Critical Technologies for Compliance and Risk Management
sponsored by Siperian, Inc.
WHITE PAPER:
Due to the financial meltdown in the mortgage-backed securities industry, new compliance requirements will be implemented. Read this paper to find out how organizations can ensure compliance with stricter regulations and manage risk appropriately so the business does not slip into non-compliance resulting in negative publicity or punitive fines.
Posted: 20 Feb 2009 | Published: 20 Feb 2009
|
|
|
Deploy Real-time Operational Detection and Prevention to Combat Various Threats and Fraud.
sponsored by IBM Software Group
WHITE PAPER:
When you understand people and their names in context and in real time, you have an increased capability to preempt threats and fraud. Find out what you can do to help protect your business.
Posted: 13 Mar 2008 | Published: 01 Jan 2007
|
|
|
Into the Future: The Fast Track for Financial Markets
sponsored by IBM Line of Business
WHITE PAPER:
This paper explores how high performance computing solutions from IBM can enable high-velocity financial analytics and trading.
Posted: 17 Jun 2008 | Published: 01 Sep 2007
|
|
|
Implementing the NIST Cybersecurity Framework
sponsored by Hughes Network Systems
BLOG:
The NIST Cybersecurity Framework helps organizations manage cyber risk. Hughes aligns its solutions to the framework's core functions. Learn how Hughes can help your business implement the NIST framework to protect your network and data.
Posted: 08 Aug 2024 | Published: 09 Aug 2024
|
|
|
AppSec Solution Guide for Complying with New NIST SP 800-53 IAST and RASP Requirements
sponsored by Contrast Security
WHITE PAPER:
The new NIST Cybersecurity Framework now requires interactive application security testing (IAST) and runtime application self-protection (RASP) to improve DevSecOps efficiency and reduce security risks. Learn how these technologies can help your organization comply with the latest NIST guidelines in this detailed white paper.
Posted: 11 Sep 2024 | Published: 11 Sep 2024
|
|
|
Enhancing Healthcare Security: NIST Framework and Health Breach Notification Rule
sponsored by XtelligentMedia Healthcare
EGUIDE:
The collection of best practices and standards found in the NIST Cybersecurity Framework can help healthcare organizations improve their overall security postures.Vendors of personal health records, including health apps and other non-HIPAA-covered businesses, are subject to the Federal Trade Commission's Health Breach Notification Rule.
Posted: 23 Jul 2024 | Published: 23 Jul 2024
|
|
|
Addressing the NIST Cybersecurity Framework 2.0 with the CyberArk Identity Security Platform
sponsored by CyberArk
WHITE PAPER:
Enjoy an overview of the NIST Cybersecurity Framework 2.0, a framework for managing and mitigating cybersecurity risk. Learn how CyberArk's Identity Security Platform can help organizations comply with various subcategories of the framework, by offering solutions for identity security.
Posted: 23 Aug 2024 | Published: 23 Aug 2024
|
|
|
Secure Software Development Environments
sponsored by Zentera Systems Inc.
PRODUCT OVERVIEW:
Secure software development environments are critical to prevent supply chain attacks. This solution brief outlines how Zentera's CoIP Platform can help organizations achieve NIST SP800-218 compliance while maintaining developer productivity through a zero trust architecture. Read the full solution brief to learn more.
Posted: 13 Sep 2024 | Published: 13 Sep 2024
|
|
|
Endace Video 12
sponsored by Endace
WEBCAST:
In his conversation with Endace’s Michael Morris, NIST Fellow Ron Ross shares his thoughts on how cybersecurity standards are evolving with modern threat challenges. Watch now to access his insights.
Posted: 21 Mar 2023 | Premiered: Mar 21, 2023
|
|
|
CoIP® Platform Zero Trust Architecture
sponsored by Zentera Systems Inc.
WHITE PAPER:
Zentera's CoIP Platform provides a comprehensive Zero Trust security overlay that can be rapidly deployed without modifying existing network infrastructure. Learn how CoIP Platform maps to the NIST SP 800-207 Zero Trust Architecture guidelines in this white paper.
Posted: 13 Sep 2024 | Published: 13 Sep 2024
|
|
|
Achieve Quantum Resistance with Utimaco
sponsored by Utimaco
PRODUCT OVERVIEW:
Utimaco's u.trust General Purpose HSM Se-Series offers quantum-resistant cryptography to secure your infrastructure. Upgrade with Quantum Protect firmware that includes NIST-recommended post-quantum algorithms. Evaluate performance with the free PQC simulator. Read the full product overview to prepare for the quantum future.
Posted: 21 Jun 2024 | Published: 21 Jun 2024
|
|
|
The Modern IT Professional’s Guide To Shadow IT
sponsored by Auvik Networks, Inc.
WHITE PAPER:
Unapproved tools put organizations at risk. Learn how to govern, identify, protect, detect, respond, and recover from shadow IT. Read this white paper for a comprehensive plan to shed light on the shadows – also inside, find a self-assessment quiz that helps you determine your risk factor.
Posted: 12 Dec 2023 | Published: 13 Dec 2023
|
|
|
A Partner in Your Zero Trust Journey
sponsored by Merlin International
PRODUCT OVERVIEW:
Merlin Cyber's Zero Trust Assessment helps federal agencies evaluate their Zero Trust maturity and develop an actionable plan to achieve their Zero Trust goals. Learn how Merlin Cyber can guide your agency's Zero Trust journey - read the full content.
Posted: 03 Oct 2024 | Published: 04 Oct 2024
|
|
|
Aligning Ransomware Protection And Recovery Plans With Critical Capabilities
sponsored by Commvault
WHITE PAPER:
A multi-layered security framework is important for data security because it helps to provide several defenses to cover data security gaps that may exist within your infrastructure. Download this e-book to learn how to improve your data security and align internal teams for better ransomware protection.
Posted: 08 Dec 2023 | Published: 08 Dec 2023
|
|
|
Cybersecurity for Medical Devices in a Connected Healthcare System
sponsored by Wind River
EBOOK:
As healthcare systems become more connected, cybersecurity for medical devices is critical to mitigate risks. This white paper examines the key considerations for implementing an effective security strategy throughout the device lifecycle. Read the full white paper to learn more.
Posted: 17 Jun 2024 | Published: 17 Jun 2024
|
|
|
A Practical Guide to Zero Trust Implementation in Multicloud Environments
sponsored by PC Connection
EBOOK:
Explore a practical guide to implementing a Zero Trust architecture in multicloud environments. Learn how to progress your Zero Trust maturity, select the right technologies, and work with a trusted partner. Read the full e-book to secure your modern IT ecosystem.
Posted: 19 Sep 2024 | Published: 20 Sep 2024
|
All resources sponsored by PC Connection
|
|
Navigating Section 524B
sponsored by Wind River
WHITE PAPER:
The FDA's new Section 524B mandates cybersecurity requirements for medical devices. This guide covers navigating the regulations, including monitoring vulnerabilities, secure design, patching, and software bill of materials. Read the full guide to learn how to ensure your medical devices meet the new cybersecurity standards.
Posted: 17 Jun 2024 | Published: 17 Jun 2024
|
|
|
The Value of Runtime Application with Self-Protection
sponsored by Contrast Security
PRODUCT OVERVIEW:
Traditional application security solutions lack visibility into runtime vulnerabilities, leading to ineffective threat detection and high false positives. Contrast Protect runtime application self-protection (RASP) provides accurate, embedded protection that reduces operational burden on security teams. Read the solution brief to learn more.
Posted: 09 Jul 2024 | Published: 09 Jul 2024
|
|
|
Secure Business Critical Data Against Ransomware Attacks
sponsored by Zadara Storage
PRODUCT OVERVIEW:
Asigra and Zadara have partnered to provide a secure, scalable backup and recovery solution as a service. With features like real-time malware detection and 99.999% uptime, this enterprise-grade solution protects critical business data. Read the full overview to learn more.
Posted: 01 Aug 2024 | Published: 01 Aug 2024
|
|
|
Zero Trust, Simplified Benefits of the CoIP® Platform Overlay
sponsored by Zentera Systems Inc.
WHITE PAPER:
Explore the simplified benefits of Zentera's CoIP Platform for implementing a robust Zero Trust architecture. Learn how this software-defined approach can reduce your attack surface, enable rapid compliance, and avoid costly infrastructure changes. Read the white paper to get started.
Posted: 13 Sep 2024 | Published: 13 Sep 2024
|
|
|
Asset Inventory Solution Comprehensive visibility into your connected infrastructure
sponsored by Redjack
PRODUCT OVERVIEW:
Comprehensive asset inventory solution provides dynamic, real-time visibility into your connected infrastructure, helping you build cyber resilience and prioritize security efforts. Learn more in this guide.
Posted: 30 Aug 2024 | Published: 03 Sep 2024
|
|
|
Secure Contractor and Vendor Access
sponsored by Zentera Systems Inc.
PRODUCT OVERVIEW:
This solution brief explores how Zentera's CoIP Platform can provide secure, VPN-free access for contractors and vendors to enterprise applications, with granular access controls and micro-segmentation based on user identity and roles. Learn how to establish a high-security environment for sensitive content access. Read the full solution brief.
Posted: 13 Sep 2024 | Published: 13 Sep 2024
|
|
|
Domain Name System (DNS) Security
sponsored by Cisco
GARTNER RESEARCH REPORT:
SRM leaders must fully understand the FedRAMP program, its security levels, and the authorization process to make informed cloud security decisions. Verify CSP FedRAMP status and ask probing questions. Remember that using a FedRAMP-authorized cloud does not absolve security responsibilities. Read the full Gartner Research Report to learn more.
Posted: 07 Sep 2024 | Published: 07 Sep 2024
|
|
|
2024 Outlook for AI Regulations
sponsored by ModelOp
EBOOK:
As AI regulations rapidly evolve, enterprises must act now to govern their AI initiatives. This e-book outlines the key challenges and steps to get started, including deploying an AI governance inventory, implementing basic controls, and reporting on compliance. Read the full e-book to prepare your enterprise for the future of AI.
Posted: 25 Sep 2024 | Published: 26 Sep 2024
|
|
|
Securely Moving to the (Government) Cloud
sponsored by Cisco
ANALYST REPORT:
It’s no secret that FedRAMP compliance is the staple of government cloud operations. This SANS white paper examines the security requirements of cloud-based resources as well as how you can best position your agency for that transition. Download and read the SANS white paper now to learn more.
Posted: 06 Sep 2024 | Published: 06 Sep 2024
|
|
|
Asset Inventory Solution Comprehensive Visibility Into Your Connected Infrastructure
sponsored by Redjack
PRODUCT OVERVIEW:
Asset inventories may seem deceptively simple, but they can make a serious difference when it comes to cybersecurity. The Redjack platform uses non-intrusive software-based network sensors to give you a comprehensive view of your connected infrastructure. Download the full product overview to learn more.
Posted: 26 Mar 2024 | Published: 26 Mar 2024
|
|
|
Our Top 5 Vulnerable Open Source Components
sponsored by Sonatype
WHITE PAPER:
Software dependencies can equal open-source vulnerabilities. To empower your developers in leveraging open-source components while mitigating risk, read this white paper. Inside, Sonatype evaluates the top 5 open-source components, their vulnerabilities, and remediation recommendations.
Posted: 14 Mar 2024 | Published: 14 Mar 2024
|
|
|
Panzura Edge Your Anytime, Anywhere Secure Gateway To Cloudfs Files.
sponsored by Panzura
PRODUCT OVERVIEW:
The challenges of data management, security, and access are nowhere felt more strongly than edge environments. This data sheet explores how Panzura Edge brings the resilience, security and access control of CloudFS to the distributed workforce across a number of use cases. Download now to learn more.
Posted: 06 Jan 2024 | Published: 06 Jan 2024
|
|