World War C: Understanding Nation-State Motives Behind Today’s Advanced Cyber Attacks
sponsored by FireEye
WHITE PAPER:
This guide explores the unique characteristics of cyber-attack campaigns waged by governments worldwide.
Posted: 05 Mar 2014 | Published: 31 Dec 2013
|
|
|
Defending Against Malware: A Holistic Approach to One of Today's Biggest IT Risks
sponsored by IBM
WHITE PAPER:
This white paper offers background on today's malware and its 4 predictable steps. Click through to discover a set of integrated solutions that offer improved visibility and defense to block advanced attacks.
Posted: 05 Mar 2014 | Published: 31 Jan 2014
|
|
|
Leverage Security Intelligence for Government Agencies
sponsored by IBM
WHITE PAPER:
This resource features a security intelligence platform that's paired with data analytics to help prevent, defend, remediate, and analyze more security incidents and policy violations than traditional information security systems.
Posted: 05 Mar 2014 | Published: 31 Mar 2013
|
|
|
A New Standard for Security Leaders. Insights from the 2013 IBM CISO Assessment
sponsored by IBM
WHITE PAPER:
This guide discusses security leaders' top concerns with today's aggressive threat landscape.
Posted: 05 Mar 2014 | Published: 31 Oct 2013
|
|
|
Insider Edition: Antimalware Technologies and Techniques to the Rescue
sponsored by TechTarget Security
EZINE:
In this special edition of Information Security, our experts examine the recent advances in anti-malware detection and prevention, and which ones can tip the scale in your favor in the fight against malware.
Posted: 05 Mar 2014 | Published: 05 Mar 2014
|
|
|
The Definitive Guide to the Next Generation of Threat Protection
sponsored by FireEye
EBOOK:
This in-depth eBook examines the next generation of threat protection and provides key insights into critical topics, such as advanced persistent threats and zero-day attacks.
Posted: 04 Mar 2014 | Published: 31 Dec 2013
|
|
|
Cloud Computing Insider Threats: Exploring Risk Scenarios, Mitigations
sponsored by Dell, Inc. and Intel®
EGUIDE:
This expert e-guide highlights possible insider threat scenarios, as well as 11 security issues to consider when choosing a cloud service provider.
Posted: 03 Mar 2014 | Published: 03 Mar 2014
|
|
|
Symantec Intelligence Report - January 2014
sponsored by Symantec Corporation
WHITE PAPER:
This in-depth analysis explores the current threat landscape, the most common security threats, and how you can prevent them.
Posted: 03 Mar 2014 | Published: 31 Jan 2014
|
|
|
Anti-Evasion: Why It’s a Critical Component of Intrusion Prevention Systems
sponsored by DellEMC and Intel®
WHITE PAPER:
This resource explores anti-evasion technology, an intrusion prevention system (IPS) add-on that blocks encoded attacks more effectively than traditional solutions.
Posted: 28 Feb 2014 | Published: 31 Dec 2013
|
|
|
NoSQL Does Not Have to Mean No Security
sponsored by IBM
WHITE PAPER:
This white paper explores the data security and compliance challenges with NoSQL ("not only SQL") databases, and offers key recommendations on how to address these problems.
Posted: 28 Feb 2014 | Published: 31 Jul 2013
|
|
|
Understanding and Selecting Data Masking Solutions
sponsored by IBM
WHITE PAPER:
This white paper examines data masking technology, and pinpoints the must-have features to look for when choosing a solution.
Posted: 28 Feb 2014 | Published: 10 Aug 2012
|
|
|
PCI DSS compliance 101
sponsored by DellEMC and Intel®
WHITE PAPER:
This white paper guides you through a series of deployments that help you achieve PCI compliance, thus improving overall network security practices.
Posted: 27 Feb 2014 | Published: 27 Feb 2014
|
|
|
The 10 “Must-Haves” for Secure Enterprise Mobility
sponsored by Citrix
WHITE PAPER:
This informative paper examines the common security issues surrounding BYOD and provides ten helpful "must-haves" for ensuring that your mobile initiatives are safe and secure.
