | Published: 17 Nov 2017

F5 Networks

Top Cyber Threats to the Technology Sector
sponsored by Digital Shadows
WHITE PAPER: Technology providers collect sensitive customer data, causing them to be popular targets for cyberattacks. Explore this white paper to learn about the top 4 threats facing technology companies today, and learn from recent attacks to ensure your data is secured.
Posted: 14 Nov 2017 | Published: 14 Nov 2017

Digital Shadows

Top Cyber Threats to The Retail Sector
sponsored by Digital Shadows
WHITE PAPER: Given the frequent number of transactions taking place using payment cards, retail companies are frequently the target of financially-motivated threats. Explore this white paper to uncover the top 3 cyber threats to the retail sector to help you monitor and manage digital risks.
Posted: 14 Nov 2017 | Published: 14 Nov 2017

Digital Shadows

The Pressing Need for Digital Risk Management
sponsored by Digital Shadows
WHITE PAPER: According to ESG research, 69% of organizations are increasing their cybersecurity budgets. This ESP report reveals how CISOs and risk officers can adopt a thorough risk management strategy to protect their enterprise from pressing cyber threats.
Posted: 14 Nov 2017 | Published: 14 Nov 2017

Digital Shadows

Inside Online Carding Courses Designed for Cybercriminals
sponsored by Digital Shadows
WHITE PAPER: Experts project a loss of $24 billion to payment card fraud by the end of 2018. This paper looks at an online course designed for bad actors in order to shed light on the latest fraud tactics and tools, allowing consumers, merchants and credit card companies to better understand the threat and protect themselves from becoming the next fraud victim.
Posted: 14 Nov 2017 | Published: 14 Nov 2017

Digital Shadows

Top Cyber Threats to the Legal Sector
sponsored by Digital Shadows
WHITE PAPER: Legal firms can be attractive targets for cybercriminals, especially firms working on mergers and acquisitions (M&A), possessing a large amount of sensitive, non-public information. This paper highlights 3 security risks for legal firms to focus on and how to mitigate them.
Posted: 13 Nov 2017 | Published: 13 Nov 2017

Digital Shadows

Top Cybercrime Threats to Financial Institutions
sponsored by Digital Shadows
WHITE PAPER: The most prevalent cybercrime threats against financial institutions are: the use or sale of ATM malware, targeted network intrusions, data breaches and the use of banking Trojans. Take a look at this white paper to learn more about these financial threats that stem from cybercriminals.
Posted: 13 Nov 2017 | Published: 13 Nov 2017

Digital Shadows

Protect Your Customer and Employee Accounts
sponsored by Digital Shadows
WHITE PAPER: Digital Shadows found that 97% of the largest companies in the world had their credentials exposed. Explore this white paper to learn how to mitigate the growing risks of account takeovers and the measures you can take to ensure your organization is better protected.
Posted: 13 Nov 2017 | Published: 13 Nov 2017

Digital Shadows

How York Risk Services Responds to Security Threats in Minutes vs. Hours or Days
sponsored by ServiceNow
WEBCAST: When responding to security vulnerabilities, lack of speed and consistency are significant issues many enterprises face. Watch this webcast case study to gain insight into how York Risk Services overcame their incident response issues by implementing an effective vulnerability response strategy.
Posted: 10 Nov 2017 | Premiered: Nov 10, 2017

ServiceNow

CW ASEAN – November 2017: How managed security services help to reduce cyber risk
sponsored by ComputerWeekly.com
EZINE: In this month's issue of CW ASEAN, read more about the pros and cons of using managed security services and considerations you should be aware of.
Posted: 10 Nov 2017 | Published: 10 Nov 2017

ComputerWeekly.com

Equifax Breach: Lessons Learned for your Organization
sponsored by Digital Shadows
WHITE PAPER: The Equifax data breach potentially affected 143 million individuals in the US, Canada and the UK. Inside, gain insight into the impacts of the Equifax Breach, 6 lessons learned from the breach, and how your enterprise can mitigate the risks of falling victim to such a devastating data breach.
Posted: 10 Nov 2017 | Published: 10 Nov 2017

Digital Shadows

CW ANZ – November 2017: On cyber alert
sponsored by ComputerWeekly.com
EZINE: In this month's CW ANZ, read about the state of cyber security in Australia, Telstra's efforts to help enterprises improve their cyber security posture, and how Australian organisations can keep up with the demands of cyber security.
Posted: 10 Nov 2017 | Published: 10 Nov 2017

ComputerWeekly.com

Fintech & the digital customer experience
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, find out how banks such as Malaysia's RHB are keeping up in the digital age, the state of mobile payments across the APAC region, and why some bankers believe retail banking will be fully automated in just a few years.
Posted: 09 Nov 2017 | Published: 09 Nov 2017

ComputerWeekly.com

The Need for Automotive Cybersecurity Testing Standards
sponsored by Synopsys
WHITE PAPER: Most organizations creating connected systems and devices today spend a considerable amount of time looking at security issues, but often lack a standard framework for testing security. Uncover the importance of developing standards for validating and verifying security.
Posted: 08 Nov 2017 | Published: 08 Nov 2017

Synopsys

Protecting Endpoints Everywhere
sponsored by Cisco Umbrella
EBOOK: In this e-book, gain a closer look at how security challenges have evolved and the steps your organization can take to ensure end-to-end security, especially as IoT and mobile device continue to grow.
Posted: 07 Nov 2017 | Published: 07 Nov 2017

Cisco Umbrella

Protecting Users and Data with Cloud Security
sponsored by Cisco Umbrella
EBOOK: What can you do to mitigate the risks associated with off-network access to sensitive data and applications? View this extensive resource collection, which offers 15+ resources, some from industry analysts and experts at 451 Research and Gartner.
Posted: 07 Nov 2017 | Published: 07 Nov 2017

Cisco Umbrella

Artificial Intelligence in the Enterprise: The AI Race is on
sponsored by Cylance
WHITE PAPER: 81% of organizations say AI was detecting threats before their security teams could. Explore this white paper to discover an overview of AI and how it can give your company a competitive advantage in cybersecurity.
Posted: 02 Nov 2017 | Published: 02 Nov 2017

Cylance

Top-of-Mind Threats and Their Impact on Endpoint Security Decisions
sponsored by Cylance
WHITE PAPER: According to this ESG report, 91% of cybersecurity professionals express the greatest concern over the threat posed by email phishing. Explore this report to learn how to protect your organization's endpoints against cyberattacks with specific defense strategies, including machine learning.
Posted: 01 Nov 2017 | Published: 01 Nov 2017

Cylance
201 - 225 of 836 Matches Previous Page    7 8 9 10 11 12    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement