IT Management  >   Systems Operations  >   Security  >  

Cybersecurity

RSS Feed   
ALSO CALLED: Cyber Security, Cyber Security Enhancement Act of 2002
DEFINITION: Information assurance, including information security, information technology disaster recovery, and information privacy. See Section 225, Cyber Security Enhancement Act of 2002, of the Homeland Security Act.
Cybersecurity Reports
51 - 75 of 1124 Matches Previous Page  |  Next Page
The New Era of Personal Data Privacy Policy
sponsored by ServiceNow
EGUIDE: GDPR and CCPA are changing the way organizations can use customer data by giving the power back to the individual. In this e-guide, Dimitri Sirota, CEO and co-founder of BigID, addresses some of the key issues that organizations are facing in the era of data access rights. Read on to key into the insights of an industry expert.
Posted: 20 Nov 2019 | Published: 15 Nov 2019

ServiceNow

Tanium for IT Operations Management
sponsored by Tanium
DATA SHEET: According to Forrester, 74% of organizations state that the number of endpoint tools they have limits their effectiveness. Patchwork point services are disparate and incomplete in their visibility. In this solution brief, dive deeper into the pains of legacy point services and explore Tanium’s Operations Suite. Read on to learn more.
Posted: 20 Nov 2019 | Published: 20 Nov 2019

Tanium

Tanium for IT Asset Visibility: Optimize Resource Utilization
sponsored by Tanium
DATA SHEET: With 68%of enterprises getting at least 1 software audit request annually, asset visibility and management is more critical than ever. In this solution brief, explore the importance of asset management, and discover Tanium’s platform for IT asset visibility. Read on to get started.
Posted: 20 Nov 2019 | Published: 20 Nov 2019

Tanium

FedRAMP ATO on AWS in Half the Time with Automation – A Customer Story
sponsored by AWS - Coalfire
WEBCAST: Hear how automation methodology, pioneered by Coalfire and AWS, enabled Innovest Systems to be FedRAMP assessment ready in less than six months, allowing the company to quickly unlock new government revenue streams. Continue reading to uncover the key takeaways.
Posted: 19 Nov 2019 | Premiered: Nov 19, 2019

AWS - Coalfire

Accelerating the Journey to Passwordless Authentication
sponsored by IBM
WHITE PAPER: A recent study conducted by EMA found that while over 90% of organizations experienced a password policy violation over the past year, a vast majority continued to rely on traditional passwords. Read on to understand some of the vulnerabilities of traditional passwords and uncover sustainable, secure alternatives.
Posted: 19 Nov 2019 | Published: 31 Jul 2019

IBM

Preparing for CCPA Compliance
sponsored by Namogoo
EBOOK: Given the financial and reputational damage of failing to comply with data privacy laws, preparation for the CCPA should be the top priority at any company, regardless of where they are based. In this e-book, explore the components of CCPA, how it compares to GDPR, and 7 steps to CCPA compliance. Read on to prepare your business for 2020.
Posted: 19 Nov 2019 | Published: 19 Nov 2019

Namogoo

Online Privacy in a World of Third-Party Services
sponsored by Namogoo
EBOOK: As companies continue to rely on third-party services to enhance the experience of their websites, they risk increasing the vulnerability of customer data. In this e-book, discover the benefits of third-party software, how it works, and why it’s critical to take appropriate security measures when considering a vendor. Read on to learn more.
Posted: 19 Nov 2019 | Published: 19 Nov 2019

Namogoo

Driving IT Hygiene with Tanium
sponsored by Tanium
DATA SHEET: Improving IT Hygiene means creating a process to continuously identify assets, risks, and vulnerabilities across an environment and fixing them with speed at scale. In this solution brief, uncover the fundamental aspects of better IT Hygiene and explore Tanium’s IT Hygiene Platform. Read on to learn more.
Posted: 18 Nov 2019 | Published: 18 Nov 2019

Tanium

Whirlpool Corporation Takes Tanium Out for a Spin
sponsored by Tanium
CASE STUDY: In this case study, discover how Whirlpool leveraged the Tanium platform to discover and act on IT challenges in order to improve their ‘security hygiene’ within their complex environment. Read on to learn more.
Posted: 18 Nov 2019 | Published: 18 Nov 2019

Tanium

Q3, 2019 Cyber Threats and Trends Report
sponsored by Neustar
WHITE PAPER: Comparing Q3, 2019 to Q3, 2018, the volume of cyberattacks has increased by 241%, with the average attack size decreasing by 28%. As the cyberattacks constantly change, it’s critical for businesses to stay informed. In this report, uncover cybersecurity threats and trends of Q3, 2019 and unlock insights to better prepare yourself for Q4.
Posted: 18 Nov 2019 | Published: 13 Nov 2019

Neustar

Claroty Continuous Threat Detection Demo
sponsored by Claroty
WEBCAST: Continuous threat detection (CTD) allows for efficient security with minimal complexity compared to traditional threat detection tools. In this webinar, IT leaders at Claroty discuss the importance of total visibility for data acquisition and provide an in-depth demo of their new dashboard. Continue to watch the demo.
Posted: 18 Nov 2019 | Premiered: Nov 18, 2019

Claroty

How Barclays Improved IT Security with the Tanium Communications Architecture
sponsored by Tanium
CASE STUDY: Global banks face increasing regulatory pressure, and Barclays, with over 300,000 endpoints across 40 countries, is no exception. Barclays needed a way to unify these endpoints and speed up incident response time. In this case study, follow Barclays’ IT security journey.
Posted: 18 Nov 2019 | Published: 18 Nov 2019

