IT Management  >   Systems Operations  >   Security  >  

Cybersecurity

RSS Feed   
ALSO CALLED: Cyber Security, Cyber Security Enhancement Act of 2002
DEFINITION: Information assurance, including information security, information technology disaster recovery, and information privacy. See Section 225, Cyber Security Enhancement Act of 2002, of the Homeland Security Act.
Cybersecurity Reports
51 - 75 of 1470 Matches Previous Page  |  Next Page
Pwning Admin Rights To Spread Ransomware: Stories From The Battlefield
sponsored by Remediant
WEBCAST: Stopping a ransomware attack is a challenge for many organizations, particularly during this era of remote work. Professionals are asking, "What does a ransomware attack look like? Why is it so easy for hackers use credentials to move laterally within a network?" View this webcast to learn how to assess your environment for admin credential risk.
Posted: 28 Aug 2020 | Premiered: Apr 9, 2020

Remediant

Accelerate Your Path to CMMC Compliance on AWS
sponsored by AWS - Coalfire
WEBCAST: Many organizations across the DoD supply chain use AWS in varying capacities. In preparing for CMMC certification, it’s important for these organizations to consider which controls are inherited, and what strategies and AWS services are available to help expedite CMMC compliance. Watch this webinar from Coalfire Federal and AWS to go in-depth.
Posted: 28 Aug 2020 | Premiered: Aug 12, 2020

AWS - Coalfire

5 Must-Haves to Look for in a Best-in-Class IoT Security Solution
sponsored by Palo Alto Networks
WHITE PAPER: Based on Gartner’s predictions, adoption of IoT endpoint is estimated to reach 5.81 billion this year. However, in order to integrate IoT responsibly, security considerations need to be made. In this buyer’s guide, discover what to look for in an IoT security solution.
Posted: 28 Aug 2020 | Published: 28 Aug 2020

Palo Alto Networks

The Healthcare Cybersecurity Checklist
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: According to the Ponemon Institute, the average cost of a data breach in the healthcare sector is $6.5 million. For these organizations, cybersecurity is a top priority – especially when it comes to meeting HIPAA compliance requirements. Use the following checklist to develop your cybersecurity strategy, step by step.
Posted: 28 Aug 2020 | Published: 28 Aug 2020

Arctic Wolf Networks, Inc.

The Ultimate Guide to the MITRE ATT&CK Round 2 EDR Evaluation
sponsored by Palo Alto Networks
ANALYST REPORT: Endpoint detection and response (EDR) is quickly becoming a ubiquitous security technology in the age of remote work. As such, it is critical for security professionals to be aware of the vendors in the space. Tap into the Ultimate Guide to the MITRE ATT&CK Round 2 EDR Evaluation to help you pick the right tool for your organization.
Posted: 28 Aug 2020 | Published: 28 Aug 2020

Palo Alto Networks

Security Orchestration For Dummies
sponsored by Palo Alto Networks
EBOOK: Security orchestration is a new term to the market, but it could simplify the lives of security professionals. It refers to the integration of security tools, unifying intelligence and automating tasks, resulting is a more effective security operations center that better detects and responds to threats. Dive into this e-book for a detailed guide.
Posted: 28 Aug 2020 | Published: 28 Aug 2020

Palo Alto Networks

Next-Generation Firewall Buyer’s Guide
sponsored by Palo Alto Networks
RESOURCE: Cloud adoption, big data analytics, machine learning and automation are all accelerating the delivery of applications, which in and of themselves are becoming increasingly accessible. However, this also means that apps are more vulnerable than ever. Browse this guide to learn how Next-Gen Firewalls can minimize risk without slowing you down.
Posted: 28 Aug 2020 | Published: 28 Aug 2020

Palo Alto Networks

7 SIEM Trends to Watch in 2020
sponsored by Splunk
WHITE PAPER: In the last year alone, demand for SIEM technology has remained strong, with threat management as the primary driver, and general monitoring and compliance secondary. In this white paper, learn about 7 SIEM trends to watch for in 2020.
Posted: 28 Aug 2020 | Published: 28 Aug 2020

Splunk

Remediant Secure One Solutions Brief
sponsored by Remediant
PRODUCT OVERVIEW: In order to address the growing threat of cyberattacks caused by access mismanagement, Remediant created the zero-standing privilege model to help organizations enhance their identity and access management programs. But what is zero-standing privilege & how does it work? Read this solution brief to find out.
Posted: 27 Aug 2020 | Published: 27 Aug 2020

Remediant

QRadar: Detecting Threats As Your Business Grows
sponsored by IBM
EGUIDE: IBM QRadar empowers you to address your most important security challenges, no matter the size of your business. Choose a business size that matches yours to uncover how IBM QRadar can help your business.
Posted: 27 Aug 2020 | Published: 27 Aug 2020

IBM

IBM Security Verify Demo
sponsored by IBM
EGUIDE: IBM Security Verify brings context and intelligence to decisions about who should have access to what, empowering organizations with risk-based authentication and Adaptive Access.  Explore the demo and learn how to master the balance between security and user experience.
Posted: 27 Aug 2020 | Published: 27 Aug 2020

IBM

Product Tour of IBM Security Guardium Insights
sponsored by IBM
EGUIDE: See how Guardium Insights gives security professionals the ability to quickly create data security and audit reports, monitor activity in on-premises and DBaaS sources, and take action from a central location.
Posted: 27 Aug 2020 | Published: 27 Aug 2020

IBM

Cyber Resilient Organization Report 2020
sponsored by IBM
ANALYST REPORT: The volume of cybersecurity incidents has risen, causing disruption to IT and business processes. In fact, 51% of organizations reported a significant business disruption during the past two years due to a cybersecurity incident. What did they report regarding cyber resiliency? How are they planning for the future? Read this report to find out.
Posted: 27 Aug 2020 | Published: 31 Jul 2020

IBM

Product Tour of IBM Security Guardium Data Protection
sponsored by IBM
EGUIDE: Learn how Guardium Data Protection can help provide the data security your business needs to thrive by discovering and classifying your data, simplifying compliance, monitoring user activity and detecting threats.
Posted: 27 Aug 2020 | Published: 27 Aug 2020

IBM

2020 Gartner Magic Quadrant
sponsored by IBM
WHITE PAPER: Gartner named IBM a Leader in the latest Gartner Magic Quadrant for Security Information and Event Management (SIEM). In the report, Gartner placed IBM furthest to the right for "Completeness of Vision."
Posted: 27 Aug 2020 | Published: 27 Aug 2020

IBM

The Cost of Insider Threats: Global Report
sponsored by IBM
ANALYST REPORT: The frequency and cost of insider threats have increased significantly. Negligence, criminals, malicious insiders and credential thieves are all causes, and 60% of organizations have had more than 20 incidents per year since 2016. Jump into this Ponemon global insider threat report to learn more about these actors and what they cost.
Posted: 26 Aug 2020 | Published: 26 Aug 2020

IBM

Guide for Cellular IoT Security
sponsored by Emnify
EGUIDE: IoT attacks have been increasing steadily, with certain types of attacks increasing by as much as 900% across 2019. Securing IoT devices, connections and applications is no simple task. Download this e-guide – which highlights an overview of common IoT security threats and best practices – to get started.
Posted: 26 Aug 2020 | Published: 26 Aug 2020

Emnify

Endpoint Protection Product Rating Report
sponsored by Cybereason
WHITE PAPER: Back at the beginning of 2020, NSS Labs conducted an independent evaluation of Cybereason’s Endpoint Protection offering – testing they key capabilities and total cost of ownership. To see the summary of NSS Labs’ results, including an overall product rating, read the following report.
Posted: 26 Aug 2020 | Published: 26 Aug 2020

Cybereason

Egress Prevent
sponsored by Egress Software Technologies Inc
PRODUCT OVERVIEW: An emerging practice in today’s email security strategies is the implementation of preventative measures to stop data breaches before they happen – regardless if they’re accidental or intentional. This solution brief explores the key features and capabilities of Egress Prevent, which uses machine learning to secure email inboxes and users.
Posted: 26 Aug 2020 | Published: 26 Aug 2020

Egress Software Technologies Inc

Egress Protect
sponsored by Egress Software Technologies Inc
PRODUCT OVERVIEW: Email protection strategies often fall short of meeting the necessary compliance and security requirements to adequately secure sensitive data being shared. In this solution brief, explore the key features and capabilities of Egress Protect, designed to intelligently secure emails and large files with the appropriate level of security.
Posted: 26 Aug 2020 | Published: 26 Aug 2020

Egress Software Technologies Inc

Security and IT Ops: Minding the IT Gaps Together
sponsored by Tanium
WHITE PAPER: Contrary to popular belief, security and IT operations have more in common than they think when it comes to business objectives – differences usually arise when it comes to strategic processes. The following white paper highlights those commonalities and explores avenues for collaboration between these two teams.
Posted: 25 Aug 2020 | Published: 25 Aug 2020

Tanium

Assessing the Economic Impact of Cybereason
sponsored by Cybereason
ANALYST REPORT: As the security threat landscape continues to grow in complexity, organizations are looking for the best solutions to protect their endpoints without overextending their already overworked security and IT teams. For help, read this Forrester report to get an in-depth look at key findings for the Cybereason Defense Platform.
Posted: 25 Aug 2020 | Published: 29 May 2020

Cybereason

Endpoint Controls
sponsored by Cybereason
PRODUCT OVERVIEW: In order to manage the modern cyberthreat landscape, organizations need security policies that ensure protection and compliance without impacting efficiency. This solution brief provides an overview of the key features of Cybereason Endpoint Security – read on to learn more.
Posted: 25 Aug 2020 | Published: 25 Aug 2020

Cybereason

SCCM Upgrade Checklist | Automate Patch Management in the Cloud
sponsored by Automox
RESOURCE: The digital landscape is constantly evolving, and traditional legacy tools are being replaced by cloud-based SaaS alternatives – and patch management is no exception. However, there are some key factors to consider prior to making the switch. Read this article to make sure you’re ready for cloud-based patch management.
Posted: 25 Aug 2020 | Published: 17 Aug 2020


Working Remotely is the New Normal
sponsored by Automox
RESOURCE: The shift towards a remote workforce isn’t a novel concept – however it wasn’t until the pandemic first arrived that it became such a widespread priority. To help ensure you’re on the right track, this infographic highlights 5 key considerations for securing your remote workforce without sacrificing efficiency.
Posted: 25 Aug 2020 | Published: 25 Aug 2020

51 - 75 of 1470 Matches Previous Page    1 2 3 4 5 6    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info