Information Security Magazine: May 2010 - Data: Do you know where it’s going?
By: Information Security Magazine View more from Information Security Magazine >>
Download this next:
DSP report: Top vendors, guidance & recommendations
By: Ironside Group
Type: Analyst Report
In the face of increasing threats to data security – phishing and malware attacks, poor data lifecycle management and inadequate auditing, to name a few – many organizations have employed a data security platform.
Is your company considering doing the same? To guide your selection process, this KuppingerCole report:
- Highlights 8 essential capabilities of such a platform
- Compares leading vendors
- And more
Dig into the report to begin your evaluation journey.
These are also closely related to: "Information Security Magazine: May 2010 - Data: Do you know where it’s going?"
-
E-Guide: Database Tools for Auditing and Forensics
By: TechTarget Security
Type: eGuide
Database auditing requires more than just the right tools: those tools also have to be properly configured to offer the information that's needed and database performance that's required.
This e-guide presents the best practices for tuning database auditing tools. Continue reading this e-guide to learn more about these best practices which will allow you to audit without forfeiting database performance.
-
What data security looks like in 2024
By: Clear Technologies
Type: Product Overview
These days, your sensitive data likely exists in multiple places, both outside of and within your company.
How can you ensure that your data is safe in all its locations? This overview explains how a data security posture management solution can help by:
- Boosting visibility into user data activity
- Enabling IT flexibility
- And more
Check out the overview to learn about one such solution: IBM Security Guardium Insights.
Find more content like what you just read:
-
OWASP Top Ten: How to keep up
By: Contrast Security
Type: eBook
The newest addition to the OWASP Top Ten was recently published to help organizations assess their application security efforts – but false positives could lead to unnecessary stress. Download now to learn how Contrast’s observability platforms is designed to keep up with the rapidly expanding scope of the OWASP Top Ten.
-
Data security: Don't make these 5 common mistakes
By: Ironside Group
Type: eBook
Take a look through this IBM Security e-book to learn how to avoid five common data security missteps.
-
Why server security has to change in the ChatGPT era
By: Dell
Type: Blog
Discover in this TechTarget blog post how security must evolve in the era of ChatGPT, and how Dell Technologies can help provide the highest levels of application and data security.
-
Why server security is top priority for cybersecurity decision makers
By: Dell
Type: Resource
Dive into this TechTarget resource for a close look at 4 key security factors for IT and cybersecurity teams to consider when choosing a server vendor in 2023.
-
Analyst paper: Intro to modern datacenter network fabric
By: Aruba Networks
Type: Analyst Report
As they adopt more applications and increase their data volumes, today’s organizations must ensure that their datacenter infrastructure can facilitate the agility and security that these workloads demand. One way to support that mission is by modernizing the datacenter network fabric. Learn all about the approach in this IDC white paper.
-
Technical Guide on Malware Trends
By: TechTarget Security
Type: eGuide
TechTarget’s Security Media Group presents a comprehensive guide to malware trends. Our experts help you adopt your security strategies, policies and spending to address the ever-changing and customized world of malware to keep targeted attacks, phishing scams and other malware-based attacks at bay.
-
Threat Management: Devising a new strategy to tackle today's cyberattacks
By: TechTarget Security
Type: Essential Guide
This Information Security Essential Guide on Threat Management explores the new strategies organizations are developing to tackle the threat of today’s growing malware threats and targeted attacks.
-
E-Guide: Identifying and addressing evolving threats
By: TechTarget Security
Type: eGuide
This expert resource offers key insight into the true definition of cyberthreats and uncovers 4 essential steps to consider when developing your IT security strategy for 2012.
-
Log management best practices
By: TechTarget Security
Type: eGuide
Investing in the correct log management tool can ensure that the pressures of maintaining enterprise system log data are greatly decreased. Although the right tool is very helpful, the possibility of it turning into the wrong tool can happen in the blink of an eye if the correct steps are not taken.
-
SIM Technical Guide
By: TechTarget Security
Type: Ezine
In this SearchSecurity.com Technical Guide on security information and event management (SIEM) systems, we explore the current state of SIEMs in the enterprise today and whether augmentation, cloud service, or rip and repair is your best upgrade option.
