IT Management  >   Systems Operations  >   Security  >  

Cybersecurity

RSS Feed   
ALSO CALLED: Cyber Security, Cyber Security Enhancement Act of 2002
DEFINITION: Information assurance, including information security, information technology disaster recovery, and information privacy. See Section 225, Cyber Security Enhancement Act of 2002, of the Homeland Security Act.
Cybersecurity Reports
26 - 50 of 972 Matches Previous Page  |  Next Page
The Motivations for GDPR: Individuals
sponsored by DXC
WHITE PAPER: The purpose behind GDPR is to make it easier for individuals to confirm who has their data, understand how their data is being used and raise any complaints about use or misuse of said data. Explore this resource to gain insight into the motivations for GDPR.
Posted: 10 Apr 2018 | Published: 10 Apr 2018

DXC

GDPR and the Banking Industry
sponsored by DXC
WHITE PAPER: GDPR will give companies across all sectors plenty to think about, but at heart it's about deserving the trust that your customers place in you. The GDPR is an opportunity for banks to step up and reinforce this trust. Access this resource to learn about GDPR's impact on the banking industry.
Posted: 09 Apr 2018 | Published: 09 Apr 2018

DXC

How to Create a Scalable & Sustainable Vendor Risk Management Program
sponsored by BitSight
WHITE PAPER: Massive cyberattacks are routinely attributed to vendors with substandard security practices. This resource offers a detailed 6-step guide for creating a sustainable and scalable vendor risk management program from the ground up.
Posted: 09 Apr 2018 | Published: 09 Apr 2018

BitSight

Choosing the Right Model: A Guide to DDoS Protection
sponsored by F5 Networks
WHITE PAPER: According to the Verizon DBIR, businesses of all sizes in nearly every industry run the risk of being attacked by DDoS. Leverage this guide to uncover how to choose the right model for DDoS protection.
Posted: 09 Apr 2018 | Published: 09 Apr 2018

F5 Networks

Protecting Against the Top 5 Attack Vectors
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Recently, there has been an abundance of cyberattacks in the news with popular companies, such as Uber and Equifax. Explore this resource to uncover how to protect against the top 5 attack vectors.
Posted: 09 Apr 2018 | Published: 09 Apr 2018

Arctic Wolf Networks, Inc.

Automate Third-Party Risk Management to Address New Regulatory Requirements
sponsored by BitSight
WHITE PAPER: Evolving financial regulations and increased outsourcing require stronger management of third- and fourth-party cybersecurity risk. Access this resource to learn how automating third-party risk management can help banks and financial institutions address new regulatory requirements.
Posted: 09 Apr 2018 | Published: 09 Apr 2018

BitSight

Keep Point-of-Sale Data Safe on All Sides
sponsored by HPI and Intel
WHITE PAPER: Technologies today capture more and more valuable customer data than ever before. Take a look at this white paper to uncover how to keep point-of-sale data safe with a multi-level protection strategy.
Posted: 09 Apr 2018 | Published: 09 Apr 2018

HPI and Intel

Contractor Cyber Risk Continues to Grow
sponsored by Arctic Wolf Networks, Inc.
RESOURCE: Access this resource to learn 3 strategies to mitigate risk when hiring an outside contractor for your networking needs.
Posted: 09 Apr 2018 | Published: 09 Apr 2018

Arctic Wolf Networks, Inc.

The Insider's Guide to Cybersecurity For Government
sponsored by Microsoft
WHITE PAPER: The Insider's Guide to Cybersecurity for Government is your best practices path to confidence across the cloud and devices. Dive in to learn what your organization can expect from the latest cybersecurity technology and dedication of a leading cloud-based partner.
Posted: 09 Apr 2018 | Published: 09 Apr 2018

Microsoft

What is Multi-Cloud?
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper explores why the usual methods of cloud security are not able to effectively secure multi-cloud environments. Then, learn how an open standards-based fabric of integrated and adaptive security products could provide the visibility and coordination needed to provide a high level of protection.
Posted: 06 Apr 2018 | Published: 06 Apr 2018

Fortinet, Inc.

Protect Your Employees and Data From Advanced Malware Attacks in Real-Time
sponsored by Dell EMC and Microsoft
WHITE PAPER: Organizations of every size now face a daily risk of cyberattacks, such as spear-phishing, drive-by downloads, poisoned search engine results, and more. Take a look at this resource to learn how new defenses are needed at the endpoint to protect your employees and data from advanced attacks in real-time.
Posted: 06 Apr 2018 | Published: 06 Apr 2018

Dell EMC and Microsoft

GDPR and the Utilities Sector
sponsored by DXC
WHITE PAPER: Most large utilities in the digital era are primarily driven by data, which means these firms must focus on customer privacy, as required by the GDPR. Take a look at this resource to learn about how the utilities sector is impacted by the implications of the GDPR.
Posted: 05 Apr 2018 | Published: 05 Apr 2018

