Information Security Magazine - October 2009: Security 7 Awards
By: Information Security Magazine View more from Information Security Magazine >>
Download this next:
CISSP Exam Guide Chapter 1 sample download
By: McGraw Hill
Type: White Paper
In this chapter download from McGraw Hill, learn everything you need to know about the first domain, security and risk management, to help you excel at your CISSP exam.
Inside, discover 174 pages that dive into:
- Security terminology and principles
- Protection control types
- Security frameworks, models, standards, and best practices
- Computer laws and crimes
- Intellectual property
- Data breaches
- Risk management
- Threat modeling
- Business continuity and disaster recovery
- Personnel security
- Security governance
These are also closely related to: "Information Security Magazine - October 2009: Security 7 Awards"
-
How Can You Augment Your Security Posture?
By: Novacoast
Type: Product Overview
With cyberthreats multiplying, your organization faces growing risk. In these challenging circumstances, how can you augment your security posture?
This overview introduces a host of cybersecurity services by Novacoast – from penetration testing, to GRC, to log management and more.
Read on to determine if any of these services can meet your business’s unique security needs.
-
6 Point SIEM Solution Evaluation Checklist
By: TechTarget Security
Type: eGuide
Security information and event management (SIEM) systems have become a crucial component of modern security strategies. Yet given the cost and range of solutions, it is not a purchase to be made hastily.
This E-Guide from SearchSecurity.com explores the top six evaluation criteria you should keep in mind when investing in an SIEM solution. View now to learn more!
Find more content like what you just read:
-
Focusing on SIEM Integration: A 6 Point SIEM Solution Evaluation Checklist
By: TechTarget Security
Type: eGuide
Organizations should take careful consideration before implementing a SIEM solution. This expert e-guide will cover six points to consider before selecting a solution and explore the benefits it can bring to your business.
-
What should you ask a pentesting service provider?
By: Trustwave
Type: White Paper
To augment their security stances, many organizations have partnered with a penetration testing (pentesting) service provider. Is your business considering doing the same? Step in “11 Questions to Ask Your Pentesting Service Provider,” a white paper that can guide your market exploration. Read now to unlock insights.
-
White Paper: Evaluator’s Guide For Managed Detection and Response (MDR) Services
By: AT&T Cybersecurity
Type: eBook
Managed detection and response (MDR) tools play a key role in enabling streamlined and unified security processes – however, finding the right MDR solution can be challenging. Read this MDR buyer’s guide to learn the basic MDR services, evaluation criteria, pitfalls to avoid, and more.
-
Threat Management: Devising a new strategy to tackle today's cyberattacks
By: TechTarget Security
Type: Essential Guide
This Information Security Essential Guide on Threat Management explores the new strategies organizations are developing to tackle the threat of today’s growing malware threats and targeted attacks.
-
Technical Guide on Malware Trends
By: TechTarget Security
Type: eGuide
TechTarget’s Security Media Group presents a comprehensive guide to malware trends. Our experts help you adopt your security strategies, policies and spending to address the ever-changing and customized world of malware to keep targeted attacks, phishing scams and other malware-based attacks at bay.
-
E-Guide: Identifying and addressing evolving threats
By: TechTarget Security
Type: eGuide
This expert resource offers key insight into the true definition of cyberthreats and uncovers 4 essential steps to consider when developing your IT security strategy for 2012.
-
Unlock 24/7 security support with an MSP
By: Flagship Solutions Group
Type: Product Overview
Download this overview to learn about how your organization can unlock 24/7 security support by employing a managed services provider.
-
Enhance your mainframe security with Broadcom
By: BROADCOM, Inc
Type: White Paper
Your mainframe houses sensitive data—data that threat actors work hard to exfiltrate through phishing attacks. In the face of this threat, how can you strengthen your mainframe security? Unlock tips in this guide.
-
Combating Today’s Security Threats
By: TechTarget Security
Type: eGuide
In this expert guide, gain a better understanding of advanced persistent threats (APTs) and how you can stay one step ahead. View now to gain key insight into security strategies that can help you protect your organization.
-
Full Mainframe Protection for The Entire Security Lifecycle eBook
By: BROADCOM, Inc
Type: eBook
If you’ve shifted to a hybrid IT infrastructure, then you’re familiar with the process of reassessing your security management. Throughout your reassessment, did you make sure to consider your mainframe? If not, this e-book can help. Read on to learn about modernizing your mainframe security with Broadcom.
-
Keeping your cybersecurity on pace with your innovation
By: Reply
Type: eBook
As more enterprises push towards continuous digital transformation, they are met with unprecedented cyber risks and often do not have enough specialized support on issues related to innovative technologies. Read this eBook to learn about Pervasive Security, a new paradigm that integrates well with modern digital services implementation initiatives.
-
Enterprise Strategy Group Showcase: Attack surface management
By: Ionix
Type: ESG Showcase
Organizations in the middle of digital transformation initiatives face many security challenges due to their growing attack surfaces. This ESG showcase looks at attack surface management (ASM) solutions, specifically focusing on how IONIX ASM can help organizations monitor, control, and secure their attack surface. Read on to learn more.
-
Speeding up vulnerabilty detection with automation
By: ServiceNow
Type: eBook
Almost half of all CIOs believe their cybersecurity may not be on par with their digital transformation efforts, but 80% of organizations that use automation say they can respond to vulnerabilities in a shorter timeframe. Download this white paper to help
-
Attack surface management buyer’s guide
By: Ionix
Type: Analyst Report
The evolution and adoption of new digital technologies has led to a rapid expansion of the attack surface. This Kuppingercole report aims to provide an overview of the attack surface management (ASM) market and give you a compass to help you to find the solution that best meets your needs. Read on to learn more.
-
How Organizations With An Emerging Cybersecurity Program Can Accelerate Risk Reduction
By: AT&T Cybersecurity
Type: White Paper
Whether or not your organization plans to utilize consultants, AT&T Cybersecurity Consulting crafted this white paper to clarify initiatives for an emerging program. Learn more by downloading this paper today.
-
Log management best practices
By: TechTarget Security
Type: eGuide
Investing in the correct log management tool can ensure that the pressures of maintaining enterprise system log data are greatly decreased. Although the right tool is very helpful, the possibility of it turning into the wrong tool can happen in the blink of an eye if the correct steps are not taken.
-
SIM Technical Guide
By: TechTarget Security
Type: Ezine
In this SearchSecurity.com Technical Guide on security information and event management (SIEM) systems, we explore the current state of SIEMs in the enterprise today and whether augmentation, cloud service, or rip and repair is your best upgrade option.
-
Tools Designed for Security Could Be Your Biggest Security Threat
By: Tanium
Type: White Paper
How can your organization’s cybersecurity tools become cybersecurity threats? Through tool sprawl. In this white paper, learn how to tackle that issue in three steps.
-
Third party risk management: A path to a program
By: Coalfire
Type: White Paper
This white paper dives into what risks third-party management faces and how it can change the course of a cyber program. Read on to learn more.
-
Security Big Data: Preparing for a Big Data Collection Implementation
By: TechTarget Security
Type: eBook
This expert e-guide from SearchSecurity.com offers realistic advice to help your enterprise information security team understand what technology and processes must be in place in order to properly and securely take advantage of big data.
-
Building a successful data loss prevention program
By: Reply
Type: eBook
Data breaches and the resulting data loss can lead to destructive results. An effective data loss prevention (DLP) solution eliminates data duplication and can help centrally manage data and eliminate serious breaches. This e-book looks at what it takes to develop a successful DLP solution in order to secure your organization. Read on to learn more
-
E-Guide: Bringing Value to Application Monitoring Through SIM
By: TechTarget Security
Type: eGuide
This expert e-guide describes the value that security information and management systems (SIMs) can bring to both application monitoring and real-time security. See how you can get the most out of SIM by reading on now.
-
Top 5 Use Cases for Splunk Enterprise Security
By: Splunk
Type: White Paper
Security teams are flooded with alerts, and without the proper tools, false alarms can create enough noise to allow real threats to bypass security. This white paper provides 5 use cases businesses can use to better leverage Splunk Enterprise security in order to support their security teams and improve response times. Read on to learn more.
-
Accelerate Your Incident Response with Corelight and Endace
By: Endace
Type: Product Overview
Today’s cyber landscape brims with threats. Therefore, your organization’s incident response has to be rapid. This overview explores how your business can resolve security incidents up to 20 times faster by leveraging Corelight and Endace solutions. Continue on to learn more.
-
Discover 9 microsegmentation vendors and how they stack up
By: Illumio
Type: Analyst Report
To meet their microsegmentation needs, buyers should look for solutions with flow and asset discovery, visualization, a wide range of supported operating systems, and segmentation at the process level. Access this Forrest Report to discover how well 9 of the most significant vendors stack up when scored against 10 criteria.
-
SIEM IT Decision Center- Checklist #1
By: TechTarget Security
Type: eGuide
If you are looking into deploying your own SIEM system, read this E-Guide to better understand features and functions, how to evaluate deployment and management costs, and the latest trends regarding SIEM platforms.
-
The Improvement and Evolution of SIEM
By: TechTarget Security
Type: eGuide
Get an in-depth look at the past, present and future of security information and event management (SIEM) technology in this informative E-Guide from SearchSecurity.com.
-
Independent analysis of Bitdefender GravityZone
By: Bitdefender
Type: White Paper
Hackers are constantly advancing their tools and strategies to perform attacks more effectively. But when compared to those of hackers, how do your tools compare? This white paper presents the results of an independent test conducted by AV-Comparatives to provide an objective analysis of Bitdefender GravityZone. Read on to learn more.
-
A CISO’s guide to attack surface management
By: Palo Alto Networks
Type: White Paper
To protect your attack surface, a modern ASM must work at the speed and scale of the internet to continuously discover, identify, and mitigate all risks. Learn which features to look for in a new ASM, and how to put into place, in this white paper.
-
SIEM IT Decision Center- Checklist #2
By: TechTarget Security
Type: eGuide
This white paper presents SIEM use cases and technical information for security and compliance pros to better understand the threat landscape and help move their RFP process forward.
-
How E.ON defends their extensive attack surface
By: Ionix
Type: Case Study
Serving 53 million customers, the assets owned and managed by E.ON presented an attack surface so large they could no longer defend it affectively. E.ON partnered with Ionix, and used their Ecosystem Security platform to pre-emptively act on vulnerabilities. Read on to learn more.
-
Security leader’s guide to SASE solutions
By: Fortinet, Inc.
Type: White Paper
Secure access service edge (SASE) solutions attempt to converge networking and security, providing the ideal solution to the challenges of modern security. Download this guide to learn more about the state of SASE, as well as the guidance you need to find the SASE solution that’s right for your organization.
-
Planning your XDR journey? Review these questions
By: SentinelOne
Type: White Paper
As they plan their journey to Extended Detection and Response (XDR), what should CISOs and other security professionals keep in mind? This white paper maps out 29 important questions for security leaders to consider. Keep reading and access the questions.
-
Securing the perimeter-less network with increased visibility
By: Fortinet, Inc.
Type: Product Overview
With the death of the network perimeter, cybercriminals have proven that every asset is a potential entry point for an attack. FortiGate Next-Generation Firewalls
-
How to retain security analysts & more: A discussion
By: Endace
Type: Webcast
Darktrace’s VP of Tactical Risk and Response joins Michael Morris in this episode of Endace’s “Secure Networks: The Packet Forensics Files.” The two discuss nation-state cyberattacks, recent security mandates, and more. View now to unlock their insightful conversation.
-
Optimize your security stack
By: SimSpace
Type: Data Sheet
Choosing security products and tuning your tech stack is not only a time-consuming and tedious process, but it can also increase the risk of outages and other impacts to your production network. Read this data sheet to learn the importance of assessing your security products to find and compile the ideal security stack for your organization.
-
Endpoint Security IT Decision Center Handbook 2
By: TechTarget Security
Type: eGuide
Access this expert handbook to discover which features any endpoint protection software should have, and 10 questions to ask your vendor before choosing your next IT security investment.
-
3 ways to secure modern edge networks
By: Fortinet, Inc.
Type: White Paper
Fortinet's Hybrid Mesh Firewalls provide centralized management & AI-powered protection for hybrid networks. Leveraging proprietary security chips, the solution secures data centers, branches, public clouds & remote sites.
-
Unlocking the Opportunity of SIEM Technology
By: TechTarget Security
Type: eGuide
Explore how a security information and event management (SIEM) system works, what types of data you can integrate into it, the process for detecting threats/incidents, and steps you should take to develop a successful SIEM capabilities.
-
The Future of Next-Generation SIEM
By: TechTarget Security
Type: eGuide
This expert E-Guide explores what it means to be an "ideal" security information and event management (SIEM) system and takes a look into a crystal ball to explore five futures SIEMs must conquer to be considered next-gen systems. View now to learn more!
-
Understanding the modern EDR market: Buyer's guide & more
By: iT1 Source
Type: Buyer's Guide
To understand the four elements of modern endpoint detection and response (EDR) and how to find a solution that can deliver them, take a look through this buyer’s guide.
-
Measuring security & SecOps: Top trends
By: Expel
Type: Research Content
There’s an old adage in IT that says, “You can’t manage what you don’t know.” This survey reviews the current state of SOC within many organizations and attempts to gain insight into key problem areas. Download your copy and explore top trends, including which frameworks are preferred and whether KPIs are useful and effective.
-
SIEM Best Practices for Advanced Attack Detection
By: TechTarget Security
Type: eGuide
The industry has panned SIEM as an expensive and under performing technology. But to be clear, it's not a technology problem, it's a process issue. In this tech tip, Securosis analyst Mike Rothman will outline a time tested process to build SIEM policies which actually alert on the attacks you need to protect against.
-
How to Level Up Security Incident Response
By: Novacoast
Type: Product Overview
Download this overview to learn how you can level up your organization’s security incident response management.
-
E-Guide: Physical Security Awareness and Smartphone Security Policy
By: TechTarget Security
Type: eGuide
In this e-guide, gain key insight for establishing better physical security and employee awareness for device usage. View now to uncover best practices and technologies that can help you lock down devices, and how to put device responsibility back in the hands of the employee.
-
See how StrongDM can help you achieve reliable security
By: StrongDM
Type: Product Overview
The AWS Well-Architected framework helps cloud architects build a secure, high-performing, resilient, and efficient infrastructure for a variety of applications and workloads.
-
How Tanium Threat Response Augments Endpoint Detection and Response (EDR) and SIEM solutions
By: Tanium
Type: White Paper
While SIEM and EDR solutions provide a wealth of information, there is a threshold that many investigators run into – a point where visibility ends. Access this white paper to learn about a platform designed to supplement the threat intelligence and detections coming from your SIEM an EDR solutions.
-
Market trends: The Future of E-mail
By: TechTarget Security
Type: eGuide
Access this expert e-guide to discover the two major trends being used to fight email spam and other threats to the security of your inter-organizational communications.