Can New Security Tools Keep Your Network Clean?
sponsored by TechTarget Security
EZINE:
Modern networks have immense amounts of data passing through them daily, and keeping that data clean of sophisticated malware is a sizable undertaking. In this issue of Information Security, learn what advanced monitoring tools are right for your network's particular needs.
Posted: 01 Jul 2015 | Published: 01 Jul 2015
|
|
|
Protect Your Web Applications from the OWASP Top 10
sponsored by IBM
WHITE PAPER:
Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
Posted: 22 Jun 2015 | Published: 31 Aug 2012
|
|
|
Keep Your Data Secure: Fighting Back With Flash
sponsored by Micron Technology
WHITE PAPER:
Self-encrypting drives (SEDs) provide the last line of defense, protecting critical data stored at the endpoints. Discover how SEDs satisfy regulations and compliance, lower TCO, increase IT efficiency, and, of course, secure data while preventing a potential data breach due to lost or stolen devices.
Posted: 12 Jun 2015 | Published: 12 Jun 2015
|
|
|
Next-Generation Security in a Mobile Era
sponsored by TechTarget CIO
EBOOK:
Mobile security isn't just a matter investing more in security technologies. Access this handbook to learn what CIO expert Harvey Koeppel thinks it will take to reformulate your mobile security strategy and tackle today's mobile risks. Also uncover the top 10 mobile security risks, a 7-point checklist for guarding mobile apps and devices, and more.
Posted: 13 Mar 2015 | Published: 13 Mar 2015
|
|
|
Application Security in the Age of Cloud, BYOD, and SaaS
sponsored by BitGlass
WHITE PAPER:
This white paper considers the features and benefits of one application security system that promises to deliver when it comes to securing an ambiguous infrastructure. Read on to see what you can do to wrangle in BYOD, SaaS, and cloud security protocols.
Posted: 09 Feb 2015 | Published: 09 Feb 2015
|
|
|
Cisco 2015 Annual Security Report
sponsored by Cisco Systems, Inc.
WHITE PAPER:
Access this white paper to read the Cisco 2015 annual report and discover research, insights, and techniques straight from security experts that can protect your business.
Posted: 09 Feb 2015 | Published: 09 Feb 2015
|
|
|
Why Every CIO Should Consider Vulnerability Assessment a Necessity
sponsored by IBM
WHITE PAPER:
In this resource, CIOs will learn why vulnerability assessment is so essential to enterprise security, and can discover a leading vulnerability assessment platform that scans targeted systems on a scheduled basis in order to increase your understanding of your organization's overall security posture.
Posted: 03 Feb 2015 | Published: 30 Apr 2014
|
|
|
BYOD Compliance: Keep Mobile Data Regulation-Ready
sponsored by TechTarget Security
EBOOK:
In this SearchCompliance handbook, learn cutting-edge BYOD compliance strategies to keep mobile data secure and compliant with regulations.
Posted: 02 Feb 2015 | Published: 02 Feb 2015
|
|
|
The Bot Threat
sponsored by Hewlett Packard Enterprise
WHITE PAPER:
In this white paper, get vital information about the malicious bot, also known as botnets when in large forces, and explore 4 key features that will help you build a defense-in-depth security system to prevent these attacks from compromising your networks.
Posted: 01 Feb 2015 | Published: 13 Nov 2013
|
|
|
Mobile Cloud Security: What CXOs Need to Know
sponsored by Cisco Systems, Inc.
WHITE PAPER:
This blog post discusses the need for end-to-end security in a mobile cloud environment.
Posted: 29 Jan 2015 | Published: 29 Jan 2015
|
|
|
Cloud Security: Enterprise Point of View
sponsored by Dimension Data
VIRTUAL SEMINAR:
Access this webcast today to listen as Darren O'Loughlin, CSO for Dimension Data's global business enabling IT as a Service, shares strategic objectives for securing applications and workloads on an enterprise-class cloud.
Posted: 29 Jan 2015 | Premiered: 26 Nov 2014
|
|
|
Secure VDI Desktops the Same Way you Would Physical Ones
sponsored by Dell
EGUIDE:
Download this expert resource now to learn about protecting your virtual desktops and much more.
Posted: 05 Dec 2014 | Published: 05 Dec 2014
|
|
|
Prevent Fraud and Improve the User Experience with Mobile Access Management
sponsored by IBM
WHITE PAPER:
This white paper examines the challenges of providing secure access in the mobile world and explores new security models, policies, and controls that can help to protect your critical assets and data.
Posted: 03 Dec 2014 | Published: 30 Sep 2013
|
|
|
How to Properly Plan Against Attacks with Incident Response and Advanced Malware Protection
sponsored by TaaSera
EGUIDE:
This expert e-guide explores the dos and don'ts of creating an incident response plan and looks at how advanced malware uses your own network against you.
Posted: 02 Dec 2014 | Published: 02 Dec 2014
|
|
|
Secure Mobile Email for the Lean IT Department
sponsored by Shavlik Technologies
WHITE PAPER:
This expert whitepaper explores how you can keep you end-users happy and your corporate information safe in the age of mobile email.
Posted: 02 Dec 2014 | Published: 02 Dec 2014
|
|
|
Cost of a Breach Rising; How to Protect Against It
sponsored by TaaSera
EGUIDE:
This expert e-guide explores how the Target breach of 2013 has changed the way organizations approach security.
Posted: 01 Dec 2014 | Published: 01 Dec 2014
|
|
|
How to Use Threat Intelligence with SIEM Products
sponsored by LogRhythm, Inc.
EGUIDE:
This expert e-guide will teach you how to use security information and event management to protect your organization from evolving threats.
Posted: 24 Nov 2014 | Published: 24 Nov 2014
|
|
|
Study on Cybercrime's Cost to Business
sponsored by Hewlett Packard Enterprise
WHITE PAPER:
This exclusive whitepaper covers the results of a survey that analyzed the cost of cyber-crime.
Posted: 12 Nov 2014 | Published: 12 Nov 2014
|
|
|
Aligning your Enterprise Identity and Access Management Strategy
sponsored by DLT Solutions
EGUIDE:
This expert e-guide covers how you can align identity and access management with CIO and business priorities.
Posted: 12 Nov 2014 | Published: 12 Nov 2014
|
|
|
Identity and Access Management (IAM) in the Cloud
sponsored by DLT Solutions
EGUIDE:
This expert e-guide explores the growing market for cloud-based identity and access management.
Posted: 12 Nov 2014 | Published: 12 Nov 2014
|
|
|
Information Security Magazine – November 2014
sponsored by TechTarget Security
EZINE:
The votes are tallied. More than 1,700 security practitioners participated in our Security Readers' Choice Awards 2014. Did your tools make the cut?
Posted: 07 Nov 2014 | Published: 07 Nov 2014
|
|
|
How to Deal with Increasing DDOS Attacks
sponsored by Verisign, Inc.
EGUIDE:
This expert e-guide explores how to protect your organization from distributed denial of service attacks.
Posted: 07 Nov 2014 | Published: 07 Nov 2014
|
|
|
What to Look for in Web Application Firewall Products
sponsored by TechTarget Security
EBOOK:
In this buyer's guide, experts explain how a WAF works, describe the features that different WAFs possess, and reveal how to weight these factors in selecting the right WAF to protect your enterprise's sensitive data.
Posted: 07 Nov 2014 | Published: 07 Nov 2014
|
|
|
Endpoint protection: Whitelisting and Beyond
sponsored by TechTarget Security
EBOOK:
Application whitelisting is a valuable security tool but it's riddled with complexity. This handbook takes a look at whitelisting capabilities, with an eye to the NIST cybersecurity framework and suggests best practices for implementing or managing a whitelist in your enterprise.
Posted: 05 Nov 2014 | Published: 05 Nov 2014
|
|
|
Overcoming the Challenges of Internal API Programs
sponsored by Intel® Services
WEBCAST:
Modernizing legacy applications can be handled gracefully when the right API system is considered from the very beginning. View this webcast now to find out how to overcome cultural obstacles in implementing an internal API program, and how to present the value of having such a program.
Posted: 04 Nov 2014 | Premiered: Nov 4, 2014
|
|