Tips on Managing the Deluge of Information Security Threat Reports
sponsored by TechTarget Security
EGUIDE:
Don't get overwhelmed by today's cyber-attacks: Access this expert e-guide to take advantage of threat report data and use it as actionable intelligence. Read on to discover the real impact of insider security threats.
Posted: 02 Dec 2013 | Published: 02 Dec 2013
|
|
|
Information Security ANZ March 2014
sponsored by TechTarget Security
EZINE:
This issue looks at the security challenges facing IT security professionals in the Australia/New Zealand region.
Posted: 18 Mar 2014 | Published: 18 Mar 2014
|
|
|
Detecting Sophisticated Online Attacks with Streaming Analytics
sponsored by EMC Corporation
WHITE PAPER:
Discover how RSA Web Threat Detection delivers actionable intelligence by leveraging big data to correlate anomalies and detect online threats in real time.
Posted: 13 Mar 2014 | Published: 31 Dec 2013
|
|
|
How Data Centers are Becoming Unwitting Accomplices in Advanced Cyber Attacks
sponsored by FireEye
WHITE PAPER:
This white paper explores the widening gap between the offensive capabilities of today's cyber attackers and the weak traditional defenses deployed in most data centers.
Posted: 10 Mar 2014 | Published: 31 Dec 2013
|
|
|
EFT Server to Replace USB for SCADA; EFT Server Enterprise Helps to Reduce Risks through Multi-Zone Architecture
sponsored by Globalscape
WHITE PAPER:
This whitepaper explains that USB drives have been used to transport viruses and malware, both on purpose and accidentally.
Posted: 06 Mar 2014 | Published: 31 Dec 2012
|
|
|
Defending Against Malware: A Holistic Approach to One of Today's Biggest IT Risks
sponsored by IBM
WHITE PAPER:
This white paper offers background on today's malware and its 4 predictable steps. Click through to discover a set of integrated solutions that offer improved visibility and defense to block advanced attacks.
Posted: 05 Mar 2014 | Published: 31 Jan 2014
|
|
|
Insider Edition: Antimalware Technologies and Techniques to the Rescue
sponsored by TechTarget Security
EZINE:
In this special edition of Information Security, our experts examine the recent advances in anti-malware detection and prevention, and which ones can tip the scale in your favor in the fight against malware.
Posted: 05 Mar 2014 | Published: 05 Mar 2014
|
|
|
The Definitive Guide to the Next Generation of Threat Protection
sponsored by FireEye
EBOOK:
This in-depth eBook examines the next generation of threat protection and provides key insights into critical topics, such as advanced persistent threats and zero-day attacks.
Posted: 04 Mar 2014 | Published: 31 Dec 2013
|
|
|
Symantec Intelligence Report - January 2014
sponsored by Symantec Corporation
WHITE PAPER:
This in-depth analysis explores the current threat landscape, the most common security threats, and how you can prevent them.
Posted: 03 Mar 2014 | Published: 31 Jan 2014
|
|
|
Advanced Attacks Require Federal Agencies to Reimagine IT Security
sponsored by FireEye
WHITE PAPER:
This guide outlines the malware "kill-chain" model used in many of today's cyber-attacks and how these can overwhelm traditional security tools.
Posted: 27 Feb 2014 | Published: 27 Feb 2014
|
|
|
Supply Chain Analysis: From Quartermaster to Sunshop
sponsored by FireEye
WHITE PAPER:
This in-depth guide explores the current threat landscape and the role of APTs. Read now for more information on how APTs are being used for wide-scale cybercrime campaigns.
Posted: 27 Feb 2014 | Published: 27 Feb 2014
|
|
|
Securing your Midsized Business
sponsored by IBM
WHITE PAPER:
This guide explores security management strategies and how to combat the growth of sophisticated threats.
Posted: 26 Feb 2014 | Published: 31 Oct 2013
|
|
|
Citizens National Bank of Texas Increases Advanced Cyber Attack Protection with FireEye
sponsored by FireEye
WHITE PAPER:
With cyber-attacks growing in regularity and complexity, many businesses have to go the extra mile to protect their sensitive data. This case study takes a look at one company's success when implementing a Web-based malware protection system.
Posted: 26 Feb 2014 | Published: 31 Dec 2013
|
|
|
Your Personal Web Attack Survival Guide
sponsored by Imperva
WHITE PAPER:
This white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.
Posted: 20 Feb 2014 | Published: 31 Dec 2013
|
|
|
The Future of Web Security: 10 Things Every Web Application Firewall Should Provide
sponsored by Imperva
WHITE PAPER:
This guide takes a look at 10 things that every web application firewall should provide.
Posted: 19 Feb 2014 | Published: 31 Dec 2012
|
|
|
Symantec Intelligence Report 2013
sponsored by Symantec Corporation
ANALYST REPORT:
This in-depth report outlines the latest analysis surrounding cyber security threats and trends.
Posted: 18 Feb 2014 | Published: 30 Nov 2013
|
|
|
Hidden Lynx – Professional Hackers for Hire
sponsored by Symantec Corporation
WEBCAST:
This in-depth resource explores the strategies behind hackers-for-hire and what you can do to prevent them from compromising your system.
Posted: 17 Feb 2014 | Premiered: Feb 17, 2014
|
|
|
Endpoint Protection Platforms for Enterprises
sponsored by Symantec Corporation
WHITE PAPER:
This guide explores a unique enterprise endpoint protection platform that encompasses a multitude of security tools.
Posted: 14 Feb 2014 | Published: 08 Jan 2014
|
|
|
An Expert Guide to the PCI DSS 3.0
sponsored by TechTarget Security
EBOOK:
This expert handbook gives you the information that you require right now to understand the updated requirements for the PCI DSS 3.0, which went into effect in early 2014.
Posted: 31 Jan 2014 | Published: 31 Jan 2014
|
|
|
Knowledge is Power: The Symantec Guide to Protecting your Website
sponsored by Symantec Corporation
WHITE PAPER:
This guide explores the importance of securing your system, overcoming any vulnerabilities and how this can help you maintain consumer confidence.
Posted: 30 Jan 2014 | Published: 30 Jan 2014
|
|
|
Five Tips to Reduce Risk From Modern Web Threats
sponsored by Sophos
WHITE PAPER:
Safeguarding your systems from ever-changing cybercriminals eyeing your sensitive data can be overwhelming. This guide explores 5 steps you can take to reduce risk from modern web threats.
Posted: 19 Dec 2013 | Published: 30 Sep 2013
|
|
|
Deep Security as a Service: Cloud Security for Amazon Web Services (AWS)
sponsored by Trend Micro
WHITE PAPER:
Access this white paper to unveil a deep security as a service option that offers scalable protection for the cloud's elastic environment. Click now to see how to get maximum value out of your cloud investment.
Posted: 16 Dec 2013 | Published: 16 Dec 2013
|
|
|
Information Security Emagazine: Best Practices for the Evolving Threat Landscape
sponsored by Hewlett-Packard Enterprise
WHITE PAPER:
In this security emagazine, discover a variety of resources that offer exclusive best practices on how to boost security strategies to address the rise in cyber threats.
Posted: 02 Dec 2013 | Published: 02 Dec 2013
|
|
|
Best Practices For Your Threat Management Program
sponsored by IBM
EGUIDE:
In this expert e-guide, industry leader Diana Kelley shares 5 exclusive tips on how to build successful threat and vulnerability programs. Click now to uncover these key features!
Posted: 26 Nov 2013 | Published: 26 Nov 2013
|
|
|
Endpoint Security Best Practices
sponsored by Symantec Corporation
EGUIDE:
In this expert e-guide, uncover best practices on how to effectively plan and deploy multi-layered endpoint security that can defend against emerging cyber-attacks.
Posted: 26 Nov 2013 | Published: 26 Nov 2013
|
|