NIST Reports

The Modern Security Threat and Regulatory Compliance
sponsored by Bytware, Inc.
WEBCAST: SOX-style legislation and the evolving threat from viruses is challenging the ability of IT management to keep up with security requirements. This webcast explains why so many systems are at risk and what you can do to mitigate these threats.
Posted: 29 Sep 2008 | Premiered: Sep 29, 2008

Bytware, Inc.

Infographic: Who needs to be on your digital transformation team?
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Assembling the right team for a digital transformation project is critical. Transformation is a team sport - it requires experience, knowledge and the ability to influence and work with others. In this infographic, we help you figure out who needs to be on your digital transformation team and what are the key skills for each team member.
Posted: 18 Jan 2022 | Published: 18 Jan 2022

TechTarget ComputerWeekly.com

Into the Future: The Fast Track for Financial Markets
sponsored by IBM Line of Business
WHITE PAPER: This paper explores how high performance computing solutions from IBM can enable high-velocity financial analytics and trading.
Posted: 17 Jun 2008 | Published: 01 Sep 2007

IBM Line of Business

Critical Technologies for Compliance and Risk Management
sponsored by Siperian, Inc.
WHITE PAPER: Due to the financial meltdown in the mortgage-backed securities industry, new compliance requirements will be implemented. Read this paper to find out how organizations can ensure compliance with stricter regulations and manage risk appropriately so the business does not slip into non-compliance resulting in negative publicity or punitive fines.
Posted: 20 Feb 2009 | Published: 20 Feb 2009

Siperian, Inc.

Optimizing the PC Segment of California's IT Infrastructure
sponsored by Intel Corporation
CASE STUDY: Researchers found that by creating a dynamic IT environment- standardized, centralized, automated, and mobile-California can achieve a greener, more secure computing complex that improves productivity, delivering greater efficiency at a lower cost to taxpayers and the environment.
Posted: 27 May 2009 | Published: 27 May 2009

Intel Corporation

Deploy Real-time Operational Detection and Prevention to Combat Various Threats and Fraud.
sponsored by IBM Software Group
WHITE PAPER: When you understand people and their names in context and in real time, you have an increased capability to preempt threats and fraud. Find out what you can do to help protect your business.
Posted: 13 Mar 2008 | Published: 01 Jan 2007

IBM Software Group

Implementing the NIST Cybersecurity Framework
sponsored by Hughes Network Systems
BLOG: The NIST Cybersecurity Framework helps organizations manage cyber risk. Hughes aligns its solutions to the framework's core functions. Learn how Hughes can help your business implement the NIST framework to protect your network and data.
Posted: 03 Dec 2024 | Published: 09 Aug 2024

Hughes Network Systems

Cybersecurity standards in action: NIST and Nokia's guide for telcos
sponsored by NOKIA Intel
WEBCAST: In today's ever-evolving cybersecurity landscape, standards and regulations are necessary to keep everything from falling apart. But what exactly do these standards do, especially in the communication service industry? Tune into this webinar to learn more.
Posted: 23 Nov 2024 | Premiered: Oct 3, 2024

NOKIA Intel

Empowering Your Cyber Defense: Key Insights into the Latest NIST CSF Update
sponsored by OneTrust
WEBCAST: In this webcast, you’ll gain key insights into the latest NIST CSF updates and find out how you can leverage the framework to bolster cybersecurity for your organization. Tune in now to unlock best practices for elevating your cyber defense.
Posted: 18 Sep 2024 | Premiered: Sep 18, 2024

TOPICS:  .NET
OneTrust

Enhancing Healthcare Security: NIST Framework and Health Breach Notification Rule
sponsored by XtelligentMedia Healthcare
EGUIDE: The collection of best practices and standards found in the NIST Cybersecurity Framework can help healthcare organizations improve their overall security postures.Vendors of personal health records, including health apps and other non-HIPAA-covered businesses, are subject to the Federal Trade Commission's Health Breach Notification Rule.
Posted: 23 Jul 2024 | Published: 23 Jul 2024

XtelligentMedia Healthcare

AppSec Solution Guide for Complying with New NIST SP 800-53 IAST and RASP Requirements
sponsored by Contrast Security
WHITE PAPER: The new NIST Cybersecurity Framework now requires interactive application security testing (IAST) and runtime application self-protection (RASP) to improve DevSecOps efficiency and reduce security risks. Learn how these technologies can help your organization comply with the latest NIST guidelines in this detailed white paper.
Posted: 18 Dec 2024 | Published: 18 Dec 2024

Contrast Security

AppSec Solution Guide for Complying with New NIST SP 800-53 IAST and RASP Requirements
sponsored by Contrast Security
WHITE PAPER: The new NIST Cybersecurity Framework now requires interactive application security testing (IAST) and runtime application self-protection (RASP) to improve DevSecOps efficiency and reduce security risks. Learn how these technologies can help your organization comply with the latest NIST guidelines in this detailed white paper.
Posted: 11 Sep 2024 | Published: 11 Sep 2024

Contrast Security

Addressing the NIST Cybersecurity Framework 2.0 with the CyberArk Identity Security Platform
sponsored by CyberArk
WHITE PAPER: Enjoy an overview of the NIST Cybersecurity Framework 2.0, a framework for managing and mitigating cybersecurity risk. Learn how CyberArk's Identity Security Platform can help organizations comply with various subcategories of the framework, by offering solutions for identity security.
Posted: 23 Aug 2024 | Published: 23 Aug 2024

TOPICS:  .NET
CyberArk

Application Detection and Response (ADR): Helping SecOps teams address NIST CSF
sponsored by Contrast Security
INFOGRAPHIC: This infographic explores how Application Detection and Response (ADR) can help security operations centers (SOCs) address the NIST Cybersecurity Framework, extending visibility into the application and API layer to identify and mitigate threats. Read the full infographic to learn more.
Posted: 14 Nov 2024 | Published: 15 Nov 2024

Contrast Security

How MSPs can Implement Compliance Mandated Access Management Controls
sponsored by CyberQP
WHITE PAPER: Explore how MSPs can secure admin accounts and customer identities to meet NIST and CMMC compliance requirements. Learn about privileged access management, password updates, and other best practices to protect your environment. Read the full white paper for more insights.
Posted: 03 Jan 2025 | Published: 04 Jan 2025

CyberQP

Secure Software Development Environments
sponsored by Zentera Systems Inc.
PRODUCT OVERVIEW: Secure software development environments are critical to prevent supply chain attacks. This solution brief outlines how Zentera's CoIP Platform can help organizations achieve NIST SP800-218 compliance while maintaining developer productivity through a zero trust architecture. Read the full solution brief to learn more.
Posted: 13 Sep 2024 | Published: 13 Sep 2024

Zentera Systems Inc.

Building a Cyberresilient Data Recovery Strategy
sponsored by Veeam Software
WHITE PAPER: Building a holistic cybersecurity program can be complex and multifaceted, but organizations that leverage frameworks such as the NIST Cybersecurity Framework 2.0, can better establish standards, guidelines and best practices to manage their cybersecurity risk. Read this new white paper and learn how.
Posted: 17 Oct 2024 | Published: 18 Oct 2024

TOPICS:  .NET
Veeam Software

Endace Video 12
sponsored by Endace
WEBCAST: In his conversation with Endace’s Michael Morris, NIST Fellow Ron Ross shares his thoughts on how cybersecurity standards are evolving with modern threat challenges. Watch now to access his insights.
Posted: 21 Mar 2023 | Premiered: Mar 21, 2023

TOPICS:  .NET
Endace

Navigating the Compliance Labyrinth: Transform NIS2 & DORA Regulations into Strategic Advantages with SASE
sponsored by Open Systems
WHITE PAPER: This white paper explores transforming NIS2 and DORA regulations into strategic advantages with a managed SASE solution. It guides on benchmarking cybersecurity maturity, implementing robust security controls, and navigating the evolving regulatory landscape. Read the full white paper to strengthen your organization's digital resilience.
Posted: 19 Feb 2025 | Published: 19 Feb 2025

All resources sponsored by Open Systems

Preparing for the Quantum Era in Networking with Post-Quantum Cryptography
sponsored by Riverbed Technology, Inc.
WHITE PAPER: Quantum computing threatens cryptographic systems by potentially breaking encryption for data-in-transit and digital signatures. Post-quantum cryptography, including NIST algorithms like CRYSTALS-KYBER, offers protection against these threats. Read this white paper to learn how to implement quantum-resistant solutions.
Posted: 18 Mar 2025 | Published: 18 Mar 2025

Riverbed Technology, Inc.

CoIP® Platform Zero Trust Architecture
sponsored by Zentera Systems Inc.
WHITE PAPER: This white paper details how Zentera's CoIP Platform implements a NIST SP 800-207 Zero Trust Architecture. It discusses Virtual Chambers, access policies, and deployment models. Discover how CoIP can secure assets and modernize your security without major infrastructure changes. Read the full white paper.
Posted: 20 Mar 2025 | Published: 14 Feb 2025

Zentera Systems Inc.

Achieve Quantum Resistance with Utimaco
sponsored by Utimaco
PRODUCT OVERVIEW: Utimaco's u.trust General Purpose HSM Se-Series offers quantum-resistant cryptography to secure your infrastructure. Upgrade with Quantum Protect firmware that includes NIST-recommended post-quantum algorithms. Evaluate performance with the free PQC simulator. Read the full product overview to prepare for the quantum future.
Posted: 21 Jun 2024 | Published: 21 Jun 2024

Utimaco

Security by design: How Verizon approaches 5G security.
sponsored by Verizon
WHITE PAPER: As 5G enables new capabilities, security is a key design feature. This white paper examines Verizon's approach to 5G security, including enhancements over 4G, private 5G networks, and alignment with CISA guidelines. Read the full white paper to learn how Verizon is securing 5G for public and private sector organizations.
Posted: 19 Nov 2024 | Published: 20 Nov 2024

Verizon

Charting the Path to NIS2 Compliance
sponsored by Omada
WHITE PAPER: This white paper examines how the EU's NIS2 Directive impacts organizations and provides guidance on preparing for compliance. It highlights the role of identity governance in meeting NIS2 requirements around access control, risk management, and incident response. Read the full white paper to learn more.
Posted: 31 Jan 2025 | Published: 31 Jan 2025

All resources sponsored by Omada

A Practical Guide to Zero Trust Implementation in Multicloud Environments
sponsored by Connections
EBOOK: Explore a practical guide to implementing a Zero Trust architecture in multicloud environments. Learn how to progress your Zero Trust maturity, select the right technologies, and work with a trusted partner. Read the full e-book to secure your modern IT ecosystem.
Posted: 19 Sep 2024 | Published: 20 Sep 2024

Connections

Build a Solid Foundation for Password Protection
sponsored by SpecOps and Outpost24
VIDEO: Specops Password Auditor is a tool that scans Active Directory for password vulnerabilities, including leaked passwords and policy weaknesses. It provides detailed reports on user accounts, password policies, and compliance. Improve your organization's password security by identifying risks. Watch the video to start auditing today.
Posted: 14 Mar 2025 | Premiered: 14 Mar 2025

SpecOps and Outpost24

How to Build a Proactive Compliance Program with Identity Security
sponsored by CyberArk
EBOOK: This eBook reviews nearly 20 global regulations and frameworks, with details on their security-focused requirements. This includes:NIS2 directiveDORANIST Special Publication 800-207 on Zero Trust ArchitectureDownload the eBook and learn how you can streamline compliance initiatives.
Posted: 20 Dec 2024 | Published: 01 Jan 2025

TOPICS:  .NET
CyberArk

The Value of Runtime Application with Self-Protection
sponsored by Contrast Security
PRODUCT OVERVIEW: Traditional application security solutions lack visibility into runtime vulnerabilities, leading to ineffective threat detection and high false positives. Contrast Protect runtime application self-protection (RASP) provides accurate, embedded protection that reduces operational burden on security teams. Read the solution brief to learn more.
Posted: 09 Jul 2024 | Published: 09 Jul 2024

Contrast Security

The Value of Runtime Application with Self-Protection
sponsored by Contrast Security
PRODUCT OVERVIEW: Traditional application security solutions lack visibility into runtime vulnerabilities, leading to ineffective threat detection and high false positives. Contrast Protect runtime application self-protection (RASP) provides accurate, embedded protection that reduces operational burden on security teams. Read the solution brief to learn more.
Posted: 18 Dec 2024 | Published: 18 Dec 2024

Contrast Security

Future-Proof Your Security: Quantum Computing and PQC with Utimaco
sponsored by Utimaco
ANALYST REPORT: Frost & Sullivan names Utimaco a Competitive Strategy Leader in post-quantum cryptography. Utimaco's expertise in deploying hardware security modules positions it as a key partner for organizations migrating to quantum-resistant algorithms. Read the full analyst report to learn more.
Posted: 16 Dec 2024 | Published: 17 Dec 2024

Utimaco

Combating Cyber Attacks
sponsored by SpecOps and Outpost24
VIDEO: Specops Password Policy boosts Active Directory security by blocking over 4 billion compromised passwords. It simplifies compliance and reduces help desk tickets with user-friendly password guidance. Administrators can use GPOs to create detailed password policies, enhancing security. Discover how this tool reduces your attack surface.
Posted: 18 Mar 2025 | Premiered: 18 Mar 2025

SpecOps and Outpost24