Standards  >   Security Standards  >  

Wired Equivalent Privacy

RSS Feed   
Wired Equivalent Privacy Reports
 
Best Practices in Authentication and Access Control
sponsored by Nevis Networks
WHITE PAPER: Read this white paper and learn how the right LAN security solution can streamline user authentication for both wired and wireless LANs.
Posted: 13 Aug 2007 | Published: 01 Aug 2007

Nevis Networks

The Healthcare Cybersecurity Checklist
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: According to the Ponemon Institute, the average cost of a data breach in the healthcare sector is $6.5 million. For these organizations, cybersecurity is a top priority – especially when it comes to meeting HIPAA compliance requirements. Use the following checklist to develop your cybersecurity strategy, step by step.
Posted: 28 Aug 2020 | Published: 28 Aug 2020

Arctic Wolf Networks, Inc.

Endpoint Detection and Response
sponsored by Claranet
VIDEO: In this 6-minute webinar, tune into a discussion about the evolution of endpoint detection and response (EDR) – from niche monitoring tool to a staple for overworked IT and security teams.
Posted: 21 Aug 2020 | Premiered: 21 Aug 2020

Claranet

Measuring and Improving Cyber Defense Using the MITRE ATT&CK Framework
sponsored by ThreatQuotient
WHITE PAPER: For the past 5 years, the MITRE ATT&CK project has grown into a cybersecurity staple – organizations and their security teams are adopting ATT&CK frameworks with blinding speed (and for good reason). Read this SANS paper to learn more about MITRE ATT&CK and discover why its popularity has skyrocketed.
Posted: 18 Sep 2020 | Published: 31 Jul 2020

ThreatQuotient

Outbound Email Security Essentials
sponsored by Zivver
WHITE PAPER: As email grows in importance as a communication tool, it becomes an increasingly attractive target for cybercriminals – and protecting inboxes becomes more critical than ever. Read this white paper to discover the essentials of email security and ensure your organization is equipped to handle today’s threats.
Posted: 21 Aug 2020 | Published: 21 Aug 2020

Zivver

Trend Micro Vulnerability Protection Overview
sponsored by Trend Micro
WHITE PAPER: This document outlines the process behind IDS/IPS rule creation and answers common questions about vulnerability coverage and security controls across Trend Micro’s various offerings. Read on to learn more about rule creation, quality assurance testing, hybrid cloud workload security, and more.
Posted: 11 Sep 2020 | Published: 30 Jun 2020

Trend Micro

Covid-19 & the New Normal for E-commerce
sponsored by Tala Security
WHITE PAPER: While online shopping has increased dramatically since the beginning of the pandemic, so too have threats targeting shoppers and other users. In fact, Magecart attacks have increased by 20%. Read on to explore how COVID-19 is shifting the e-commerce landscape and discover the long-term implications of these changes.
Posted: 20 Aug 2020 | Published: 20 Aug 2020

Tala Security

Are All SD-WANs Created Equal? The Benefits of a MEF-Certified SD-WAN
sponsored by Comcast Business
RESOURCE: There are roughly 70 available SD-WAN options on the market, and enterprises are looking for a way to determine which of them will meet their networking use case and service resiliency requirements. Fortunately, the Metro Ethernet Foundation is able to provide a global standard for SD-WAN offerings. Read this article to learn more.
Posted: 09 Sep 2020 | Published: 18 Mar 2020

Comcast Business

The FedRAMP Journey
sponsored by AWS - Anitian
PRODUCT OVERVIEW: The Federal Risk and Authorization Management Program (FedRAMP) is traditionally a complex process requiring time and resources. The following solution brief takes a closer look at the Anitian Compliance Automation Platform, designed to reduce the costs and complexity when it comes to FedRAMP readiness.
Posted: 13 Aug 2020 | Published: 13 Aug 2020


Qorus Software Uses Hyperproof to Gain Control Over Its Compliance Program
sponsored by Hyperproof
CASE STUDY: In this case study, follow Qorus, a sales enablement and proposal management provider, as they partner with Hyperproof to address security and compliance issues and achieve flexibility that scales as the organization grows.
Posted: 11 Sep 2020 | Published: 11 Sep 2020

Hyperproof
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info