IT Management  >   Systems Operations  >   Security  >  

Cybersecurity

RSS Feed   
ALSO CALLED: Cyber Security, Cyber Security Enhancement Act of 2002
DEFINITION: Information assurance, including information security, information technology disaster recovery, and information privacy. See Section 225, Cyber Security Enhancement Act of 2002, of the Homeland Security Act.
Cybersecurity Reports
26 - 50 of 1141 Matches Previous Page  |  Next Page
The Million-Dollar Opportunity: Compliance for Cyber Liability Insurance
sponsored by RapidFire
WHITE PAPER: To get an edge on securing clients against risking both security and payouts, read this white paper. It outlines the benefits of MSPs investing in compliance solutions to both protect their customers and grow their revenue, as well as 5 ways to help customers stay compliant.
Posted: 03 Dec 2019 | Published: 03 Dec 2019

RapidFire

Secure Cloud Transformation
sponsored by Menlo Security
WHITE PAPER: As a result of the increasing popularity of SaaS tools and applications, organizations are rethinking their infrastructure to include security without sacrificing user experience. In this white paper, take an in-depth look into strategic principles IT leaders are incorporating, and explore Menlo Security’s Cloud Platform.
Posted: 02 Dec 2019 | Published: 02 Dec 2019

Menlo Security

What Every Company Should Know About Cookies
sponsored by Namogoo
EBOOK: Nearly every website relies on cookies to allow them to collect specific data on their visitors to enhance customer experience. But as helpful as they can be, the information stored on them can pose a privacy risk. In this e-book, explore the various types of cookies and how they will be affected by data privacy laws.
Posted: 27 Nov 2019 | Published: 27 Nov 2019

Namogoo

Tricks of the Storage Trade: How to Build an Effective Cyber Resilience Strategy
sponsored by IBM
EBOOK: Download this e-book for an insider look at today's threat landscape, tactical instruction on how to establish a robust cyber resilience strategy, and to examine the critical role the storage infrastructure plays in this process.
Posted: 27 Nov 2019 | Published: 27 Nov 2019

IBM

Rethinking Enterprise Data Defense
sponsored by FireMon
EBOOK: Despite heavy investment of time and resources, the number of cybersecurity breaches and incidents continues to increase each year. In this e-book discover how to rethink your enterprise security strategy and explore proactive defense tactics.
Posted: 27 Nov 2019 | Published: 27 Nov 2019

FireMon

Is the Cloud Transforming Security?
sponsored by Menlo Security
WEBCAST: As IT teams continue to prioritize cloud transformation, it’s imperative to also reconsider security tactics in order to realize the full benefits of cloud services.In this webinar, leverage industry expertise around cloud transformation, security implications, and explore the benefits of isolation tactics.
Posted: 27 Nov 2019 | Premiered: Nov 27, 2019

Menlo Security

Ransomware Attacks: How to Get the Upper Hand
sponsored by Cisco Umbrella
EGUIDE: The rock group Radiohead is celebrated for its unconventional approach to recording and releasing music. Lately, the band is also turning heads for how it handled a hacker trying to sell its unreleased work. In this e-guide learn what security experts think of Radiohead’s strategy for dealing with the ransomware threat.
Posted: 26 Nov 2019 | Published: 21 Nov 2019

Cisco Umbrella

Extreme AI Security
sponsored by Extreme Networks
PRODUCT OVERVIEW: In this brief, learn how ExtremeAI Security can help to defend against cyberattacks by delivering an innovative, AI-powered solution for IoT device security coupled with automated threat remediation and containment.
Posted: 26 Nov 2019 | Published: 26 Nov 2019

Extreme Networks

Next-Gen Deception Technology: Moving Beyond Honeypots
sponsored by Illusive Networks
WHITE PAPER: As the market has evolved, three general types of deceptions have emerged; full interaction decoys (honeypots), partial or low interaction emulated decoys, and endpoint data deceptions. In this white paper, explore each type of deception and review the increasing complexity of deception technology.
Posted: 26 Nov 2019 | Published: 26 Nov 2019

Illusive Networks

Isolation: Separating Malware from the Network, Not Devices
sponsored by Menlo Security
WHITE PAPER: As data breaches grow increasingly common, the need for network security has become essential. Many organizations are adopting separation tactics to protect their network, but what if there was a better way to protect your endpoints? In this white paper, go in-depth into the benefits and faults of isolation and network separation.
Posted: 26 Nov 2019 | Published: 26 Nov 2019

Menlo Security

Guide to Eliminating the Top 3 Security Pain Points
sponsored by Menlo Security
WEBCAST: In this webinar, leverage the knowledge of industry experts at 451 research and Menlo Security to uncover the most significant information security pain points and strategic recommendations for eliminating them.
Posted: 26 Nov 2019 | Premiered: Sep 26, 2019

Menlo Security

The Security Concerns of Cloud Cryptomining Services
sponsored by Cisco Umbrella
EGUIDE: With the rise in value and popularity of cryptocurrencies, cybercriminals are often targeting them in their attacks. Since cloud mining providers aren’t bound by the same regulations as a traditional bank, it’s more critical than ever for investors to consider the security practices of cloud cryptomining companies. Read on to get started.
Posted: 26 Nov 2019 | Published: 19 Nov 2019

