Internet Security Threats White Papers

(View All Report Types)
Security Intelligence Is the Smart Way to Keep the Cloud Safe
sponsored by IBM
WHITE PAPER: Find out how an integrated IBM suite of intelligence solutions consolidates and analyzes data from across the cloud to provide organizations with visibility and control, to help better secure cloud environments.
Posted: 08 Oct 2014 | Published: 31 Oct 2013

IBM

Ponemon - Costs and Consequences of Gaps in Vulnerability Response
sponsored by ServiceNow
WHITE PAPER: Ponemon Institute surveyed almost 3,000 IT security professionals across the globe to understand how organizations are responding to vulnerabilities. This paper presents the findings of the most recent report and compares it to the 2018 study – read on for the complete results.
Posted: 08 Feb 2021 | Published: 06 Aug 2020

ServiceNow

Respect User Privacy While Securing the Cloud and Mobile Devices
sponsored by BitGlass
WHITE PAPER: This white paper offers a security solution that improves visibility and analytics capabilities across disparate mobile devices and cloud applications.
Posted: 20 Jun 2014 | Published: 20 Jun 2014

BitGlass

IDC 2014 WW MarketScape Report for Federated Identity Management and SSO
sponsored by IBM
WHITE PAPER: Find out how vendors fared in IDC's assessment of IAM offerings for federated identity management and single sign-on.
Posted: 08 Oct 2014 | Published: 31 Mar 2014

IBM

Virtualization Security Report: 10 Ways to Regain Control and Reduce Risk
sponsored by Citrix
WHITE PAPER: This resource highlights the top 10 benefits of adding desktop virtualization to information security strategies for an increasingly diverse and expansive IT environment.
Posted: 05 May 2014 | Published: 31 May 2013

Citrix

Preventing Dangerous File-Sharing
sponsored by Globalscape
WHITE PAPER: This resource offers 4 steps to help prevent employees from using unsecured consumer-grade file-sharing solutions.
Posted: 09 May 2014 | Published: 31 Dec 2013

Globalscape

Transferring Data without Secure Protocols?
sponsored by Globalscape
WHITE PAPER: This white paper outlines a solution that protects your data wherever it may be so that your users can remain productive.
Posted: 07 May 2014 | Published: 07 May 2014

Globalscape

Five Critical Steps to Achieving an Effective Application Security Program
sponsored by IBM
WHITE PAPER: Discover steps you can incorporate into every phase of the development process to improve your application security, and get an overview of application threats and the types of risks to prioritize and remediate.
Posted: 08 Oct 2014 | Published: 31 Dec 2013

IBM

Malware Analysts Have the Tools to Defend Against Cyber-Attacks, But Challenges Remain
sponsored by Threat Track Security
WHITE PAPER: This informative guide explores today's threat landscape, the role of malware and the threat of internal vulnerabilities.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

Threat Track Security

10 Essentials for Secure EMM
sponsored by Citrix
WHITE PAPER: This resource offers 10 key guidelines to securing mobile strategies so that organizations are confident in their defenses against theft and loss while users are satisfied with performance.
Posted: 09 May 2014 | Published: 01 Jun 2014

Citrix