DXC

GDPR: Not Just Compliance
sponsored by DXC
WHITE PAPER: GDPR presents a great opportunity for improved customer experience, deeper customer engagement, and increased sales. Explore this resource to learn more about how GDPR goes beyond simple compliance standards and can offer a greater benefit to your organization.
Posted: 05 Apr 2018 | Published: 05 Apr 2018

DXC

Understanding Different Types of Phishing attacks
sponsored by Veeam Software
RESOURCE CENTER: According to Veeam, a new phishing site is created every 20 seconds. Explore this custom resource to understand how phishers are doing business today and learn how to better protect your enterprise.
Posted: 05 Apr 2018 | Published: 05 Apr 2018

Veeam Software

How to Protect Your Multi-Cloud Environment With One Security Fabric
sponsored by Fortinet, Inc.
WHITE PAPER: Multi-cloud networks present attack surfaces that are significantly larger, more distributed, and more variable than those of enterprise networks or single clouds. Leverage this resource to learn how to protect your multi-cloud environment with a broad, integrated, and automated framework for network security.
Posted: 05 Apr 2018 | Published: 05 Apr 2018

Fortinet, Inc.

Banking Across Generations Study
sponsored by Jumio
WHITE PAPER: According to Javelin Strategy and Research, 20% of individuals who have abandoned mobile banking blame it on the authentication process being time consuming. Take a look at this resource to gain insight into improving authentication and security within mobile banking, while ensuring a smooth customer experience.
Posted: 05 Apr 2018 | Published: 05 Apr 2018

Jumio

Shoring Up the Weak Link in Phishing Defenses: Your People
sponsored by Veeam Software
WHITE PAPER: Because phishing is happening all of the time, to every organization, security pros need to understand where the next attack is going to come from in order to be better prepared. Explore this expert resource to learn how to secure the weakest link of your phishing defense: your people.
Posted: 05 Apr 2018 | Published: 05 Apr 2018

Veeam Software

The Hidden ROI of Cloud-Friendly Security
sponsored by F5 Networks
WHITE PAPER: According to F5 Labs Research, 53% of data breaches target the application layer. Take a look at this resource to gain insight into the ROI benefits of boosting cloud and application layer security.
Posted: 04 Apr 2018 | Published: 04 Apr 2018

F5 Networks

A Guide to PCI Compliance in Containers
sponsored by Sysdig
WHITE PAPER: Containers have been adopted faster than any previous enterprise technology and with this quick rise in adoption, maintaining compliance can be difficult. This resource offers insight into PCI DSS compliance within containers.
Posted: 04 Apr 2018 | Published: 04 Apr 2018

Sysdig

Web Application Firewall (WAF) Security Value Map
sponsored by Citrix
WHITE PAPER: This resource shines light into an independent test and provides detailed information about Citrix's web application firewall product, including its security effectiveness, performance, and TCO.
Posted: 04 Apr 2018 | Published: 04 Apr 2018

Citrix

How to Fight Cybercrime: Tips from a Former FBI Agent
sponsored by Veeam Software
WHITE PAPER: What can the criminal activity of the 1930's teach us about cybercrime today? Read this white paper to find out, as Jeff Lanza, a former FBI agent with 20 years of experience shares tips on fighting ransomware in today's turbulent threat landscape.
Posted: 04 Apr 2018 | Published: 04 Apr 2018

Veeam Software

Ransomware: Block Attackers with a Layered Defense
sponsored by Cisco & Dimension Data
WHITE PAPER: Ransomware is affecting companies across all industries at an alarming rate. This resource reveals what ransomware is, what it does, and how organizations can defend against it.
Posted: 03 Apr 2018 | Published: 03 Apr 2018

Cisco & Dimension Data

Ransomware: Everything you Need to Know
sponsored by Cisco & Dimension Data
WHITE PAPER: According to Cisco, a typical ransom can be anywhere from $200 to $10,000, but some institutions have paid a far higher price. Access this resource to uncover everything you need to know about ransomware and protecting your enterprise.
Posted: 03 Apr 2018 | Published: 03 Apr 2018

Cisco & Dimension Data

A Practical Guide for GDPR Compliance
sponsored by Druva Software
WHITE PAPER: The GDPR demands significant data protection safeguards to be implemented by organizations. The time to get ready is now, as the consequences of getting it wrong are significant. Explore this Osterman Research white paper to uncover a practical guide for GDPR compliance.
Posted: 03 Apr 2018 | Published: 03 Apr 2018

Druva Software

Seeing the Future is the Future of Cybersecurity
sponsored by Sophos
WEBCAST: In an effort to augment security, many vendors are looking toward transitioning from a reactive approach to a more predictive approach. Take a look at this webcast to gain insight into the future of cybersecurity and how your enterprise can better predict attacks to intercept them before they wreak havoc on your enterprise.
Posted: 02 Apr 2018 | Premiered: Apr 2, 2018

Sophos
26 - 50 of 972 Matches Previous Page    1 2 3 4 5    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement