IT Management  >   Systems Operations  >   Security  >  

Cybersecurity

RSS Feed   
ALSO CALLED: Cyber Security, Cyber Security Enhancement Act of 2002
DEFINITION: Information assurance, including information security, information technology disaster recovery, and information privacy. See Section 225, Cyber Security Enhancement Act of 2002, of the Homeland Security Act.
Cybersecurity Reports
26 - 50 of 1128 Matches Previous Page  |  Next Page
SOAR in The Real World Survey
sponsored by D3 Security
ANALYST REPORT: Over the past few years, SOAR has emerged as an important tool for large organizations in their perpetual fight against data breaches, ransomware, and other cyberattacks. The evolution of SOAR has been rapid. In this report, learn everything you need to know about SOAR.
Posted: 17 Feb 2020 | Published: 17 Feb 2020

D3 Security

NIST Cybersecurity Framework Implementation Overview
sponsored by Absolute Software Corporation
WHITE PAPER: In 2018, the National Institute of Standards and Technology (NIST) revised their cybersecurity framework (CSF) to reflect today’s threat landscape. This white paper outlines the 5 functions of the NIST CSF, specifically for endpoints, and provides actionable guidelines for implementation. Read on to get started.
Posted: 17 Feb 2020 | Published: 29 Oct 2018

Absolute Software Corporation

Cyberark Privilege Cloud Guided Success Plan
sponsored by Cyber-Ark Software
RESOURCE: Often, when an organization purchases a security tool, they are left to their own devices for deploying this new tool – usually leading to misconfiguration. In this solution brief, explore CyberArk’s Guided Success Plan, designed to provide new Privilege Cloud users with a 3-phase approach to easier configuration.
Posted: 14 Feb 2020 | Published: 14 Feb 2020

Cyber-Ark Software

SLED - 3 Easy Ways to Secure Your K-12 School District
sponsored by Cisco Umbrella
RESOURCE: Deployed in 3 simple steps, Cisco Umbrella secures your entire school district in minutes. Easily protect students and staff against phishing attacks, filter content, and gain visibility into all activity, on or off-campus. Download this infographic to learn more.
Posted: 14 Feb 2020 | Published: 14 Feb 2020

Cisco Umbrella

CIS Critical Security Controls Evaluation Guide
sponsored by Absolute Software Corporation
WHITE PAPER: The Center for Internet Security (CIS) Critical Security Controls have become a trusted resource for organizations looking to identify threats and enhance security. This evaluation guide measures the Absolute Platform against the CIS Top 20 Critical Security Controls to illustrate its capabilities.
Posted: 14 Feb 2020 | Published: 02 Nov 2018

Absolute Software Corporation

Malwarebytes Cut Potential Downtime to a Matter of Hours Rather than Weeks
sponsored by Malwarebytes
CASE STUDY: In this case study, discover how Neoperl, a global IT company operating in Europe, partnered with Malwarebytes to address challenges related to system downtime, that resulted in cost savings, complete remediation of threats, and minimized downtime and disruptions.
Posted: 14 Feb 2020 | Published: 14 Feb 2020

Malwarebytes

Prevent Browser-Injected Ads from Hijacking Your Customers
sponsored by Tala Security
WHITE PAPER: By eliminating browser-injected ads, you can enhance customer experience on your website, which can lead to increased conversions, reduced shopping cart abandonment, and more. But what is the best way to go about blocking unwanted ads? Download this white paper to learn more.
Posted: 14 Feb 2020 | Published: 14 Feb 2020

Tala Security

What secure email gateways can do for your enterprise
sponsored by SearchSecurity.com
EBOOK: It is important to evaluate secure email gateways before implementing them in your organization. Here's a look at some of the best email security gateway products in the industry, as well as implementation, cost and uses.
Posted: 14 Feb 2020 | Published: 14 Feb 2020

SearchSecurity.com

Computer Weekly –18 February 2020: Trust no one – the benefits of zero-trust security
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we take an in-depth look at zero-trust security and examine how it changes traditional IT risk models. After SAP extended the support deadline for its ECC ERP system, we find out the options for users. And we analyse explainable AI and the ethical importance of understanding algorithms. Read the issue now.
Posted: 14 Feb 2020 | Published: 18 Feb 2020

ComputerWeekly.com

4 Ways to Leverage the MITRE ATT&CK Framework in Your Security Operations
sponsored by D3 Security
WHITE PAPER: While the MITRE ATT&CK Framework is popular amongst security professionals, many teams struggle to get optimize its efficiency. In this white paper, learn 4 ways your security team can incorporate the MITRE ATT&CK Framework into your operations.
Posted: 14 Feb 2020 | Published: 14 Feb 2020

D3 Security

2019 SANS Automation & Integration Survey
sponsored by D3 Security
WHITE PAPER: While automation may not be a new concept, advancements in technology and the growing threat of cyberattacks has increased its popularity among security professionals. The results from 2019’s SANS Automation & Integration study highlight the presence of security automation in today’s organizations and look at common automation misconceptions.
Posted: 14 Feb 2020 | Published: 31 Mar 2019

D3 Security

Business Email Compromise
sponsored by PhishLabs
WHITE PAPER: Traditional phishing certainly can (and does) cause a lot of damage to organizations, but on a per-attack basis, Business Email Compromise (BEC) is undoubtedly the most expensive. Why? View this guide to uncover everything you need to know about BEC attacks today.
Posted: 14 Feb 2020 | Published: 14 Feb 2020

PhishLabs

Hackers are Always a Step Ahead
sponsored by Asigra
DATA SHEET: Download the following paper to learn how Asigra can work with your MSP to thwart cyber-attacks and to view 5 ways they can “convince” hackers not to target your organization.
Posted: 14 Feb 2020 | Published: 14 Feb 2020

Asigra

Fujitsu & VMware – Multi-Cloud Security
sponsored by Fujitsu
WEBCAST: In this video, Fujitsu & VMware experts offer insights, guidance, and solutions to overcome the challenges of cloud security to ensure your applications, workloads and data are ‘secure by design’ – whether at rest or in motion as you transform.
Posted: 13 Feb 2020 | Premiered: Dec 3, 2019

Fujitsu

Cryptomining - How Cryptocurrency is Changing Cyber Security
sponsored by Cisco Umbrella
WEBCAST: The introduction of cryptocurrencies has changed the cyber threat landscape. New varieties of ransomware in the form of cryptojacking, mining, and exchange phishing are plaguing today’s businesses. In this episode of ‘A Cybersecurity Technical Mini Series’, learn how you can stay protected.
Posted: 13 Feb 2020 | Premiered: Dec 16, 2019

Cisco Umbrella

SIG - More Organizations are Using a Secure Internet Gateway for Secure Access
sponsored by Cisco Umbrella
WHITE PAPER: What if you could provide workers with safe access to the internet — no matter what device they’re using or where they’re located, even if they aren’t on the VPN? A Secure Internet Gateway (SIG) provides just that. Download this trend report to unlock an in-depth analysis of SIG.
Posted: 13 Feb 2020 | Published: 13 Feb 2020

Cisco Umbrella

Third Party Privileged Access to Critical Systems
sponsored by Cyber-Ark Software
EBOOK: Third-party vendors play a pivotal role in the way business is conducted today. Yet, organizations tend to use antiquated methods, like VPNs, to allow access. In this e-book, explore the results of a recent CyberArk study into third-party privileged access and learn the steps your organization can take to ensure secure vendor access.
Posted: 13 Feb 2020 | Published: 13 Feb 2020

Cyber-Ark Software

Ransomware - NEW for 2020: Ransomware Defense for Dummies - 2nd Edition
sponsored by Cisco Umbrella
WHITE PAPER: Many organizations that are targeted by ransomware attacks assume that paying the ransom is the fastest and most cost-effective way to get their data back, but this isn’t always the case. Download your copy of ‘Ransomware Defense for Dummies’ to learn how ransomware attacks work and how to defend against them.
Posted: 13 Feb 2020 | Published: 13 Feb 2020

Cisco Umbrella

Fayolle Preempts Cyberattacks and Persistent Threats
sponsored by Malwarebytes
CASE STUDY: In this case study, follow the story of Fayolle, a French engineering and construction company, as they partner with Malwarebytes to address the rise in cyberattacks as a result of a cloud environment transition. Download the study now to uncover Fayolle’s results.
Posted: 13 Feb 2020 | Published: 13 Feb 2020

Malwarebytes

Chart Industries Vaporizes Ransomware and Malware
sponsored by Malwarebytes
CASE STUDY: In this case study, follow the journey of Chart Industries, a global manufacturer and distributer, as they partner with Malwarebytes to address the growing risk of malware and phishing attacks targeted at mobile workers and endpoints. Download the report to see the results.
Posted: 13 Feb 2020 | Published: 13 Feb 2020

Malwarebytes

IAM: Managing identity remains key to cyber security
sponsored by ComputerWeekly.com
EGUIDE: IT and regulatory environments are changing rapidly driven by the EU's GDPR and digital transformation that is seeing accelerated adoption of cloud and IoT-based technologies, and while identity remains key to cyber security, organisations need to reassess and adapt their identity and access management (IAM) strategies accordingly.
Posted: 13 Feb 2020 | Published: 13 Feb 2020

ComputerWeekly.com

Cyber attackers exploiting poor cloud security
sponsored by ComputerWeekly.com
EGUIDE: More than a third of organisations report a cyber attack on the cloud environment due to a lack of basic cloud security hygiene
Posted: 13 Feb 2020 | Published: 13 Feb 2020

ComputerWeekly.com

Security analytics: Enabling organisations to get ahead of attackers
sponsored by ComputerWeekly.com
EBOOK: In the face of an ever-increasing number of cyber-attacks, many organisations are turning to security analytics, which is the use of data to measure and detect potential breaches. In this e-guide we provide 6 case studies on when and when not to use security analytics.
Posted: 13 Feb 2020 | Published: 13 Feb 2020

ComputerWeekly.com

86 million reasons to support No More Ransom
sponsored by ComputerWeekly.com
EGUIDE: Anti-ransomware cross-industry initiative says it has prevented more than £86m in ransom payments as it marks its third anniversary, which coincides with a resurgence in ransomware in many parts of the world.
Posted: 13 Feb 2020 | Published: 13 Feb 2020

ComputerWeekly.com

The Impact of Unsecured Digital Identities
sponsored by Keyfactor
WHITE PAPER: In this report, uncover key research findings from a recent study conducted by the Ponemon Institute into the impact of unsecured digital identities. Download the full study to unlock the key insights from the research.
Posted: 12 Feb 2020 | Published: 12 Feb 2020

Keyfactor
26 - 50 of 1128 Matches Previous Page    1 2 3 4 5    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info