Information Security Magazine - February 2010: Under Control
By: Information Security Magazine View more from Information Security Magazine >>
Download this next:
E-Guide: Identifying and addressing evolving threats
By: TechTarget Security
Type: eGuide
The emergence of new technologies comes with new security threats that will require managers to implement critical policy changes. But determining the level of severity of arising threats is often difficult, making it even more challenging to establish the right course of action. This expert resource offers insight into the true definition of cyberthreats and uncovers 4 essential steps to consider when developing your IT security strategy for 2012.
These are also closely related to: "Information Security Magazine - February 2010: Under Control"
-
Endpoint Security IT Decision Center Handbook 2
By: TechTarget Security
Type: eGuide
As an IT manager, choosing the right endpoint protection software can be a tough decision considering the number of capabilities different vendors offer with their product.
Access this handbook to get leading expert advice on what essential features to look for when comparing options, and 10 requirements to consider before choosing your organization’s next security investment. Click now to learn more!
-
Building a successful data loss prevention program
By: Reply
Type: eBook
Data breaches and the resulting data loss can lead to destructive results, including:
- Attract regulatory and legal complications
- Negatively impact brand trust
- Cause financial losses
- And more
An effective data loss prevention (DLP) solution eliminates data duplication and can help centrally manage data and eliminate serious breaches.
This e-book looks at what it takes to develop a successful DLP solution in order to secure your organization.
Download now to learn more.
Find more content like what you just read:
-
Combating Today’s Security Threats
By: TechTarget Security
Type: eGuide
In this expert guide, gain a better understanding of advanced persistent threats (APTs) and how you can stay one step ahead. View now to gain key insight into security strategies that can help you protect your organization.
-
How Can You Augment Your Security Posture?
By: Novacoast
Type: Product Overview
With cyberthreats multiplying, your organization faces growing risk. In these challenging circumstances, how can you augment your security posture? Download this overview to learn about cybersecurity services that can help.
-
SIM Technical Guide
By: TechTarget Security
Type: Ezine
In this SearchSecurity.com Technical Guide on security information and event management (SIEM) systems, we explore the current state of SIEMs in the enterprise today and whether augmentation, cloud service, or rip and repair is your best upgrade option.
-
The state of cybersecurity
By: JAMF
Type: Research Content
Jamf’s annual security report analyzes how the threat landscape is evolving by studying real-world customer data, cutting-edge threat research, and noteworthy industry events to provide a bird’s eye view of the landscape as a whole. Download the report now to learn more about the state of cybersecurity.
-
Technical Guide on Malware Trends
By: TechTarget Security
Type: eGuide
TechTarget’s Security Media Group presents a comprehensive guide to malware trends. Our experts help you adopt your security strategies, policies and spending to address the ever-changing and customized world of malware to keep targeted attacks, phishing scams and other malware-based attacks at bay.
-
The Inside-out Enterprise: Redefining IT SecOps for the Remote-First Workplace
By: Tanium
Type: White Paper
Enterprise IT teams are adapting to a new IT landscape with a workforce mostly or entirely remote indefinitely. The inside-out enterprise: redefining IT SecOps for today’s remote-first workplace explores three security risk management challenges related to managing clients and what organizations can do to overcome them.
-
Tools Designed for Security Could Be Your Biggest Security Threat
By: Tanium
Type: White Paper
How can your organization’s cybersecurity tools become cybersecurity threats? Through tool sprawl. In this white paper, learn how to tackle that issue in three steps.
-
How Tanium Threat Response Augments Endpoint Detection and Response (EDR) and SIEM solutions
By: Tanium
Type: White Paper
While SIEM and EDR solutions provide a wealth of information, there is a threshold that many investigators run into – a point where visibility ends. Access this white paper to learn about a platform designed to supplement the threat intelligence and detections coming from your SIEM an EDR solutions.
-
Understanding the modern EDR market: Buyer's guide & more
By: iT1 Source
Type: Buyer's Guide
To understand the four elements of modern endpoint detection and response (EDR) and how to find a solution that can deliver them, take a look through this buyer’s guide.
-
Security leader’s guide to cybersecurity strategy
By: WatchGuard Technologies, Inc.
Type: eBook
The success of cybersecurity can only be achieved through a strategic approach that effectively combines different tools to address the problems at hand. This e-book contains several examples of cybersecurity power plays that can dramatically boost security efficacy and operational efficiency. Read on to learn more.
-
5 key security trends impacting organizations
By: JAMF
Type: Research Content
The number of remote users that IT and security teams are supporting has risen from 21% to 46% since the pandemic. This report explores 5 key security trends impacting organizations as organizations continue to utilize remotely accessible applications hosted on private and public data centers. Read on to learn more.
-
Top OT cybersecurity risks & how to defend against them
By: Nomios
Type: eBook
As cybercriminals continue to target older operational technology (OT) systems, security leaders are pressed to bolster defenses. To help them do so, this e-book details the top risks associated with OT systems and the ways that businesses can strengthen their security stances. Read on to access these insights.