Cisco Umbrella

Your Third-party Risk Management Best Practices Need Updating
sponsored by ServiceNow
EGUIDE: Traditional best practices for third-party risk management are leaving organizations vulnerable. In this e-guide, learn how to improve accuracy of security questionnaires, interview third-party employees about risk and rethink third-party risk management best practices in this changing threat landscape.
Posted: 26 Nov 2019 | Published: 15 Nov 2019

ServiceNow

9 Email Security Features to Help Prevent Phishing Attacks
sponsored by Cisco Umbrella
EGUIDE: For as long as email exists, phishing will continue to be a threat. While the risks of phishing can’t be eliminated, your organization can enhance its email security to prevent a breach. In this e-guide, discover 9 email security features designed to help prevent phishing attacks.
Posted: 25 Nov 2019 | Published: 19 Nov 2019

Cisco Umbrella

Global Smart Meter Manufacturer Secures Move to Microsoft Intune with Lookout
sponsored by Lookout
CASE STUDY: With organizations growing more reliant on remote access capabilities, endpoint security becomes necessary to meet internal and industry security regulations. In this case study, discover how Landis+Gyr, an energy management leader, developed and deployed an advanced mobile security strategy to protect their endpoints
Posted: 25 Nov 2019 | Published: 25 Nov 2019

Lookout

Post-Perimeter Security 101: Dawn of a Borderless World
sponsored by Lookout
WEBCAST: With organizations’ networks expanding to accommodate the need for mobile device access, perimeter security tools and practices have changed to include remote endpoints. In this webinar, Lookout’s Chief Security Officer, Aaron Cockerill, shares his expertise in protecting sensitive data in a ‘post-perimeter’ landscape.
Posted: 25 Nov 2019 | Premiered: Mar 4, 2019

Lookout

Combining GRC programs with BC and DR
sponsored by ServiceNow
EGUIDE: In this e-guide, explore the tools used for gathering critical data and discover why Governance, risk management and compliance (GRC) and Business continuity (BC) teams should collaborate to concentrate their efforts in order to build a comprehensive data privacy program.
Posted: 25 Nov 2019 | Published: 15 Nov 2019

ServiceNow

Addressing CCPA: Legacy ERP and Data Privacy Compliance
sponsored by Appsian
PRODUCT OVERVIEW: With the 2020 launch date for CCPA looming, organizations are scrambling to ensure they have appropriate security measures in place. In this solution brief, highlight the gaps within current security capabilities and explore how organizations can enhance their legacy ERP apps to ensure CCPA compliance.
Posted: 25 Nov 2019 | Published: 25 Nov 2019

Appsian

Your Firewalls Are Dirtier Than You Think
sponsored by FireMon
DATA SHEET: Outdated firewall practices can leave vulnerabilities within your organizations network. These gaps can lead to security risks and underperformance. This infographic highlights the 4 steps for improving your firewall cleanup process. Read on to learn more.
Posted: 25 Nov 2019 | Published: 25 Nov 2019

FireMon

How to Avoid Disruption by Bridging the Resilience Gap
sponsored by Tanium
WHITE PAPER: As organizations grow increasingly complex, IT security teams struggle to remain resilient as they face internal and external pressures. A recent study was conducted to better understand the barriers to resilience and the tradeoffs faced by decision-makers. Read on to uncover the key insights and conclusions.
Posted: 22 Nov 2019 | Published: 22 Nov 2019

Tanium

Quantifying the Point Solution Nightmare
sponsored by Tanium
WHITE PAPER: Forrester, in partnership with Tanium, conducted research into the current state of security and operations tools, teams, and trends to quantify the complexity of endpoint security management and integration. Read on to uncover the results and conclusions.
Posted: 22 Nov 2019 | Published: 31 May 2019

Tanium

Data Privacy Is the New Strategic Priority
sponsored by IBM
WHITE PAPER: Recently, Forrester conducted research, in partnership with IBM to evaluate enterprises’ data privacy compliance with increasing regulatory requirements. Read on to uncover the key insights from the research.
Posted: 22 Nov 2019 | Published: 31 Jul 2019

IBM

Create an Effective Email Phishing Test in 7 Steps
sponsored by Cisco Umbrella
EGUIDE: The best way for IT to improve email phishing security is through comprehensive testing, which helps identity which users are susceptible and what type of fake email is more effective. Dive into this e-guide to learn how to create an effective email phishing test in 7 steps.
Posted: 22 Nov 2019 | Published: 21 May 2018

Cisco Umbrella

Lookout discovers Monokle, new mobile surveillanceware
sponsored by Lookout
WEBCAST: In July of 2019, Lookout’s Security Research team announced its discovery of Monokle, a set of mobile surveillanceware tools. These tools were connected to a Russia-based company sanctioned by the U.S. Government in connection with the 2016 Presidential election. Continue to watch a brief video highlighting this discovery!
Posted: 22 Nov 2019 | Premiered: Aug 13, 2019

Lookout

Configuration Management: Addressing GRC Challenges
sponsored by ServiceNow
EGUIDE: Configuration management enables security teams to configure, update and patch systems more efficiently. In this e-guide, dive deeper into configuration management to learn some the key features, benefits, and how it can improve governance, risk management and compliance (GRC).
Posted: 21 Nov 2019 | Published: 15 Nov 2019

ServiceNow
26 - 50 of 1141 Matches Previous Page    1 2 3 4 5    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement