All Research Sponsored By:TechTarget Security

Are You Ready for RASP?
EBOOK: This runtime application self-protection handbook covers the basics and offers advice on RASP implementation for IT security professionals.
Posted: 24 Oct 2016 | Published: 21 Oct 2016


Put Endpoint Security in Capable Hands
EBOOK: Endpoint security threat prevention is a critical enterprise IT concern. Learn the latest on keeping endpoints secure.
Posted: 20 Oct 2016 | Published: 20 Oct 2016


From IoT to IDoT: Securing the Identity of Things
EZINE: With devices seeping into everyday work life, the danger to businesses has increased, and companies should worry about who is bringing what into the workplace and which corporate devices pose risks. In this issue of Information Security, we discuss the Identity of Things problem, and how you can solve it.
Posted: 03 Oct 2016 | Published: 03 Oct 2016


What to Look for in Web Fraud Detection Systems
EBOOK: In this TechTarget Buyer's Guide readers will learn the key features of a Web fraud detection product and how to choose the best product for their company.
Posted: 28 Sep 2016 | Published: 23 Mar 2016


A Certified Concern
EBOOK: Can that CA be trusted? Certificate authority risks are many, but since there's no avoiding SSL and TLS, at least for now. Here's how to increase CA security.
Posted: 21 Sep 2016 | Published: 20 Sep 2016


5 Steps to Raising Ransomware Resistance
EBOOK: This TechGuide explores the nature of the threat and the latest ransomware trends. It outlines several steps information security pros should take in order to heighten their organization's resistance and prevent ransomware attacks.
Posted: 16 Sep 2016 | Published: 16 Sep 2016


Cloud Services Take Off, GRC Doesn't
EZINE: The ability for organizations to implement cloud governance models is increasingly challenged by the proliferating use of services by business units and workgroups. This issue of Information Security shares tips on gaining more insight when employees are migrating critical apps and data to the cloud.
Posted: 01 Sep 2016 | Published: 01 Sep 2016


Say Hello, Again, to SIEM
EBOOK: This expert handbook provides 3 tips to get the most out of your existing SIEM system. Plus, uncover important SIEM capabilities when evaluating SIEM for real-time analytics use.
Posted: 31 Aug 2016 | Published: 31 Aug 2016


Time for an IAM Overhaul
EBOOK: IAM security policies must take into account the latest technology developments, especially cloud and the Internet of Things. Access this three-part technical guide to gain valuable information on IAM strategy in the face of rapidly evolving technology.
Posted: 19 Aug 2016 | Published: 19 Aug 2016


Buff Up Your Web Apps
EZINE: Secure web apps are essential to modern business. Learn what security risks they present and get our experts' advice on how to overcome them.
Posted: 10 Aug 2016 | Published: 10 Aug 2016


Securing DevOps
EZINE: In this issue of Information Security, adopters of DevOps and security, or DevSecOps, share tips on how to defend the cloud's continuous improvement model.
Posted: 01 Aug 2016 | Published: 01 Aug 2016


Time to Toughen Up for IoT
EBOOK: The list of internet of things challenges is not short, but security is still a top concern. Learn to cut risks and follow IoT security best practices.
Posted: 19 Jul 2016 | Published: 20 Jul 2016


Is UTM Ready for the Big Leagues?
EBOOK: This Technical Guide reviews advanced UTM and what elements make for a truly enterprise-class UTM device.
Posted: 11 Jul 2016 | Published: 11 Jul 2016


Is UTM Ready for the Big Leagues?
EBOOK: This Technical Guide reviews advanced UTM and what elements make for a truly enterprise-class UTM device.
Posted: 11 Jul 2016 | Published: 10 Jul 2014


Information Security Asean July 2016
EZINE: In April, the Philippines suffered its worst-ever government data breach, when personal information, including fingerprint data and passport information, belonging to around 70 million people, were compromised.
Posted: 05 Jul 2016 | Published: 04 Jul 2016


Information Security ANZ July 2016
EZINE: Australia's $230m security strategy serves as a wake-up call to enterprises about the need to take the issue much more seriously.
Posted: 05 Jul 2016 | Published: 04 Jul 2016


Malware Hitching a Ride on Mobile Apps?
EBOOK: The latest mobile app security threats ride into enterprises on employee devices, but you can learn the latest strategies for improving corporate BYOD security.
Posted: 27 Jun 2016 | Published: 20 Jun 2016


What to Look for in Next-Generation Firewalls
EBOOK: This Buyer's Guide goes in-depth on the process of selecting the best next-generation firewall for your company and how to ensure your organization has a clear understanding of its security requirements in the modern threat landscape.
Posted: 09 Jun 2016 | Published: 06 Jun 2016


Moving Beyond Ad Hoc Mobile Security
EZINE: Is security the missing piece in your enterprise mobile strategy? In this issue of Information Security, we ask CISOs and other security experts about the uncertain path from basic protections to threat management and mature mobile security.
Posted: 01 Jun 2016 | Published: 01 Jun 2016


Moving Past the Password? Not So Fast
EBOOK: The password might not be dead, but that doesn't mean it's working. This e-book looks at how other user authentication methods can supplement it, and puts the post-password security landscape in perspective for the future.
Posted: 20 May 2016 | Published: 20 May 2016


Information Security Magazine: Insider Edition
EZINE: Attaining truly 21st century security requires new thinking. Learn how to deal with a vanishing network perimeter and bring on board the best new security tools to protect your enterprise.
Posted: 10 May 2016 | Published: 10 May 2016


What to Look for in Secure Sockets Layer
EBOOK: This Buyer's Guide helps enterprise security pros get up to date on SSL encryption and aids them in determining what SSL certificate is best for their enterprise security strategy.
Posted: 04 May 2016 | Published: 04 May 2016


Is Your Network Too Flat? Prevent Data Breaches with Segmentation
EZINE: How do you determine if your network is too flat? Without proper network segmentation, attackers can easily move around the network, turning a minor problem into a major disaster. Learn about segmentation strategies that can improve your network security infrastructure in this issue of Information Security.
Posted: 02 May 2016 | Published: 02 May 2016


Is It Time to 'Software-Define' Your Network Security?
EBOOK: This guide goes beyond most examinations of security in SDN, goes beyond explaining what SDN is and how it might improve network security. Instead, this publication looks in-depth at specific implementations of SDN. Readers will come away with a freshly packed toolkit of SDN-related actionable advice.
Posted: 20 Apr 2016 | Published: 20 Apr 2016


Cloud Security Gateways Rise to the Data Loss Challenge
EZINE: This issue of Information Security magazine uncovers cloud data loss prevention (DLP) strategies and whether CASBs can offer another layer of protection. Additionally, learn about the Cybersecurity National Action Plan and the readers' top picks for endpoint protection software.
Posted: 01 Apr 2016 | Published: 01 Apr 2016