Tanium

Computer Weekly - 19 November 2019: Is facial recognition happening too fast?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, as the Information Commissioner calls on police forces to slow down the introduction of facial recognition, we examine the issues. We look at what the use of DevOps methods means for storage strategy. And we talk to Microsoft's global cyber security chief. Read the issue now.
Posted: 15 Nov 2019 | Published: 19 Nov 2019

ComputerWeekly.com

Tanium for Detection and Response: Effectively Address and Remediate Incidents
sponsored by Tanium
WHITE PAPER: Endpoint detection response (EDR) tool effectiveness can be measured by 3 key attributes: the scope of data it provides, its performance and scalability, and its flexibility. In this solution brief, dive deeper into each of the features that distinguish effective EDR tools. Continue reading to learn more.
Posted: 15 Nov 2019 | Published: 15 Nov 2019

Tanium

IBM QRadar On Cloud
sponsored by IBM
DATA SHEET: Companies are looking to outsource their cybersecurity environments in favor of cloud-based application. In this guidebook from Nucleus Research, uncover the challenges faced by security leaders and go in-depth into the benefits of IBM QRadar on Cloud (QRoC), a SIEM-as-a-service offering.
Posted: 15 Nov 2019 | Published: 31 Jul 2019

IBM

How to Address Privacy Regulations and Keep Your Data Safe
sponsored by IBM
WHITE PAPER: This white paper will provide a high-level overview of key data privacy trends and regulations — both current and soon-to-be enacted — along with conceptual frameworks organizations can reference to begin addressing these changes
Posted: 15 Nov 2019 | Published: 15 Nov 2019

IBM

Transforming Cybersecurity Strategy for the Age of IoT
sponsored by Forescout
WHITE PAPER: In a recent study, the Forescout Research Team looks to better understand the current risks and threats by looking at the IoT in a smart building. The report outlines 3 strategies an attacker might use and discusses ways to mitigate them. Read on to dive deeper into the key findings.
Posted: 15 Nov 2019 | Published: 15 Nov 2019

Forescout

Define Your Role
sponsored by SentinelOne
EBOOK: To be a successful CISO is to think on a tactical level, balancing day-to-day security concerns with long-term projects to position your organizations to handle future threats. In this e-book, discover the 12 fundamental questions CISOs should be asking themselves on a frequent basis to help define their role.
Posted: 15 Nov 2019 | Published: 15 Nov 2019

SentinelOne

Top 5 Myths About SIEM
sponsored by IBM
WHITE PAPER: Traditionally, SIEM solutions were complex and targeted towards larger organizations. But with the need for security solutions ever-increasing, progressive SIEM vendors cater to businesses of all sizes.In this white paper, uncover the top 5 myths about SIEM and what organizations should expect from SIEM today. Read on to learn more.
Posted: 15 Nov 2019 | Published: 15 Nov 2019

IBM

The Secrets of Evaluating Security Products
sponsored by SentinelOne
EBOOK: Prioritizing security and choosing the right tools is critical for business to maintain their IT environments. This e-book goes in-depth into the trends and challenges of cybersecurity, as well as criteria for evaluating security tools. Read on to learn more.
Posted: 15 Nov 2019 | Published: 31 Aug 2019

SentinelOne

Tricks of the Storage Trade: How to Build an Effective Cyber Resilience Strategy
sponsored by IBM
EBOOK: Download this e-book for an insider look at today’s threat landscape, tactical instruction on how to establish a robust cyber resilience strategy, and to examine the critical role the storage infrastructure plays in this process.
Posted: 15 Nov 2019 | Published: 15 Nov 2019

IBM

IBM Identity and Access Management Services: Costs and Benefits
sponsored by IBM
WHITE PAPER: Forrester recently partnered with IBM in a study designed to better understand the benefits, costs, and risks associated with identity-as-a-service (IDaaS), a cloud-based IAM deployment method. Read on to uncover the key findings from this study.
Posted: 14 Nov 2019 | Published: 30 Jun 2019

IBM

Worldwide Security Information and Event Management Market Shares
sponsored by Splunk
ANALYST REPORT: According to IDC, the worldwide SIEM software market grew to $3.0 billion in 2018, a 12.4% increase year-over-year. The growth is a response to an organization's need to monitor, investigate and respond to security threats. Download the report to learn more and see what’s ahead for 2020.
Posted: 14 Nov 2019 | Published: 14 Nov 2019

Splunk

Access Management Vendors: Analyst Report
sponsored by IBM
RESOURCE: SaaS-delivered access management has become the norm, and vendors are including API capabilities for integrating authentication and authorization into applications and services. Gartner recently published a Magic Quadrant report for Access Management, which evaluates and compares various AM providers. Read on to learn more.
Posted: 14 Nov 2019 | Published: 12 Aug 2019

IBM

Passive Isn’t Good Enough: Moving into Active EDR
sponsored by SentinelOne
WHITE PAPER: As cyberattacks continue to grow in volume and complexity, it’s become more critical than ever for businesses to deploy active endpoint detection and response (EDR) to provide scalability and security to their various endpoints. This whitepaper discusses the differences and benefits of various EDR methods, read on to learn more.
Posted: 14 Nov 2019 | Published: 31 May 2019

SentinelOne
51 - 75 of 1124 Matches Previous Page    1 2 3 4 5 6    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement