NIST Reports

The Modern Security Threat and Regulatory Compliance
sponsored by Bytware, Inc.
WEBCAST: SOX-style legislation and the evolving threat from viruses is challenging the ability of IT management to keep up with security requirements. This webcast explains why so many systems are at risk and what you can do to mitigate these threats.
Posted: 29 Sep 2008 | Premiered: Sep 29, 2008

Bytware, Inc.

Infographic: Who needs to be on your digital transformation team?
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Assembling the right team for a digital transformation project is critical. Transformation is a team sport - it requires experience, knowledge and the ability to influence and work with others. In this infographic, we help you figure out who needs to be on your digital transformation team and what are the key skills for each team member.
Posted: 18 Jan 2022 | Published: 18 Jan 2022

TechTarget ComputerWeekly.com

Deploy Real-time Operational Detection and Prevention to Combat Various Threats and Fraud.
sponsored by IBM Software Group
WHITE PAPER: When you understand people and their names in context and in real time, you have an increased capability to preempt threats and fraud. Find out what you can do to help protect your business.
Posted: 13 Mar 2008 | Published: 01 Jan 2007

IBM Software Group

Optimizing the PC Segment of California's IT Infrastructure
sponsored by Intel Corporation
CASE STUDY: Researchers found that by creating a dynamic IT environment- standardized, centralized, automated, and mobile-California can achieve a greener, more secure computing complex that improves productivity, delivering greater efficiency at a lower cost to taxpayers and the environment.
Posted: 27 May 2009 | Published: 27 May 2009

Intel Corporation

Into the Future: The Fast Track for Financial Markets
sponsored by IBM Line of Business
WHITE PAPER: This paper explores how high performance computing solutions from IBM can enable high-velocity financial analytics and trading.
Posted: 17 Jun 2008 | Published: 01 Sep 2007

IBM Line of Business

Critical Technologies for Compliance and Risk Management
sponsored by Siperian, Inc.
WHITE PAPER: Due to the financial meltdown in the mortgage-backed securities industry, new compliance requirements will be implemented. Read this paper to find out how organizations can ensure compliance with stricter regulations and manage risk appropriately so the business does not slip into non-compliance resulting in negative publicity or punitive fines.
Posted: 20 Feb 2009 | Published: 20 Feb 2009

Siperian, Inc.

Implementing the NIST Cybersecurity Framework
sponsored by Hughes Network Systems
BLOG: The NIST Cybersecurity Framework helps organizations manage cyber risk. Hughes aligns its solutions to the framework's core functions. Learn how Hughes can help your business implement the NIST framework to protect your network and data.
Posted: 03 Dec 2024 | Published: 09 Aug 2024

Hughes Network Systems

Implementing the NIST Cybersecurity Framework
sponsored by Hughes Network Systems
BLOG: The NIST Cybersecurity Framework helps organizations manage cyber risk. Hughes aligns its solutions to the framework's core functions. Learn how Hughes can help your business implement the NIST framework to protect your network and data.
Posted: 08 Aug 2024 | Published: 09 Aug 2024

Hughes Network Systems

Cybersecurity standards in action: NIST and Nokia's guide for telcos
sponsored by NOKIA
WEBCAST: In today's ever-evolving cybersecurity landscape, standards and regulations are necessary to keep everything from falling apart. But what exactly do these standards do, especially in the communication service industry? Tune into this webinar to learn more.
Posted: 23 Nov 2024 | Premiered: Oct 3, 2024

NOKIA

Cybersecurity standards in action: NIST and Nokia’s guide for telcos
sponsored by NOKIA
WEBCAST: In today’s ever-evolving cybersecurity landscape, standards and regulations are necessary to keep everything from falling apart. But what exactly do these standards do, especially in the communication service industry? Tune into this webinar to learn more.
Posted: 03 Oct 2024 | Premiered: Oct 3, 2024

NOKIA

AppSec Solution Guide for Complying with New NIST SP 800-53 IAST and RASP Requirements
sponsored by Contrast Security
WHITE PAPER: The new NIST Cybersecurity Framework now requires interactive application security testing (IAST) and runtime application self-protection (RASP) to improve DevSecOps efficiency and reduce security risks. Learn how these technologies can help your organization comply with the latest NIST guidelines in this detailed white paper.
Posted: 11 Sep 2024 | Published: 11 Sep 2024

Contrast Security

AppSec Solution Guide for Complying with New NIST SP 800-53 IAST and RASP Requirements
sponsored by Contrast Security
WHITE PAPER: The new NIST Cybersecurity Framework now requires interactive application security testing (IAST) and runtime application self-protection (RASP) to improve DevSecOps efficiency and reduce security risks. Learn how these technologies can help your organization comply with the latest NIST guidelines in this detailed white paper.
Posted: 18 Dec 2024 | Published: 18 Dec 2024

Contrast Security

Enhancing Healthcare Security: NIST Framework and Health Breach Notification Rule
sponsored by XtelligentMedia Healthcare
EGUIDE: The collection of best practices and standards found in the NIST Cybersecurity Framework can help healthcare organizations improve their overall security postures.Vendors of personal health records, including health apps and other non-HIPAA-covered businesses, are subject to the Federal Trade Commission's Health Breach Notification Rule.
Posted: 23 Jul 2024 | Published: 23 Jul 2024

XtelligentMedia Healthcare

Application Detection and Response (ADR): Helping SecOps teams address NIST CSF
sponsored by Contrast Security
INFOGRAPHIC: This infographic explores how Application Detection and Response (ADR) can help security operations centers (SOCs) address the NIST Cybersecurity Framework, extending visibility into the application and API layer to identify and mitigate threats. Read the full infographic to learn more.
Posted: 14 Nov 2024 | Published: 15 Nov 2024

Contrast Security

Secure Software Development Environments
sponsored by Zentera Systems Inc.
PRODUCT OVERVIEW: Secure software development environments are critical to prevent supply chain attacks. This solution brief outlines how Zentera's CoIP Platform can help organizations achieve NIST SP800-218 compliance while maintaining developer productivity through a zero trust architecture. Read the full solution brief to learn more.
Posted: 13 Sep 2024 | Published: 13 Sep 2024

Zentera Systems Inc.

Building a Cyberresilient Data Recovery Strategy
sponsored by Veeam Software
WHITE PAPER: Building a holistic cybersecurity program can be complex and multifaceted, but organizations that leverage frameworks such as the NIST Cybersecurity Framework 2.0, can better establish standards, guidelines and best practices to manage their cybersecurity risk. Read this new white paper and learn how.
Posted: 17 Oct 2024 | Published: 18 Oct 2024

TOPICS:  .NET
Veeam Software

Endace Video 12
sponsored by Endace
WEBCAST: In his conversation with Endace’s Michael Morris, NIST Fellow Ron Ross shares his thoughts on how cybersecurity standards are evolving with modern threat challenges. Watch now to access his insights.
Posted: 21 Mar 2023 | Premiered: Mar 21, 2023

TOPICS:  .NET
Endace

How Endpoint Privilege Management Fulfills Federal Mandates
sponsored by Merlin International
WHITE PAPER: Endpoint privilege management is crucial for federal agencies to fulfill security mandates and defend against sophisticated cyberattacks. This whitepaper explores how CyberArk Endpoint Privilege Manager can help agencies meet Zero Trust requirements, prevent privilege escalation, and reduce ransomware risks. Read the whitepaper to learn more.
Posted: 11 Oct 2024 | Published: 11 Oct 2024

Merlin International

Mastering Cilium for Kubernetes Compliance
sponsored by Cisco
EBOOK: Cilium simplifies Kubernetes compliance with advanced networking, security, and observability features. Learn how Cilium addresses NIST 800-53 and 800-190 controls for access control, auditing, and incident response in this white paper.
Posted: 07 Dec 2024 | Published: 07 Dec 2024

Cisco

CoIP® Platform Zero Trust Architecture
sponsored by Zentera Systems Inc.
WHITE PAPER: Zentera's CoIP Platform provides a comprehensive Zero Trust security overlay that can be rapidly deployed without modifying existing network infrastructure. Learn how CoIP Platform maps to the NIST SP 800-207 Zero Trust Architecture guidelines in this white paper.
Posted: 13 Sep 2024 | Published: 13 Sep 2024

Zentera Systems Inc.

Using PAM for Compliance
sponsored by One Identity
WHITE PAPER: Privileged Access Management (PAM) is essential for compliance with major regulations like PCI DSS, HIPAA, and NIST. This white paper explores how PAM helps organizations meet security and access control requirements across various compliance frameworks. Read the full white paper to learn more.
Posted: 29 Oct 2024 | Published: 29 Oct 2024

One Identity

Achieve Quantum Resistance with Utimaco
sponsored by Utimaco
PRODUCT OVERVIEW: Utimaco's u.trust General Purpose HSM Se-Series offers quantum-resistant cryptography to secure your infrastructure. Upgrade with Quantum Protect firmware that includes NIST-recommended post-quantum algorithms. Evaluate performance with the free PQC simulator. Read the full product overview to prepare for the quantum future.
Posted: 21 Jun 2024 | Published: 21 Jun 2024

Utimaco

Security by design: How Verizon approaches 5G security.
sponsored by Verizon
WHITE PAPER: As 5G enables new capabilities, security is a key design feature. This white paper examines Verizon's approach to 5G security, including enhancements over 4G, private 5G networks, and alignment with CISA guidelines. Read the full white paper to learn how Verizon is securing 5G for public and private sector organizations.
Posted: 19 Nov 2024 | Published: 20 Nov 2024

Verizon

A Partner in Your Zero Trust Journey
sponsored by Merlin International
PRODUCT OVERVIEW: Merlin Cyber's Zero Trust Assessment helps federal agencies evaluate their Zero Trust maturity and develop an actionable plan to achieve their Zero Trust goals. Learn how Merlin Cyber can guide your agency's Zero Trust journey - read the full content.
Posted: 03 Oct 2024 | Published: 04 Oct 2024

Merlin International

A Practical Guide to Zero Trust Implementation in Multicloud Environments
sponsored by Connections
EBOOK: Explore a practical guide to implementing a Zero Trust architecture in multicloud environments. Learn how to progress your Zero Trust maturity, select the right technologies, and work with a trusted partner. Read the full e-book to secure your modern IT ecosystem.
Posted: 19 Sep 2024 | Published: 20 Sep 2024

Connections

The Value of Runtime Application with Self-Protection
sponsored by Contrast Security
PRODUCT OVERVIEW: Traditional application security solutions lack visibility into runtime vulnerabilities, leading to ineffective threat detection and high false positives. Contrast Protect runtime application self-protection (RASP) provides accurate, embedded protection that reduces operational burden on security teams. Read the solution brief to learn more.
Posted: 09 Jul 2024 | Published: 09 Jul 2024

Contrast Security

The Value of Runtime Application with Self-Protection
sponsored by Contrast Security
PRODUCT OVERVIEW: Traditional application security solutions lack visibility into runtime vulnerabilities, leading to ineffective threat detection and high false positives. Contrast Protect runtime application self-protection (RASP) provides accurate, embedded protection that reduces operational burden on security teams. Read the solution brief to learn more.
Posted: 18 Dec 2024 | Published: 18 Dec 2024

Contrast Security

Future-Proof Your Security: Quantum Computing and PQC with Utimaco
sponsored by Utimaco
ANALYST REPORT: Frost & Sullivan names Utimaco a Competitive Strategy Leader in post-quantum cryptography. Utimaco's expertise in deploying hardware security modules positions it as a key partner for organizations migrating to quantum-resistant algorithms. Read the full analyst report to learn more.
Posted: 16 Dec 2024 | Published: 17 Dec 2024

Utimaco

Zero Trust, Simplified Benefits of the CoIP® Platform Overlay
sponsored by Zentera Systems Inc.
WHITE PAPER: Explore the simplified benefits of Zentera's CoIP Platform for implementing a robust Zero Trust architecture. Learn how this software-defined approach can reduce your attack surface, enable rapid compliance, and avoid costly infrastructure changes. Read the white paper to get started.
Posted: 13 Sep 2024 | Published: 13 Sep 2024

Zentera Systems Inc.

Secure Contractor and Vendor Access
sponsored by Zentera Systems Inc.
PRODUCT OVERVIEW: This solution brief explores how Zentera's CoIP Platform can provide secure, VPN-free access for contractors and vendors to enterprise applications, with granular access controls and micro-segmentation based on user identity and roles. Learn how to establish a high-security environment for sensitive content access. Read the full solution brief.
Posted: 13 Sep 2024 | Published: 13 Sep 2024

Zentera Systems Inc.

Domain Name System (DNS) Security
sponsored by Cisco
GARTNER RESEARCH REPORT: SRM leaders must fully understand the FedRAMP program, its security levels, and the authorization process to make informed cloud security decisions. Verify CSP FedRAMP status and ask probing questions. Remember that using a FedRAMP-authorized cloud does not absolve security responsibilities. Read the full Gartner Research Report to learn more.
Posted: 07 Sep 2024 | Published: 07 Sep 2024

Cisco