-
8 actions for stronger OT cybersecurity
By: Nomios
Type: eBook
Along with digging into the major cybersecurity threats troubling OT, such as IoT botnets and malware attacks, this e-book outlines 8 actions that organizations can take to defend their OT environments. Review the book and elevate your OT security preparedness.
-
Threat Management: Devising a new strategy to tackle today's cyberattacks
By: TechTarget Security
Type: Essential Guide
This Information Security Essential Guide on Threat Management explores the new strategies organizations are developing to tackle the threat of today’s growing malware threats and targeted attacks.
-
Independent analysis of Bitdefender GravityZone
By: Bitdefender
Type: White Paper
Hackers are constantly advancing their tools and strategies to perform attacks more effectively. But when compared to those of hackers, how do your tools compare? This white paper presents the results of an independent test conducted by AV-Comparatives to provide an objective analysis of Bitdefender GravityZone. Read on to learn more.
-
Step by Step: Best practices for security patch management
By: TechTarget Security
Type: eGuide
Whether you're new to patch management or just need a refresher, this expert e-guide reviews best practices for security patch management to ensure accurate, effective patch testing in your organization.
-
Bitcoin, App Security, and Oracle's Controversial Licensing Policies
By: TechTarget ComputerWeekly.com
Type: Ezine
Discover how blockchain, the tech behind bitcoin, is extending its reach beyond financial services into new industries. Also learn from developers about the pros and cons of componentizing application software, examine what a recent court case shows about Oracle's licensing policies, and more.
-
What Is the Future of Endpoint Security?
By: TD Synnex
Type: Podcast
What is the future of endpoint security? To answer that question, Hector Hernandez, Solution Architect at Logicalis, interviewed a subject-matter expert from IBM in this episode of the “Tech ChangeMakers Podcast.” Tune in to access the insightful conversation.
-
Multi-cloud adoption: A double-edged sword
By: Expel
Type: Analyst Report
Security-enabled innovation has yielded anticipated benefits for organizations, but managing costs and resources and ensuring consistent security policies pose significant challenges. In this analyst report, explore key findings and survey results to better understand the double-edged sword of multi-cloud adoption.
-
Dell’s 3 Pillars of Modern Security
By: FCN
Type: White Paper
Review this white paper to discover the 3 pillars of Dell’s holistic approach to modern security.
-
Consolidate your security onto a single platform
By: WatchGuard Technologies, Inc.
Type: eBook
Hackers utilize a variety of methods to attack organizations, and as a result security teams have adopted a variety of different solutions. This e-book looks at the state of security solutions and explores how and why you should compile all of your different tools into a single solution. Read on to learn more.
-
Agri-food leader achieves security with managed cybersecurity deal
By: GoSecure
Type: Case Study
Agri-food leader Agri-Marché improved their cybersecurity by partnering with GoSecure for managed security services. GoSecure delivered Managed Extended Detection and Response, Vulnerability Management as a Service, and Security Information and Event Monitoring. Read the case study to learn more.
-
State of security hygiene: Enterprise Strategy Group report
By: Ionix
Type: ESG Research Report
To review 6 key findings about the increasingly decentralized and complex state of security hygiene and posture management (SHPM), download this 32-page research report by TechTarget’s Enterprise Strategy Group (ESG).
-
2023 Elastic Global Threat Report
By: Elastic
Type: Research Content
This 2023 Elastic Global Threat Report forecasts 5 threat trends to watch out for in 2024. Read the report and come away with an understanding of how to prevent cybersecurity threats through enhanced visibility, novel capabilities and seasoned expertise.
-
Discover 9 microsegmentation vendors and how they stack up
By: Illumio
Type: Analyst Report
To meet their microsegmentation needs, buyers should look for solutions with flow and asset discovery, visualization, a wide range of supported operating systems, and segmentation at the process level. Access this Forrest Report to discover how well 9 of the most significant vendors stack up when scored against 10 criteria.
-
Top threats to security asset management: What to know
By: iT1 Source
Type: ESG Research Report
17% of organizations report that their approach to security hygiene and posture management (SHPM) is completely decentralized, while 41% consider their approach to be only partially centralized, according to research by Enterprise Strategy Group (ESG). To learn more about the complex state of SHPM, dig into this ESG report.
-
White Paper: Evaluator’s Guide For Managed Detection and Response (MDR) Services
By: AT&T Cybersecurity
Type: eBook
Managed detection and response (MDR) tools play a key role in enabling streamlined and unified security processes – however, finding the right MDR solution can be challenging. Read this MDR buyer’s guide to learn the basic MDR services, evaluation criteria, pitfalls to avoid, and more.
-
Making Threat Intelligence Actionable with SOAR
By: Palo Alto Networks
Type: Research Content
SOAR is gaining traction as a way to improve security operations. Security and risk management leaders should evaluate how these tools can support and optimize their broader security operations capabilities. Read this Gartner Marketing Guide to learn more about sifting through the noise and choosing the best-fit SOAR tool for your needs.
-
Healthcare security: Mission critical
By: ARG, Inc.
Type: Case Study
Read this case study to learn how ARG helped AbsoluteCare, a leading healthcare provider for vulnerable populations, find the best match for their infrastructure and security needs.
-
How Organizations With An Emerging Cybersecurity Program Can Accelerate Risk Reduction
By: AT&T Cybersecurity
Type: White Paper
Whether or not your organization plans to utilize consultants, AT&T Cybersecurity Consulting crafted this white paper to clarify initiatives for an emerging program. Learn more by downloading this paper today.
-
Checklist for attack surface management: 20+ key features
By: Ionix
Type: White Paper
What key features should an attack surface management (ASM) tool have? In this 6-page checklist, discover 20+ key capabilities concerning risk assessment, security operations and more.
-
Key questions to ask when looking for security risks
By: Expel
Type: eBook
Talent shortage, tool overload, attack surface expansion: These are just a few of the many challenges security teams are facing this year, making it feel like it is impossible to cover all your bases. In this e-book, discover 3 clear steps any organization can make to get the most out of their security tech stack.
-
10 Essential Capabilities of a Best-of-Breed SOAR
By: Splunk
Type: White Paper
Overwhelmed security teams have turned to security orchestration, automation and response (SOAR) as a remedy — but not all SOAR solutions are created equal. This white paper outlines 10 essential capabilities that should be top-of-mind when evaluating SOAR technology.
-
Attack surface management buyer’s guide
By: Ionix
Type: Analyst Report
The evolution and adoption of new digital technologies has led to a rapid expansion of the attack surface. This Kuppingercole report aims to provide an overview of the attack surface management (ASM) market and give you a compass to help you to find the solution that best meets your needs. Read on to learn more.
-
SIEM IT Decision Center- Checklist #2
By: TechTarget Security
Type: eGuide
This white paper presents SIEM use cases and technical information for security and compliance pros to better understand the threat landscape and help move their RFP process forward.
-
The state of CISO influence report
By: Coalfire
Type: Analyst Report
CISOs and cybersecurity policy play a much more important role in business decisions than ever before. This is despite the fact that the majority of large and small companies spend less than $5 million annually on cybersecurity. Access the State of CISO Influence report here to learn about the state of security.
-
Third party risk management: A path to a program
By: Coalfire
Type: White Paper
This white paper dives into what risks third-party management faces and how it can change the course of a cyber program. Read on to learn more.
-
System and Organization Controls (SOC) reports: Understanding the differences
By: Coalfire
Type: White Paper
System and Organization Control (SOC) reports are valuable tools for organizations to help build trust in their security and controls posture. Access this guide to learn key differences among the 5 SOC reports offered by Coalfire to help you understand the purpose of each report type and how it benefits a particular audience.
-
Log management best practices
By: TechTarget Security
Type: eGuide
Investing in the correct log management tool can ensure that the pressures of maintaining enterprise system log data are greatly decreased. Although the right tool is very helpful, the possibility of it turning into the wrong tool can happen in the blink of an eye if the correct steps are not taken.
-
E-Guide: Improving software with the building security in maturity model
By: TechTarget Security
Type: eGuide
This expert tip introduces a model that utilizes a framework to organize software security tasks and help organizations determine where their security practices stand and how to advance them over time.
-
How the C-suite is approaching cyber risk
By: Mimecast
Type: Research Content
As the model for work has changed, so have the C-suite’s perceptions about cyber risk. To dig deeper into those perceptions, this report breaks down the survey responses of 78 business leaders. Continue on and access the findings.
-
Focusing on SIEM Integration: A 6 Point SIEM Solution Evaluation Checklist
By: TechTarget Security
Type: eGuide
Organizations should take careful consideration before implementing a SIEM solution. This expert e-guide will cover six points to consider before selecting a solution and explore the benefits it can bring to your business.
-
Understanding the origins of the security skills shortage
By: Security Journey
Type: Analyst Report
The security skills shortage has hindered organizations’ abilities to build secure programs. This report presents the findings of a study EMA conducted with 129 professionals across multiple industry verticals, seeking to understand how organizations are tackling the difficult challenge of developing secure software. Read on to learn more.
-
E-Guide: Bringing Value to Application Monitoring Through SIM
By: TechTarget Security
Type: eGuide
This expert e-guide describes the value that security information and management systems (SIMs) can bring to both application monitoring and real-time security. See how you can get the most out of SIM by reading on now.
-
A CISO’s guide to attack surface management
By: Palo Alto Networks
Type: White Paper
To protect your attack surface, a modern ASM must work at the speed and scale of the internet to continuously discover, identify, and mitigate all risks. Learn which features to look for in a new ASM, and how to put into place, in this white paper.
-
SIEM IT Decision Center- Checklist #1
By: TechTarget Security
Type: eGuide
If you are looking into deploying your own SIEM system, read this E-Guide to better understand features and functions, how to evaluate deployment and management costs, and the latest trends regarding SIEM platforms.
-
Micro-segmentation: Worth the hype?
By: Illumio
Type: Research Content
The purpose of incorporating micro-segmentation as part of a larger Zero Trust security strategy is to prevent threat actors from moving laterally within a network – but how effective is micro-segmentation in practice? Read this research report for an in-depth analysis of the capabilities, challenges and potential benefits of micro-segmentation.