-
E-Guide: Bringing Value to Application Monitoring Through SIM
By: TechTarget Security
Type: eGuide
This expert e-guide describes the value that security information and management systems (SIMs) can bring to both application monitoring and real-time security. See how you can get the most out of SIM by reading on now.
-
Full Mainframe Protection for The Entire Security Lifecycle eBook
By: BROADCOM, Inc
Type: eBook
If you’ve shifted to a hybrid IT infrastructure, then you’re familiar with the process of reassessing your security management. Throughout your reassessment, did you make sure to consider your mainframe? If not, this e-book can help. Read on to learn about modernizing your mainframe security with Broadcom.
-
Securing the perimeter-less network with increased visibility
By: Fortinet, Inc.
Type: Product Overview
With the death of the network perimeter, cybercriminals have proven that every asset is a potential entry point for an attack. FortiGate Next-Generation Firewalls
-
Combating Today’s Security Threats
By: TechTarget Security
Type: eGuide
In this expert guide, gain a better understanding of advanced persistent threats (APTs) and how you can stay one step ahead. View now to gain key insight into security strategies that can help you protect your organization.
-
Focusing on SIEM Integration: A 6 Point SIEM Solution Evaluation Checklist
By: TechTarget Security
Type: eGuide
Organizations should take careful consideration before implementing a SIEM solution. This expert e-guide will cover six points to consider before selecting a solution and explore the benefits it can bring to your business.
-
The Future of Next-Generation SIEM
By: TechTarget Security
Type: eGuide
This expert E-Guide explores what it means to be an "ideal" security information and event management (SIEM) system and takes a look into a crystal ball to explore five futures SIEMs must conquer to be considered next-gen systems. View now to learn more!
-
What should you ask a pentesting service provider?
By: Trustwave
Type: White Paper
To augment their security stances, many organizations have partnered with a penetration testing (pentesting) service provider. Is your business considering doing the same? Step in “11 Questions to Ask Your Pentesting Service Provider,” a white paper that can guide your market exploration. Read now to unlock insights.
-
E-Guide: Physical Security Awareness and Smartphone Security Policy
By: TechTarget Security
Type: eGuide
In this e-guide, gain key insight for establishing better physical security and employee awareness for device usage. View now to uncover best practices and technologies that can help you lock down devices, and how to put device responsibility back in the hands of the employee.
-
Building a successful data loss prevention program
By: Reply
Type: eBook
Data breaches and the resulting data loss can lead to destructive results. An effective data loss prevention (DLP) solution eliminates data duplication and can help centrally manage data and eliminate serious breaches. This e-book looks at what it takes to develop a successful DLP solution in order to secure your organization. Read on to learn more
-
Enhance your mainframe security with Broadcom
By: BROADCOM, Inc
Type: White Paper
Your mainframe houses sensitive data—data that threat actors work hard to exfiltrate through phishing attacks. In the face of this threat, how can you strengthen your mainframe security? Unlock tips in this guide.
-
How to retain security analysts & more: A discussion
By: Endace
Type: Webcast
Darktrace’s VP of Tactical Risk and Response joins Michael Morris in this episode of Endace’s “Secure Networks: The Packet Forensics Files.” The two discuss nation-state cyberattacks, recent security mandates, and more. View now to unlock their insightful conversation.
-
How Crytica can prevent breaches
By: Crytica Security, Inc.
Type: Case Study
Crytica’s specialization in monitoring and detection allows them to stop breaches before they happen. This case study takes an in-depth look at a security breach perpetrated by ALPHV (aka BlackCat) against MGM, which cost $110 million in damages. Read on to learn more.
-
Endpoint Security IT Decision Center Handbook 2
By: TechTarget Security
Type: eGuide
Access this expert handbook to discover which features any endpoint protection software should have, and 10 questions to ask your vendor before choosing your next IT security investment.
-
Enterprise Strategy Group Showcase: Attack surface management
By: Ionix
Type: ESG Showcase
Organizations in the middle of digital transformation initiatives face many security challenges due to their growing attack surfaces. This ESG showcase looks at attack surface management (ASM) solutions, specifically focusing on how IONIX ASM can help organizations monitor, control, and secure their attack surface. Read on to learn more.
-
Unlock a conversation about threat hunting & more
By: Endace
Type: Webcast
In this webcast, Endace’s Michael Morris chats with Packet Pioneer’s Chris Greer about threat hunting’s benefits, the factors that inhibit security teams on their journeys to leveraging threat hunting, and more.
-
6 Point SIEM Solution Evaluation Checklist
By: TechTarget Security
Type: eGuide
This E-Guide from SearchSecurity.com explores the top six evaluation criteria you should keep in mind when investing in a security information and event management (SIEM) solution. View now to learn more!
-
Independent analysis of Bitdefender GravityZone
By: Bitdefender
Type: White Paper
Hackers are constantly advancing their tools and strategies to perform attacks more effectively. But when compared to those of hackers, how do your tools compare? This white paper presents the results of an independent test conducted by AV-Comparatives to provide an objective analysis of Bitdefender GravityZone. Read on to learn more.
-
Top 5 Use Cases for Splunk Enterprise Security
By: Splunk
Type: White Paper
Security teams are flooded with alerts, and without the proper tools, false alarms can create enough noise to allow real threats to bypass security. This white paper provides 5 use cases businesses can use to better leverage Splunk Enterprise security in order to support their security teams and improve response times. Read on to learn more.
-
Attack surface management buyer’s guide
By: Ionix
Type: Analyst Report
The evolution and adoption of new digital technologies has led to a rapid expansion of the attack surface. This Kuppingercole report aims to provide an overview of the attack surface management (ASM) market and give you a compass to help you to find the solution that best meets your needs. Read on to learn more.
-
SIEM IT Decision Center- Checklist #2
By: TechTarget Security
Type: eGuide
This white paper presents SIEM use cases and technical information for security and compliance pros to better understand the threat landscape and help move their RFP process forward.
-
Micro-segmentation: Worth the hype?
By: Illumio
Type: Research Content
The purpose of incorporating micro-segmentation as part of a larger Zero Trust security strategy is to prevent threat actors from moving laterally within a network – but how effective is micro-segmentation in practice? Read this research report for an in-depth analysis of the capabilities, challenges and potential benefits of micro-segmentation.
-
How Analysts Can Confidently Remediate Security Incidents
By: Endace
Type: Product Demo
In this video, Endace’s Michael Morris demonstrates an integration and workflow between Endace, Cisco Firepower and Splunk Enterprise. View now to understand how the workflow can enable analysts to more confidently remediate security incidents.
-
3 ways to secure modern edge networks
By: Fortinet, Inc.
Type: White Paper
Fortinet's Hybrid Mesh Firewalls provide centralized management & AI-powered protection for hybrid networks. Leveraging proprietary security chips, the solution secures data centers, branches, public clouds & remote sites.
-
2023 Elastic Global Threat Report
By: Elastic
Type: Research Content
This 2023 Elastic Global Threat Report forecasts 5 threat trends to watch out for in 2024. Read the report and come away with an understanding of how to prevent cybersecurity threats through enhanced visibility, novel capabilities and seasoned expertise.
-
Understanding the modern EDR market: Buyer's guide & more
By: iT1 Source
Type: Buyer's Guide
To understand the four elements of modern endpoint detection and response (EDR) and how to find a solution that can deliver them, take a look through this buyer’s guide.
-
Third party risk management: A path to a program
By: Coalfire
Type: White Paper
This white paper dives into what risks third-party management faces and how it can change the course of a cyber program. Read on to learn more.
-
Modernizing SOC: Catalysts and Strategies
By: Endace
Type: Webcast
In this webcast, Vectra AI’s Technical Director joins Endace’s Michael Morris in a conversation about SOC modernization. They discuss the trend’s causes, the core principles of a successful modernization strategy, and more.
-
Unlocking the Opportunity of SIEM Technology
By: TechTarget Security
Type: eGuide
Explore how a security information and event management (SIEM) system works, what types of data you can integrate into it, the process for detecting threats/incidents, and steps you should take to develop a successful SIEM capabilities.
-
SIEM IT Decision Center- Checklist #1
By: TechTarget Security
Type: eGuide
If you are looking into deploying your own SIEM system, read this E-Guide to better understand features and functions, how to evaluate deployment and management costs, and the latest trends regarding SIEM platforms.
-
Speeding up vulnerabilty detection with automation
By: ServiceNow
Type: eBook
Almost half of all CIOs believe their cybersecurity may not be on par with their digital transformation efforts, but 80% of organizations that use automation say they can respond to vulnerabilities in a shorter timeframe. Download this white paper to help
-
How Tanium Threat Response Augments Endpoint Detection and Response (EDR) and SIEM solutions
By: Tanium
Type: White Paper
While SIEM and EDR solutions provide a wealth of information, there is a threshold that many investigators run into – a point where visibility ends. Access this white paper to learn about a platform designed to supplement the threat intelligence and detections coming from your SIEM an EDR solutions.
-
How Organizations With An Emerging Cybersecurity Program Can Accelerate Risk Reduction
By: AT&T Cybersecurity
Type: White Paper
Whether or not your organization plans to utilize consultants, AT&T Cybersecurity Consulting crafted this white paper to clarify initiatives for an emerging program. Learn more by downloading this paper today.
-
The Improvement and Evolution of SIEM
By: TechTarget Security
Type: eGuide
Get an in-depth look at the past, present and future of security information and event management (SIEM) technology in this informative E-Guide from SearchSecurity.com.
-
White Paper: Evaluator’s Guide For Managed Detection and Response (MDR) Services
By: AT&T Cybersecurity
Type: eBook
Managed detection and response (MDR) tools play a key role in enabling streamlined and unified security processes – however, finding the right MDR solution can be challenging. Read this MDR buyer’s guide to learn the basic MDR services, evaluation criteria, pitfalls to avoid, and more.
-
SIEM Best Practices for Advanced Attack Detection
By: TechTarget Security
Type: eGuide
The industry has panned SIEM as an expensive and under performing technology. But to be clear, it's not a technology problem, it's a process issue. In this tech tip, Securosis analyst Mike Rothman will outline a time tested process to build SIEM policies which actually alert on the attacks you need to protect against.
-
Security Big Data: Preparing for a Big Data Collection Implementation
By: TechTarget Security
Type: eBook
This expert e-guide from SearchSecurity.com offers realistic advice to help your enterprise information security team understand what technology and processes must be in place in order to properly and securely take advantage of big data.
-
A CISO’s guide to attack surface management
By: Palo Alto Networks
Type: White Paper
To protect your attack surface, a modern ASM must work at the speed and scale of the internet to continuously discover, identify, and mitigate all risks. Learn which features to look for in a new ASM, and how to put into place, in this white paper.
-
Keeping your cybersecurity on pace with your innovation
By: Reply
Type: eBook
As more enterprises push towards continuous digital transformation, they are met with unprecedented cyber risks and often do not have enough specialized support on issues related to innovative technologies. Read this eBook to learn about Pervasive Security, a new paradigm that integrates well with modern digital services implementation initiatives.
-
Tools Designed for Security Could Be Your Biggest Security Threat
By: Tanium
Type: White Paper
How can your organization’s cybersecurity tools become cybersecurity threats? Through tool sprawl. In this white paper, learn how to tackle that issue in three steps.
-
Market trends: The Future of E-mail
By: TechTarget Security
Type: eGuide
Access this expert e-guide to discover the two major trends being used to fight email spam and other threats to the security of your inter-organizational communications.
-
Unlock 24/7 security support with an MSP
By: Flagship Solutions Group
Type: Product Overview
Download this overview to learn about how your organization can unlock 24/7 security support by employing a managed services provider.
-
How Can You Augment Your Security Posture?
By: Novacoast
Type: Product Overview
With cyberthreats multiplying, your organization faces growing risk. In these challenging circumstances, how can you augment your security posture? Download this overview to learn about cybersecurity services that can help.
-
Accelerate Your Incident Response with Corelight and Endace
By: Endace
Type: Product Overview
Today’s cyber landscape brims with threats. Therefore, your organization’s incident response has to be rapid. This overview explores how your business can resolve security incidents up to 20 times faster by leveraging Corelight and Endace solutions. Continue on to learn more.
-
How to Level Up Security Incident Response
By: Novacoast
Type: Product Overview
Download this overview to learn how you can level up your organization’s security incident response management.
-
Planning your XDR journey? Review these questions
By: SentinelOne
Type: White Paper
As they plan their journey to Extended Detection and Response (XDR), what should CISOs and other security professionals keep in mind? This white paper maps out 29 important questions for security leaders to consider. Keep reading and access the questions.