Posted: 27 Feb 2014 | Published: 01 Jun 2014
|
|
|
Advanced Attacks Require Federal Agencies to Reimagine IT Security
sponsored by FireEye
WHITE PAPER:
This guide outlines the malware "kill-chain" model used in many of today's cyber-attacks and how these can overwhelm traditional security tools.
Posted: 27 Feb 2014 | Published: 27 Feb 2014
|
|
|
Supply Chain Analysis: From Quartermaster to Sunshop
sponsored by FireEye
WHITE PAPER:
This in-depth guide explores the current threat landscape and the role of APTs. Read now for more information on how APTs are being used for wide-scale cybercrime campaigns.
Posted: 27 Feb 2014 | Published: 27 Feb 2014
|
|
|
IAM for the Real World – Privileged Account Management
sponsored by One Identity
WHITE PAPER:
Read this e-book for essential information on common security issues with privileged account management (PAM) – and how you can minimize or eliminate them.
Posted: 27 Feb 2014 | Published: 31 Dec 2012
|
|
|
Behavioral Analytics Applied to Security
sponsored by FileTrek
WHITE PAPER:
This white paper details a new approach to threat detection that leverages big data and behavioral analytics technology to improve data protection and risk prevention.
Posted: 27 Feb 2014 | Published: 27 Feb 2014
|
|
|
Security in the Skies
sponsored by (ISC)2 UK Ltd
WHITE PAPER:
This white paper highlights the major cloud security concerns and threats, and offers a list of controls to include in your security strategy to prevent these inherent risks.
Posted: 26 Feb 2014 | Published: 26 Feb 2014
|
|
|
Unified Threat Management: RFP Technology Decisions
sponsored by TechTarget Security
EBOOK:
To properly evaluate unified threat management (UTM) products, you must understand what each vendor offers and how well it fits with your organization.
Posted: 26 Feb 2014 | Published: 26 Feb 2014
|
|
|
Unified Threat Management: Decision Time
sponsored by TechTarget Security
EBOOK:
Learn how to evaluate your potential vendor's UTM product and its ability to meet your specific business requirements.
Posted: 26 Feb 2014 | Published: 26 Feb 2014
|
|
|
Why You Need A Next-Generation Firewall
sponsored by Hewlett-Packard Enterprise
WHITE PAPER:
This white paper explains how next-generation firewalls protect security systems from advanced attacks, and how they fit in with your business strategy.
Posted: 26 Feb 2014 | Published: 31 Dec 2013
|
|
|
Unified Threat Management: From Business Problem to Technical Solution
sponsored by TechTarget Security
EBOOK:
Learn how unified threat management (UTM) systems can help you achieve a layered security defense.
Posted: 25 Feb 2014 | Published: 25 Feb 2014
|
|
|
Securing Android, iOS and Windows Tablets and Smartphones
sponsored by Citrix
WHITE PAPER:
This exclusive resource examines the common security challenges that managing various mobile platforms can pose, and discusses a solution that can allow you to deliver enterprise information securely to mobile devices regardless of platform.
Posted: 24 Feb 2014 | Published: 24 Feb 2014
|
|
|
Enterprise Security with mobilEcho® : Enterprise Security from the Ground Up
sponsored by Acronis
WHITE PAPER:
This white paper highlights a mobile file management (MFM) solution that ensures secure corporate file access for the mobile workforce.
Posted: 20 Feb 2014 | Published: 31 Dec 2013
|
|
|
NSS Labs Network Intrusion Prevention System Product Analysis
sponsored by IBM
WHITE PAPER:
This resource reveals the best-value features to look when making a network intrusion prevention system (IPS) by providing performance analysis of a top IPS solution.
Posted: 20 Feb 2014 | Published: 31 Dec 2013
|
|