You've requested...

Share this with your colleagues:

Download this next:

Centralized security tool farm: How you can deploy one

Read “Security at the Speed of Your Network” to learn why organizations are using an architectural approach to improve security posture and reduce costs. Enable security tools to work more efficiently across physical, virtual and cloud environments. Deploy a diverse set of security solutions as a centralized security tool farm. You can secure more data on faster networks with no compromise between security, performance and cost. Read now.

These are also closely related to: "Getting Started with Secure DevOps"

  • Enterprise Security Architecture


    A new approach to Information Security


    Mark Brown, Mark Brown, Director for Advisory Risk & Information Security at Ernst & Young offers advice to security leaders on developing a robust Enterprise Security Architecture.



    • Key trends in information security 2016 to 2012
    • The risk landscape in 2013
    • Key insights on the role of information security in UK businesses
    • Obstacles to effective information security
    • How to close the security gap
    • A roadmap for success
    • Key questions for businesses and business leaders
    • How to redesign the security architecture


    This presentation was first given to a meeting of Computer Weekly’s CW500 Security Club: “Robust Security Architecture: Why you need it and how to get it,” in February 2013.


    Click on the button below to download this report


  • Your guide to HTTP security

    Are you secure? Your free application security guide awaits

    This guide includes:  

    •    3 methods to lessen application security risk
    •    5 lifecycle phases of secure DevOps
    •    OWASP’s best practices for embedded application security (plus potential pitfalls to know)

    Add your valuable security insights to our market research survey to access your application security guide.

Find more content like what you just read:

  • Cloud Content Security: Understanding SaaS data protection

    This expert e-guide examines the growing trend of SaaS security, or cloud-based security services. Learn about the pros and cons of adopting SaaS security in your organization.


  • An inside look: Overcoming app security challenges

    UBM conducted an online survey to explore common trends and challenges in app security, and to understand how security and development teams can work together to close these gaps. Click here for an inside look at the survey results.


  • SecDevOps: The future of DevOps security

    Without better organizational discipline, digital businesses are at risk for massively disruptive data breaches and attacks. Can DevSecOps transform IT in time to avert disaster? Download this article to learn more.


  • Protect your enterprise with NWN Security

    In this solution brief, learn how NWN Security can help you combat the architectural and operational challenges of implementing and maintaining a secure environment.


  • How to use hacker-powered security in your SDLC

    How do you get started with bug bounties and where do they fit in a DevOps workflow? Download this paper to find out.


  • Security the future: Keeping up with the business

    Gareth Lindahl-Wise, group information security manager at British American Tobacco, explains the company's approach to enterprise security architecture.


  • ServiceNow Security Operations: Benefits, costs, and ROI revealed

    This report provides a framework for evaluating the potential financial impact of investing in ServiceNow Security Operations to improve security incident and vulnerability response processes.


  • Protect a multi-cloud enterprise with an agile network security strategy

    In this white paper, learn how to create a multi-cloud network security strategy based on 3 key principles, and examine use cases to see how other organizations keep themselves secure.


  • Benefits of running a security analytics platform in the cloud

    Advanced security threats and attacks are getting harder to detect as hackers are becoming more sophisticated. Download this white paper to learn how the cloud can provide improved security benefits to your organization with a real-time view into advanced attacks and threat actors.


  • 6 steps to implementing the "secure outside in" approach

    Container security is challenging, as it covers so many aspects of the development process and supporting infrastructure. The overall strategy can be simply put as "secure outside in". In this white paper, discover 6 steps to implementing the "secure outside in" approach.


  • Windows Server 2012 Security from End to Edge and Beyond

    This extract from the book Windows Server 2012 Security from End to Edge and Beyond shows you how to plan your platform security requirements and gives you the critical questions to ask.


  • ROI of Veracode's application security platform

    Check out this ROI analysis of Veracode's application security platform to find out just how much more secure your apps could be, and how you can reduce security flaw resolution time by 90%.


  • Securing the enterprise application layer: Expert Guidelines

    If you're a security professional, the focus on application security in IT these days may leave you feeling out of the loop. Yet, in many cases, application security pros rely on the infrastructure team to provide a secure foundation.  Find out how securing a naming and directory service will help build a solid platform that application can trust.


  • Why security strategies should focus on people and data: Insights from a CTO

    In this guide, Jeremy Wittkop, Chief Technology Officer, explains why security leaders should start pivoting their security strategies to emphasize the 2 elements of security that are not likely to be diminished: people and data. Read on to learn more about what he thinks really matters in the future of security and what you can do about it now.


  • SD-WAN security options in different networking architectures

    As enterprises shift more of their workloads to the cloud, they must also evaluate their networking architecture. A big part of this evaluation process is how and where to enforce security on data and applications. Download this white paper to learn about different security options available for SD-WAN and which one is right for you.


  • IT Security Purchasing Intentions 2013

    This in-depth research from Computer Weekly and TechTarget reveals the IT security spending priorities of businesses in the UK and Europe.


  • Enterprise Security Architecture – an outsourcer's view

    Alan Jenkins, chief security officer of outsourcing specialist, T Systems, explains the company's approach to enterprise security architecture.


  • Traditional approaches no longer work in the cloud

    In this security report, discover how Lacework compares security vendors for AWS, Azure, and GCP and dive deeper into common security challenges presented by the cloud.


  • Cybersecurity: The ideal state

    Download this white paper for ways to transform your security efforts advancing from a tactical approach of reacting to threats to a strategic approach that increases the efficiency and effectiveness of your cybersecurity defense.


  • The No BS Guide to Static Application Security Testing (SAST)

    Network security is everywhere and we have all been hyperaware of securing the perimeter and having our firewalls on high alert. Now, application vulnerabilities are being exploited and it's time to do something about it. In this best practices guide, learn the steps to take towards implementing a successful application security program.


  • Maintain enterprise grade voice quality for remote workers

    Digital transformation is the rocket fuel that helps companies boost productivity, engage consumers, and empower their people. However, the new application infrastructure is also posing new workflow challenges and security risks. In this white paper, learn how a secure digital perimeter enables IT to combat these security risks.


  • 7 major security goals for secure web gateway solutions

    In this Gartner Market Analysis, discover how to select the right strategy for securing web access with 7 major security goals.


  • Research for CIOs: Exploring key security trends and issues

    Security no longer lives exclusively in the IT department. In this Forrest report, CIOs can gain insight into the trends and key issues in the security landscape. Also, explore opportunities for improving how security is managed regardless of whether you own the security function.


  • Explore key findings from the Verizon Risk Report

    This Verizon Risk Report uses daily threat cyber-risk intelligence from multiple sources allowing businesses to make data-driven security decisions and focus their security spending on where it will have the most impact.


  • Security considerations for UK enterprises

    This Research Snapshot from Vanson Bourne looks at IT security spending trends, awareness of cyber-threats, and the factors perceived as the biggest security risks for organisations.


  • Security for the PCI compliant environment

    This white paper examines the applicability of Trend Micro's Hybrid Cloud Security Solution, specifically Trend Micro Deep Security, to secure Payment Card Industry (PCI) data in accordance with the PCI DSS when used in physical, virtual, cloud, or container environments.


  • Combatting the security complexity gap

    Download this e-book to see how the complexity gap is impacting organizations and the pivotal role network security policy automation plays in helping organizations reduce risk and enhance their overall security posture.


  • How to get started with security orchestration and automation

    Discover how security orchestration and automation helps teams improve their security posture and create efficiency – without sacrificing control of important security and IT processes.


  • The importance of application security testing tools

    In this Technology Spotlight report, IDC recommends application security testing tools that integrate security throughout the entire software development life cycle. Read on for an in-depth look at the role of WhiteHat Security in the marketplace for application security testing solutions.


  • How to evaluate your security program in the broader context of business risk

    To make informed decisions about risk tolerance and security spending, it is critical to gain insight into the effectiveness of your security architecture, the threat landscape, and vulnerabilities. Download this IDC research report to explore how organizations can evaluate their security programs in the broader context of business risk.


  • Benefits of ServiceNow Security Operations: Infographic

    Download this Forrester Total Economic Impact infographic for a summary of interview findings from 3 customers about their experience using ServiceNow Security Operations.


  • Security Pay Rates: UK Permanent Salary Index February 2013

    This research from Acumin and Computer Weekly charts the rate for the job for over 60 IT security and compliance roles.


  • How to protect your business with security confidence

    No system or network is 100% secure. Attacks can happen to anyone, or any business, at any time. Find out how you can make security central to your business, and protect it against the likely threats that it will encounter.


  • Security playbooks: Context-driven incident response for your SOC

    The security operations center (SOC) is critical to the securing business operations by investigating and negating security incidents. Playbooks assist SOC teams by providing a sequential response process that is both repeatable & targeted at specific incidents. Download this whitepaper to discover the top security playbooks for 2019.


  • CW+: Overview of the Open Group Security Forum

    The Security Forum is a membership group of security experts from both the customer and supply sides of industry, government, and academia, who share a common aim to raise confidence levels in IT business operations.


  • Application security testing: Protecting your application and data

    Application security testing is critical in ensuring your data and applications are safe from security attack. This e-book, written for IT management, including QA and development managers, explains the basics of application security and then delves deeper into common vulnerabilities and performance concerns.


  • How to adapt security strategy while becoming "borderless"

    How are you planning to secure your employees, your company, and your customers in 2019? Watch this webinar to hear from Cloudfare CSO Joe Sullivan on the core strategies he uses to help protect Cloudfare, and—as a result—its 12M domains that rely on it for security and performance.


  • How to get the most value from your security operations

    Security operations are often slowed down by manual processes that would be better left to machines. As a result, security orchestration and automation is becoming an increasingly vital aspect of many organizations' security strategies. In this white paper, explore the benefits and value of security orchestration and automation.


  • Important steps for building security into DevOps

    It's important to build security into your DevOps process. This is easier said than done, but take a look through this DevOps security guide to uncover how to shift security left, who should be responsible for security, and how to quickly improve the quality of the applications you are developing.


  • Continuous security for your cloud: From Orchestration to controls

    Learn what's important when developing a strong program for maintaining continuous security while your business does business in the cloud.


  • 4 critical components of enterprise security

    What's the key to effective enterprise security? In this white paper, explore the 4 critical principles of effective enterprise security. Review the importance of a multi-layered data security strategy, and learn how to manage your security at scale.


  • Container security: Analyst recommendations

    Read this blog from the Gartner Security & Risk Management Summit for Gartner's top 3 recommendations on container security and how Veracode can help you meet their #1.


  • CloudPassage Halo: Product demo

    CloudPassage Halo is a cloud security platform for severless, server-based and containerized assets in public and hybrid cloud environments. In this video, watch a demo of how Halo Cloud Secure can assess the security and compliance posture of an AWS account and the assets it contains.


  • How to secure dynamic data centers and clouds

    In this white paper, learn about a different approach to security—one that is adaptive, protects from the inside out, and decouples security from the underlying infrastructure.


  • Building trust in the security of RFID systems

    This article in our Royal Holloway Information Security Thesis Series looks at the growing need for automated tools to verify protocols and address concerns over security and privacy.


  • The best email security comes through strategy and tactics

    Achieving the best email security possible should be a top InfoSec priority. Why? Attackers work day and night thinking up new ways to bypass IT security. In this security handbook, learn how to approach email security both strategically and tactically.


  • ISM Essentials Guide on Cloud and Virtualization Security

    Moving applications, development and data to the cloud means a new paradigm of IT and security management. You’ll need clear visibility into how data moves outside your organization, where it’s stored and who has access to it. This essential guide from ISM offers expert advice on security around your organization’s cloud computing efforts.