IT Management  >   Systems Operations  >   Security  >  

Cybersecurity

RSS Feed   
ALSO CALLED: Cyber Security, Cyber Security Enhancement Act of 2002
DEFINITION: Information assurance, including information security, information technology disaster recovery, and information privacy. See Section 225, Cyber Security Enhancement Act of 2002, of the Homeland Security Act.
Cybersecurity Reports
76 - 100 of 1064 Matches Previous Page  |  Next Page
5 Considerations for Evaluating a Modern Enterprise Security Platform.
sponsored by Verizon
WHITE PAPER: Security teams will be stretched thin. The jobs they perform will become increasingly more complex given the continued proliferation of attacks. To meet these challenges, practitioners are considering new solutions and approaches. Download this white paper to explore 5 considerations for evaluating a modern enterprise security platform.
Posted: 03 Sep 2019 | Published: 28 Feb 2019

Verizon

Security, Compliance & ERP
sponsored by SAP
PODCAST: In this comprehensive podcast, explore key issues and trends impacting security and compliance within ERP systems. Learn about the importance of incorporating a strong role mapping security profile framework during your ERP deployment, and review other essential tips for improving security and compliance within your organization.
Posted: 03 Sep 2019 | Premiered: Sep 3, 2019

SAP

Are You Getting What You Were Promised?
sponsored by Cisco Umbrella
RESOURCE: Are you getting what you were promised? People make a lot of claim about network security but Cisco would rather show you proof. Download this infographic to learn about Cisco Umbrella including how it compares to other vendors and what Cisco customers are saying.
Posted: 30 Aug 2019 | Published: 30 Aug 2019

Cisco Umbrella

Insurer Prevents Losses from Fake Quotes
sponsored by Shape Security
CASE STUDY: A top 10 insurance company noticed higher than anticipated traffic on its quote generation application and was concerned that the unexpected volume was caused by a surge of automated traffic creating fake insurance quotes. In this case study, learn why the insurance company choose to implement Shape's Enterprise Defense to stop these attacks.
Posted: 30 Aug 2019 | Published: 30 Aug 2019

Shape Security

Cybersecurity Effectiveness Podcast: Raj Samani
sponsored by Verodin
PODCAST: In a security professional's career, a nearly perfect success rate can be quickly and detrimentally tarnished by one mistake that puts the company at risk. In this podcast, Raj Samani, Fellow and Chief Scientist at McAfee, shares his professional journey in security.
Posted: 29 Aug 2019 | Premiered: Aug 29, 2019

Verodin

The Cybersecurity Effectiveness Podcast: Bill Crowell
sponsored by Verodin
PODCAST: This podcast concentrates on the massive changes in cyberthreats over the last 15 years and how well the security industry has coped with those changes. Listen to Bill Crowell, who has a 57-year history in the Security and Intelligence world, and Brian Contos, CISO of Verodin, ransomware, DDoS attacks, APTs, and more.
Posted: 29 Aug 2019 | Premiered: Aug 29, 2019

Verodin

Gaining Visibility into Risk and the ROI of Your Security Program
sponsored by Verizon
ANALYST REPORT: To make informed decisions about risk tolerance and security spending, it is critical to gain insight into the effectiveness of your security architecture, the threat landscape, and vulnerabilities. Download this IDC research report to explore how organizations can evaluate their security programs in the broader context of business risk.
Posted: 29 Aug 2019 | Published: 31 Oct 2018

Verizon

A Look Inside Financially Motivated Attacks and the Active FIN8 Threat Group
sponsored by Gigamon
ANALYST REPORT: Download this report to explore a detailed view into the inner workings of financially motivated threat actor groups, including their preferred tactics and tools. Gaining an understanding of the anatomy of these attacks can help your team to improve visibility into the threats and expedite rapid detection and response.
Posted: 29 Aug 2019 | Published: 29 Aug 2019

Gigamon

The Role of Predictive Intelligence in the Fight Against Cyberattacks
sponsored by Cisco Umbrella
RESOURCE: Traditional threat intelligence is reactive, basing security on information gathered only after an attack is successfully carried out. Download this white paper to learn how a predictive intelligence can aid in the fight against cyberattacks.
Posted: 29 Aug 2019 | Published: 29 Aug 2019

Cisco Umbrella

Is Your Company In Peril If Critical Data Is Breached?
sponsored by IBM
ANALYST REPORT: Delegating data security to IT teams does not absolve the responsibility business leaders have to protect data. Forrester Consulting surveyed 150 IT, security, and risk decision makers and examined their approach to protecting their company's critical data. Download this report to explore key findings.
Posted: 29 Aug 2019 | Published: 29 Aug 2019

IBM

Cybersecurity Effectiveness Podcast: Terry Ray
sponsored by Verodin
PODCAST: According to Terry Ray, SVP, Fellow, and former CTO of Imperva, Inc., practices and safety around data privacy and the cloud, though slowly improving, still leave much to be desired. In this podcast, he and Brian Contos discuss the concept of absolute security.
Posted: 29 Aug 2019 | Premiered: Aug 29, 2019

Verodin

IAM: Managing identity remains key to cyber security
sponsored by ComputerWeekly.com
EGUIDE: IT and regulatory environments are changing rapidly driven by the EU's GDPR and digital transformation that is seeing accelerated adoption of cloud and IoT-based technologies, and while identity remains key to cyber security, organisations need to reassess and adapt their identity and access management (IAM) strategies accordingly.
Posted: 29 Aug 2019 | Published: 29 Aug 2019

ComputerWeekly.com

Webinar: Latest Fraud Schemes in Retail and Hospitality
sponsored by Shape Security
WEBCAST: Up to 99% of the traffic on retail and e-commerce login forms are due to account takeover (ATO) attempts. In this webinar, Shape Security's Threat Intel Analyst Smriti Kawal Jaggi will explain how attackers use both online and offline methods to target individuals and monetize successful ATOs.
Posted: 29 Aug 2019 | Premiered: Jul 31, 2019

Shape Security

Is Your Company In Peril If Critical Data Is Breached?
sponsored by IBM
ANALYST REPORT: Delegating data security to IT teams does not absolve the responsibility business leaders have to protect data. Forrester Consulting surveyed 150 IT, security, and risk decision makers and examined their approach to protecting their company's critical data. Download this report to explore key findings.
Posted: 28 Aug 2019 | Published: 31 Jan 2018

IBM

Cybersecurity Effectiveness Podcast: IJay Palansky
sponsored by Verodin
PODCAST: While appealing new gadgets and innovative products continue to hit the market, legal firms caution organizations about the risks of IoT devices. In this podcast, technology-focused trial litigator IJay Palansky forecasts the impending boom of cyber litigation in the coming years and provides recommendations for avoiding an attack.
Posted: 28 Aug 2019 | Premiered: Aug 28, 2019

Verodin

Cybersecurity Effectiveness Podcast: Mark Bagley
sponsored by Verodin
PODCAST: Cyber threat research is not all created equal – especially in the realm of security instrumentation. In this podcast, Mark Bagley, VP of Product at Verodin, highlights the core objectives of the Behavioral Research Team (BRT) and provides direction for scaling your organization's defenses with improved durability and efficiency in mind.
Posted: 28 Aug 2019 | Premiered: Aug 28, 2019

Verodin

Automating Cybercrime with Sentry MBA
sponsored by Shape Security
RESOURCE: Sentry MBA is an automated attack tool used by cybercriminals to take over user accounts on major websites. In this brief, gain a better understanding of how Sentry MBA works to help you defend against credential stuffing attacks.
Posted: 28 Aug 2019 | Published: 28 Aug 2019

Shape Security

Reactive Security Leaves You In The Dark
sponsored by Gigamon
WHITE PAPER: Download this white paper for ways to transform your security efforts advancing from a tactical approach of reacting to threats to a strategic approach that increases the efficiency and effectiveness of your cybersecurity defense.
Posted: 27 Aug 2019 | Published: 27 Aug 2019

Gigamon

Sailpoint Enabling and Securing Digital Identities
sponsored by SailPoint Technologies
VIDEO: SailPoint's open identity platform helps enterprises see everything, govern everything and empower everyone. Download this video to learn how SailPoint's identity platform helps enterprises enable their workforce by securing digital identities.
Posted: 27 Aug 2019 | Premiered: 27 Aug 2019

SailPoint Technologies

Beyond The Phish: 2019 Report
sponsored by Proofpoint
ANALYST REPORT: In Proofpoint's 2019 Beyond the Phish report, explore user knowledge of a broad range of best practices for cyberhygiene, security and compliance. The report analyses millions of responses gathered from their Security Education Platform.
Posted: 27 Aug 2019 | Published: 27 Aug 2019

Proofpoint

Do You Need a WAF, or Something Better than a WAF?
sponsored by Shape Security
RESOURCE: The security market is drifting away from the use of web application firewall (WAF) technology for a number of reasons. In this blog post, learn about Shape Security's new solution which is a distributed anti-automation service, fronted by machine learning and backed by specialist operators.
Posted: 27 Aug 2019 | Published: 01 May 2019

Shape Security

Top 5 Reasons to Put Privilege First
sponsored by CyberArk Software, Inc
WHITE PAPER: The reality is that no organization can ever fully secure all of their applications and infrastructure. Protection from all of the various methods that attackers may use is impossible; they will get in, it's what they do. In this white paper, learn why prioritizing privileged access should be at the core of every organization's strategy.
Posted: 27 Aug 2019 | Published: 27 Aug 2019

CyberArk Software, Inc

Change Assurance for Your Business-Critical Applications
sponsored by Onapsis
PRODUCT OVERVIEW: CIOs, CISOs and their teams often delay updating critical applications because of the potential impact on business operations. In this brief, learn about Change Assurance by Onapsis which offers a business application cyber resilience solution that allows you to detect any operational issues, protect against attacks, and enforce policies.
Posted: 27 Aug 2019 | Published: 27 Aug 2019

Onapsis

Security Analytics for Threat Detection and Breach Resolution in 2019
sponsored by Gigamon
ANALYST REPORT: While there is no security silver bullet, security analytics is a great step forward for any organization to improve its ability to detect threats. In this white paper, explore the top 4 considerations for investigating a security analytics tool.
Posted: 27 Aug 2019 | Published: 27 Aug 2019

Gigamon

Natural Language Understanding (NLU): A New Way to Fight Cyberattacks
sponsored by Armorblox
WEBCAST: In this webcast, listen as Garret Bekker from 451 Research and Anand Raghavan from Armorblox discuss the email threat landscape and how Armorblox leverages deep learning and natural language understanding to deliver more comprehensive and accurate data security.
Posted: 26 Aug 2019 | Premiered: Aug 26, 2019

Armorblox
76 - 100 of 1064 Matches Previous Page    2 3 4 5 6 7    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement