IT Management  >   Systems Operations  >   Security  >  

Cybersecurity

RSS Feed   
ALSO CALLED: Cyber Security, Cyber Security Enhancement Act of 2002
DEFINITION: Information assurance, including information security, information technology disaster recovery, and information privacy. See Section 225, Cyber Security Enhancement Act of 2002, of the Homeland Security Act.
Cybersecurity Reports
26 - 50 of 1054 Matches Previous Page  |  Next Page
Morphisec Unified Threat Prevention
sponsored by Morphisec, Inc.
DATA SHEET: Malicious actors are more clever, creative and persistent than ever, releasing millions of threats each year. Learn how you can protect your business from zero-days and evasive advanced threats with Moving Target Defense.
Posted: 09 Sep 2019 | Published: 09 Sep 2019

Morphisec, Inc.

The Cybersecurity Effectiveness Podcast: Nick Andersen
sponsored by Verodin
PODCAST: As CISO of the State of Vermont, Nick Andersen is involved in everything from healthcare to emergency management to academia. In this podcast, listen as he and Brian dive into the crucial priorities for the state, differences between protecting state and business data, and establishing third-party relationships to neutralize risk.
Posted: 09 Sep 2019 | Premiered: Sep 9, 2019

Verodin

The Cybersecurity Effectiveness Podcast: Mike Fabrico
sponsored by Verodin
PODCAST: Download this podcast to listen as Mike Fabrico, former specialist at NASDAQ and Senior Director at TrapX Security, breaks down deception as a strategy—not just a tool—to provide organizations with the ability to turn the tables on their opponents.
Posted: 09 Sep 2019 | Premiered: Sep 9, 2019

Verodin

The Cybersecurity Effectiveness Podcast: MacKenzie Brown
sponsored by Verodin
PODCAST: In this podcast, listen as Microsoft Detection and Response Team (DART) consultant MacKenzie Brown describes how her love of theatre led her to her current work with incident response (IR) and becoming co-founder of the Ms. Greyhat Organization.
Posted: 09 Sep 2019 | Premiered: Sep 9, 2019

Verodin

Security Readout: 2019 Trends for Remote and Roaming User Security
sponsored by Cisco Umbrella
WHITE PAPER: It's no secret that the way people work has changed dramatically over the past few years. In this white paper, explore the complex factors that make remote and roaming user security a challenge, and the emerging solutions best positioned to meet the needs of today's increasingly distributed enterprise.
Posted: 09 Sep 2019 | Published: 09 Sep 2019

Cisco Umbrella

How to Respond to the 2019 Threat Landscape
sponsored by Cymulate
ANALYST REPORT: In this Gartner report, discover key traits of the 2019 cybersecurity landscape, how continuous security risk assessments enable tackling threats, and more.
Posted: 09 Sep 2019 | Published: 09 Sep 2019

Cymulate

Protecting Point-of-Sale Systems
sponsored by Morphisec, Inc.
PRODUCT OVERVIEW: With their highly valuable payment card and personal sensitive information, Point-of-Sale systems present a ripe target for cybercrime. Modern POS environments are complicated systems with multiple entry points for attack. In this brief, learn about the anatomy of a POS attack and what organizations can do to prevent against these attacks.
Posted: 09 Sep 2019 | Published: 09 Sep 2019

Morphisec, Inc.

Server Security Lies Deep in Hardware
sponsored by HPE and Intel®
WHITE PAPER: Jump inside this white paper to learn how to adapt your server refresh strategy to the rising frequency of hardware attacks. Plus, get a closer look at some of the latest server models being purpose-built to withstand the capabilities of modern cyberattacks.
Posted: 06 Sep 2019 | Published: 06 Sep 2019

HPE and Intel®

The Cybersecurity Effectiveness Podcast: Richard Seiersen
sponsored by Verodin
PODCAST: Seasoned cybersecurity veteran Richard Seiersen, current SVP & CISO at LendingClub and former VP of Trust and CISCO for Twillio, attributes success in any career to two things: metrics and measurement. In this podcast, he shares his contagious passion for security, the qualities of top engineers, his latest book, and more.
Posted: 06 Sep 2019 | Premiered: Sep 6, 2019

Verodin

Office 365 Anti-Phishing Tools
sponsored by Cisco Umbrella
EGUIDE: Microsoft released a new set of anti-phishing tools available as part of Office 365 Advanced Threat Protection. However, for these features to be effective, administrators need to understand how to use the tools and how to properly implement them. Download this e-guide to learn more.
Posted: 06 Sep 2019 | Published: 04 Sep 2019

Cisco Umbrella

Threat Protection for VDI
sponsored by Morphisec, Inc.
DATA SHEET: Learn how to protect your Virtual Desktop Infrastructure (VDI) from zero-days and sophisticated advanced attacks with Moving Target Defense technology.
Posted: 06 Sep 2019 | Published: 06 Sep 2019

Morphisec, Inc.

Trend Report: Employees Like to Use Unsanctioned Apps — and Don't Plan to Stop
sponsored by Cisco Umbrella
WHITE PAPER: Employees are downloading apps to do their work faster, but this is causing risk to the business. IT can't secure what it can't see, which means threats can creep in. In this white paper, learn how Cisco Umbrella can help you discover which SaaS apps are being used, who's using them, and what risks they pose to your organization.
Posted: 06 Sep 2019 | Published: 06 Sep 2019

Cisco Umbrella

Remove Assumptions, Prove Security
sponsored by Verodin
WHITE PAPER: With no visibility into their cybersecurity effectiveness beyond a point in time, organizations have grown accustomed to holding a reactionary stance when managing their cybersecurity risks. Learn about Verodin SIP, an evidence based approach to managing your cybersecurity lifecycle.
Posted: 05 Sep 2019 | Published: 05 Sep 2019

Verodin

5 Ways to Reduce Risk and Boost Productivity
sponsored by Citrix
WHITE PAPER: While IT must enable both the flexibility employees need to be productive and the security the business requires, this balancing act often ends in compromise. In this white paper, explore 5 ways a secure digital workspace can reduce risk and boost productivity.
Posted: 05 Sep 2019 | Published: 05 Sep 2019

Citrix

The Cybersecurity Effectiveness Podcast: Richard Stiennon
sponsored by Verodin
PODCAST: In this podcast, listen to Richard Stiennon, serial author, industry expert, and Chief Research Analyst at IT-Harvest, discuss how security is maturing at the executive leadership level.
Posted: 05 Sep 2019 | Premiered: Sep 5, 2019

Verodin

Defending the Digital Enterprise
sponsored by Gigamon
WHITE PAPER: Given the amount of encrypted traffic and the threat vector it now poses, you need a way to efficiently decrypt traffic, share it with tools and then re-encrypt it. In this white paper, discover 7 things you need to do to successfully decrypt your SSL and TLS traffic.
Posted: 05 Sep 2019 | Published: 05 Sep 2019

Gigamon

Protection Inside and Outside the Office: The New State of Cybersecurity
sponsored by Cisco Umbrella
RESOURCE: Download this infographic to explore key findings from the Enterprise Strategy Group's survey of 450 cybersecurity experts on their experience protecting a network without perimeters.
Posted: 05 Sep 2019 | Published: 05 Sep 2019

Cisco Umbrella

Trend Report: More Organizations are Using a Secure Internet Gateway for Secure Access
sponsored by Cisco Umbrella
WHITE PAPER: Security leaders need to find a way to give users back their freedom while still protecting sensitive data. In this white paper, learn how a Secure Internet Gateway (SIG) can do just that by providing workers with safe access to the internet – no matter what device they're using or where they're located.
Posted: 05 Sep 2019 | Published: 05 Sep 2019

Cisco Umbrella

Making Application & Infrastructure Vulnerability Management More Effective
sponsored by ZeroNorth
WHITE PAPER: Organizations are struggling to keep up with the dizzying pace it takes to roll out new software capabilities, which only deepens the challenge of keeping up with risks across applications and infrastructure. In this white paper, discover 5 steps you can take to help begin your Application and Infrastructure Vulnerability Management Program.
Posted: 05 Sep 2019 | Published: 05 Sep 2019

ZeroNorth

Protecting Your Organization from Password Breaches
sponsored by OneLogin
EGUIDE: With a large number of password breaches happening, enterprises should look into methods for protecting their resources. Although there are many methods for protecting passwords and accounts, finding the right one can be challenging. In this e-guide, explore a number of tools organizations can use to help secure their passwords and accounts.
Posted: 05 Sep 2019 | Published: 04 Sep 2019

OneLogin

Considerations for Developing a Cyber Threat Intelligence Team
sponsored by Farsight Security
EGUIDE: In this e-guide, explore the best practices for team location and selection when developing a cyberthreat intelligence team.
Posted: 04 Sep 2019 | Published: 10 Oct 2017

Farsight Security

5 Steps to Minimize Your Exposure to Ransomware Attacks
sponsored by Centrify Corporation
WEBCAST: According to the FBI's Internet Crime Complaint Center, the damages associated with ransomware have dramatically increased over the last year. In this webcast, learn what organizations need to know about ransomware attacks and what they can do to minimize the risk of being victimized.
Posted: 04 Sep 2019 | Premiered: Sep 4, 2019

Centrify Corporation

The Anatomy of a Hack: Perception vs. Reality
sponsored by Centrify Corporation
WEBCAST: There is a common belief that data breaches require a tremendous amount of sophistication. However, analyses have repeatedly found that the source of a hack is often due to compromised credentials. In this webcast, Dr. Torsten George discusses the 3 major phases of the "cyberattack lifecycle" and how to prevent data exfiltration.
Posted: 04 Sep 2019 | Premiered: Sep 4, 2019

Centrify Corporation

Advanced Protection for Web Applications on AWS
sponsored by Amazon Web Services
WHITE PAPER: As companies migrate business-critical applications from their on-premises infrastructure to the cloud, they increase their exposure to known and unknown targeted attacks. In this white paper, learn how organizations can combat these threats by deploying a security solution designed specifically for internet-facing applications such as a WAF.
Posted: 04 Sep 2019 | Published: 21 Aug 2019

Amazon Web Services

Trend Report: Threats are Multiplying and Becoming More Sophisticated
sponsored by Cisco Umbrella
ANALYST REPORT: Despite all the buzz about security and staying prepared, malicious attackers are more audacious than ever. Download this research report to explore popular threats such as phishing, ransomware, cryptomining and more. Also, learn how Cisco Umbrella can help keep your organization secure as threat risks continue to escalate.
Posted: 03 Sep 2019 | Published: 03 Sep 2019

Cisco Umbrella
26 - 50 of 1054 Matches Previous Page    1 2 3 4 5    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement