IT Management  >   Systems Operations  >   Security  >  

Cybersecurity

RSS Feed   
ALSO CALLED: Cyber Security, Cyber Security Enhancement Act of 2002
DEFINITION: Information assurance, including information security, information technology disaster recovery, and information privacy. See Section 225, Cyber Security Enhancement Act of 2002, of the Homeland Security Act.
Cybersecurity Reports
51 - 75 of 1074 Matches Previous Page  |  Next Page
Network Security Best Practices
sponsored by Netwrix Corporation
WHITE PAPER: While ensuring the security of your network is a critical task, the amount of tactics and technologies that exist to support this effort can seem overwhelming. This white paper breaks down the basic aspects, tactics, and best practices related to network security in order to help guide your IT security team. Read on to get started.
Posted: 10 Jan 2020 | Published: 10 Jan 2020

Netwrix Corporation

Why Secure Email Gateways Fail to Catch Phish
sponsored by Area 1 Security
EBOOK: Phishing attacks are becoming difficult for secure email gateways (SEGs) to detect and mitigate, leading to resource-intensive remediation efforts. But why are SEGs failing? This e-book goes in-depth into why SEGs are ineffective at catching phishing attacks and explores what you can do to improve your email security.
Posted: 09 Jan 2020 | Published: 09 Jan 2020

Area 1 Security

Whack-a-phish
sponsored by Area 1 Security
WHITE PAPER: Traditional email security defenses rely on past data to detect the next attack, and therefore can’t defend against modern continually evolving phishing methods. Protection from modern attacks requires a proactive approach to security. Read on to learn more about forward-looking security technology for phishing attacks.
Posted: 09 Jan 2020 | Published: 09 Jan 2020

Area 1 Security

Under the Hoodie 2019
sponsored by Rapid7
RESOURCE: Due to the sensitive nature of its findings, penetration testing is a relatively unknown, yet critical, piece of the information security puzzle. This study by Rapid7 was an effort to demystify what goes on in a typical pen test by examining 180 engagements to break down what clients and practitioners should expect to see.
Posted: 09 Jan 2020 | Published: 09 Jan 2020

Rapid7

A Buyer’s Guide to Automating Personal Data Rights for CCPA and GDPR
sponsored by BigID
WHITE PAPER: With the arrival of data rights and privacy regulations, organizations face increasing pressure to maintain strategies that ensure data protection. The risks for failing to do so include financial, legal and reputational damage. Read this buyer’s guide to ensure your organization informed on the key aspects of data discovery.
Posted: 09 Jan 2020 | Published: 09 Jan 2020

BigID

Lookout Phishing and Content Protection
sponsored by Lookout Inc.
DATA SHEET: While many organizations have invested into firewalls, gateways and filters to stop email phishing attacks, those methods are ineffective against phishing attacks that target mobile devices. In this data sheet, explore the characteristics of a mobile phishing attack, their impact, and best practices for protecting your network.
Posted: 09 Jan 2020 | Published: 25 Oct 2018

Lookout Inc.

Mobile Phishing Killchain
sponsored by Lookout Inc.
RESOURCE: To an attacker looking to execute a phishing attack, mobile devices are an easy target. Continue to this infographic, which follows the lifecycle of a mobile phishing attack from inception to data breach and discover the security measures that could’ve been taken.
Posted: 09 Jan 2020 | Published: 09 Jan 2020

Lookout Inc.

Mobile Phishing 2018: Myths and Facts Facing Every Modern Enterprise Today
sponsored by Lookout Inc.
WHITE PAPER: Mobile devices have opened a profitable new window of opportunity for criminals executing phishing attacks. This white paper explores the common myths and facts around mobile phishing to help your organization identify and remediate threats.
Posted: 09 Jan 2020 | Published: 20 Mar 2018

Lookout Inc.

A guide to SIEM platforms, benefits and features
sponsored by SearchSecurity.com
EZINE: SIEM systems enable organizations to centralize indecent response, detection and handling, as well as data logging for compliance. This e-guide is a collection of resources highlighting SIEM benefits, criteria and tools. Read on to evaluate which SIEM system is right for you.
Posted: 09 Jan 2020 | Published: 09 Jan 2020

SearchSecurity.com

When the Cloud Rains Phish
sponsored by Area 1 Security
WHITE PAPER: When it comes to phishing attacks, every inbox is a prime target. Hackers are discovering more sophisticated methods for targeting employees that have adapted to overcome world-class defenses. Read this white paper to uncover the modern threats the users encounter and discover how to remedy them.
Posted: 08 Jan 2020 | Published: 08 Jan 2020

Area 1 Security

California Consumer Privacy Act vs GDPR: What You Need to Know
sponsored by BigID
WHITE PAPER: The CCPA is the first of its kind law in the US that will put privacy rights in the hands of California consumers. It builds on many core principles that defined Europe’s GDPR, but there are some variations that are important to distinguish. In this white paper, explore the key differences and similarities between these 2 regulations.
Posted: 08 Jan 2020 | Published: 08 Jan 2020

BigID

4 Steps to Building a PII Catalog for Privacy
sponsored by BigID
WHITE PAPER: Data catalogs digest an input of data in order to accurately organize what it is and where it comes from. Effective catalogs enable organizations to automate policy, implement data security and maintain compliance. This white paper highlights a 4-step process designed to guide an organization in its catalog journey. Read on to learn more.
Posted: 08 Jan 2020 | Published: 08 Jan 2020

BigID

Catching Modern Threats: InsightIDR Detection Methodologies
sponsored by Rapid7
PRODUCT OVERVIEW: Modern threat detection is a 2-pronged approach: to protect an organization against loss, an IT security team needs to be able to detect the 2 types of threats (common and targeted), and deal with them accordingly. This solution guide highlights the key benefits and features of InsightIDR’s cloud SIEM for modern threat detection.
Posted: 07 Jan 2020 | Published: 07 Jan 2020

Rapid7

A Buyer’s Guide to Privacy-Centric Data Discovery
sponsored by BigID
WHITE PAPER: Protecting customer data has never been easy. And with the introduction of regulations like GDPR and CCPA, organizations face heavy penalties for failing to address this issue. Use this buyer’s guide to stay informed on the key components to look for in data discovery partner.
Posted: 07 Jan 2020 | Published: 07 Jan 2020

BigID

CCPA Readiness Checklist
sponsored by BigID
WHITE PAPER: As of January 1, 2020, the CCPA has come into effect. Given the steep penalties for failing to comply, organizations should make certain that they’re positioned to responsibly safeguard customer data. Use this comprehensive checklist to ensure your organization meets the requirements of California’s new data privacy regulation.
Posted: 07 Jan 2020 | Published: 07 Jan 2020

BigID

MDR Evaluator’s Guide
sponsored by AT&T Cybersecurity
RESOURCE: Managed detection and response (MDR) services equip organizations with scalable security and threat intelligence. However, the new market can be difficult to navigate. This evaluator’s guide is designed to help with the decision-making process by offering 10 key elements for considerations and questions to ask potential service providers.
Posted: 07 Jan 2020 | Published: 07 Jan 2020

AT&T Cybersecurity

AlienVault USM vs SIEM
sponsored by AT&T Cybersecurity
RESOURCE: Like any other security program, SIEM was helpful at detecting threats for a time. When new compliance regulations began requiring data records, SIEM became unable to handle the increased volume. This white paper highlights the shortcomings of SIEM and explores AlienVault’s Unified Security Management (USM) platform. Read on to learn more.
Posted: 07 Jan 2020 | Published: 07 Jan 2020

AT&T Cybersecurity

The State of Security Segmentation
sponsored by Illumio
WHITE PAPER: As cyberattacks grow increasingly common, it’s critical to look at how criminals operate in order to prevent damage. Read on to uncover the research findings of a recent study designed to shed light on the current state of security segmentation, and why it’s preferable compared to traditional firewalls.
Posted: 07 Jan 2020 | Published: 07 Jan 2020

Illumio

Top 10 ASEAN IT stories of 2019
sponsored by ComputerWeekly.com
EGUIDE: Over the year, Computer Weekly looked at how the region is embracing technology, not for its own sake but to become more nimble, secure and to overcome the challenges of a growing economy. Here are Computer Weekly's top 10 ASEAN IT stories of 2019.
Posted: 06 Jan 2020 | Published: 07 Jan 2020

ComputerWeekly.com

Top 10 Australian IT stories of 2019
sponsored by ComputerWeekly.com
EGUIDE: In this review of the top 10 Computer Weekly articles focused on IT in Australia, we look at how the country is harnessing cutting-edge technologies to solve problems, while paving the way for emerging areas such as open banking.
Posted: 06 Jan 2020 | Published: 07 Jan 2020

ComputerWeekly.com

Next-Generation Data Classification
sponsored by BigID
WHITE PAPER: Traditional approaches to data classification relied on manual entries, which fail to meet the scalability needs of today’s ever-expanding environments. In this white paper, discover BigID’s next-generation data classification approach, which builds on the success of its predecessors with sustainability and privacy at its core.
Posted: 06 Jan 2020 | Published: 06 Jan 2020

BigID

Best Practices for Office 365 Security Monitoring
sponsored by AT&T Cybersecurity
RESOURCE: In order to realize the full benefits of Office 365 cloud applications, establishing an appropriate cloud security strategy is essential. As with any new technology, there are valid security concerns to consider before making the switch. In this white paper, discover the security monitoring best practices for Office 365.
Posted: 06 Jan 2020 | Published: 06 Jan 2020

AT&T Cybersecurity

Beginners Guide to Open Source Intrusion Detection Tools
sponsored by AT&T Cybersecurity
RESOURCE: Intrusion detection systems (IDS) are a set of technologies that enable IT teams network visibility in order to identify and prevent suspicious activity from becoming a breach. Read this beginner’s guide to explore various IDS detection techniques to help you get started with network visibility and security.
Posted: 06 Jan 2020 | Published: 06 Jan 2020

AT&T Cybersecurity

ZS Solves Office 365 Security Issue with PortSys TAC
sponsored by PortSys
CASE STUDY: The threat of a data breach can damage an organization’s reputation with both customers and vendors. When ZS made the decision to implement Office 365, they needed enhanced security to cover data encryption and endpoint management. Read this case study to follow ZS’s journey towards a holistic data loss prevention strategy.
Posted: 06 Jan 2020 | Published: 06 Jan 2020

PortSys

SIEM Tools, Future Tech and How to Prepare for What's Ahead
sponsored by SearchSecurity.com
EBOOK: While security tech is evolving, so are the threats. Current IT staffs are feeling overwhelmed and some experts believe AI is the answer. Gartner, however, claims that AI will never be perfect, and SIEM will always need a human touch. In this e-book, look at current SIEM tools, future tech and how to prepare for what’s ahead.
Posted: 06 Jan 2020 | Published: 06 Jan 2020

SearchSecurity.com
51 - 75 of 1074 Matches Previous Page    1 2 3 4 5 6    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info