A Security Engineer’s Nightmare
sponsored by Cribl.io
WHITE PAPER:
For security pros, preventing breaches and ensuring data privacy is hectic enough – having an incompetent system on top of these challenges can introduce new levels of stress. Read this white paper to learn how Cribl is helping security engineers log information and incidents so they can focus their efforts on more important tasks.
Posted: 19 Nov 2020 | Published: 19 Nov 2020
|
|
|
2020 Election Security
sponsored by WhiteHat Security
WHITE PAPER:
Around the globe, we’ve witnessed how cybercriminals can create chaos during election cycles by disqualifying legitimate voters, corrupting voter data and launching denial-of-service attacks. In recent years, U.S. elections have come under continuous assault. See this white paper to learn about the security challenges this causes for the country.
Posted: 17 Nov 2020 | Published: 17 Nov 2020
|
|
|
Intelligent Privacy Automation: The Future of Data Privacy
sponsored by ServiceNow
WHITE PAPER:
Growing privacy concerns and emerging data privacy laws require organizations to not only know the location and usage of all personal data, but operationalize their privacy policies and accommodate a timely response to data access requests. But how can you ensure you’re always in compliance? Read this white paper to get the answer.
Posted: 12 Nov 2020 | Published: 12 Nov 2020
|
|
|
Automate Data Security
sponsored by Red Hat
WHITE PAPER:
Financial services firms must comply with a range of increasingly strict security and privacy standards. However, using joint solutions can take a DevSecComplianceOps approach to automate application building, testing, and deployment. View this white paper to learn more.
Posted: 11 Nov 2020 | Published: 11 Nov 2020
|
|
|
Attacking and Defending a Distributed Workforce
sponsored by ServiceNow
WHITE PAPER:
The shift to a distributed, remote workforce has exposed businesses to new attack vectors, including confidentiality threats, remote business process threats and availability threats, all of which alter company risk profiles. What does this mean for network professionals and risk management? Read this white paper to get the answer.
Posted: 11 Nov 2020 | Published: 11 Nov 2020
|
|
|
Covid-19 Lessons Learned—Business Continuity Management
sponsored by ServiceNow
WHITE PAPER:
Regardless of whether an organization had a business continuity management (BCM) program in place prior to COVID-19, 2020 has been a learning experience for the shortcomings of most BCM programs. This white paper highlights common oversights and lessons learned regarding BCM in the era of COVID-19 – read on to get started.
Posted: 11 Nov 2020 | Published: 11 Nov 2020
|
|
|
Modernize Your Video Security Solution with AI and Analytics
sponsored by Motorola, Inc.
WHITE PAPER:
Within the next 5 years, there will be around 45 billion cameras on Earth. This abundance of information and data far outweighs our ability to process and analyze all this information on our own. In this white paper, learn about Motorola’s Avigilon, an assistive AI technology that helps security operators to detect critical events.
Posted: 06 Nov 2020 | Published: 06 Nov 2020
|
|
|
What You Should Know About Your Identity & Access Management
sponsored by Beta Systems
WHITE PAPER:
This 34-page whitepaper offers a comprehensive deep dive into Garancy Access Intelligence Manager (AIM) – an offering designed to help organizations monitor data sources, analyze access permissions, meet compliance requirements and address threats. Read on to learn more about its key features and capabilities.
Posted: 04 Nov 2020 | Published: 31 Jan 2019
|
|
|
Methodology of an IAM Introduction
sponsored by Beta Systems
WHITE PAPER:
IAM projects fail more often than one thinks, but why? Well, sometimes people think too big or too small, or they don't plan at all and often they simply underestimate the complexity of the overall project. For a successful IAM implementation, one must understand all the factors at play. Access this white paper to learn them.
Posted: 03 Nov 2020 | Published: 03 Nov 2020
|
|
|
Secure SD-WAN: A Comprehensive Guide
sponsored by Fortinet, Inc.
WHITE PAPER:
With the rapid rise in SaaS and IaaS use, many network engineering and operations leaders are looking to replace their outdated WAN infrastructures with SD-WAN. While selecting the right SD-WAN for a particular use case may require a few compromises, security shouldn’t be one of them. Access this guide to learn about secure SD-WAN.
Posted: 29 Oct 2020 | Published: 03 Oct 2019
|
|
|
Risk Management Best Practices for Privileged Access Management (PAM)
sponsored by Quest
WHITE PAPER:
Applying risk management best practices to privileged access management (PAM) can provide a solid framework for threat awareness, and it can help organizations organically meet the rising number of compliance requirements. Read this white paper to learn 8 best practices for applying risk management to PAM.
Posted: 28 Oct 2020 | Published: 28 Oct 2020
|
|
|
Tips for Preparing an RFP for SOC-as-a-Service & Evaluation Criteria
sponsored by Cysiv
WHITE PAPER:
A 24/7 SOC identifies, investigates and resolves threats that target infrastructure, sensitive data, and ongoing business operations. But building a SOC can be time-consuming, complex and expensive, which is why organizations are turning to SOC-as-a-Service (SOCaaS). Read this guide to learn tips for preparing an RFP for a SOCaaS provider.
Posted: 28 Oct 2020 | Published: 28 Oct 2020
|
|
|
Maintaining Business Momentum In The Face Of Forced Change: The Active Directory Angle
sponsored by Quest
WHITE PAPER:
With the frantic pace of today’s business world, organizations struggle to keep up with requests to create, change and remove access to their on-premises AD. This scenario becomes even more complicated when you mix in a hybrid AD environment. Read this white paper to learn why properly-tuned AD lifecycle management is crucial for handling change.
Posted: 27 Oct 2020 | Published: 27 Oct 2020
|
|
|
Blueprint for a Future-Ready Workforce
sponsored by VMware International Unlimited Company
WHITE PAPER:
When global events caused companies to rapidly pivot to remote work, IT had to act fast. In terms of PC lifecycle management, it quickly became apparent that legacy approaches were no longer adequate. Advance your strategy by reading this white paper, which offers a blueprint for your journey to a future-ready workspace on Windows 10.
Posted: 27 Oct 2020 | Published: 31 Jul 2020
|
|
|
The Best of Both Worlds: Hybrid IAM Offers Flexibility and Enhanced Security
sponsored by Quest
WHITE PAPER:
Within the identity and access management (IAM) market, the cloud segment is experiencing significant growth – especially among distributed workforces. This white paper discusses how cloud has shaped the IAM market and the benefits of cloud/hybrid IAM offerings.
Posted: 27 Oct 2020 | Published: 27 Oct 2020
|
|
|
The Future-Ready SOC: Using XDR to Achieve Unified Visibility and Control
sponsored by VMware International Unlimited Company
WHITE PAPER:
The technological and procedural silos that exist between IT and security operations center (SOC) team members have impeded an enterprise’s ability to effectively mitigate risk. Turn the tide – read this white paper to examine how extended detection & response (XDR) can help.
Posted: 27 Oct 2020 | Published: 30 Sep 2020
|
|
|
Why Passwords Stink
sponsored by Beyond Identity, Inc.
WHITE PAPER:
Although still widely used across organizations, passwords remain one of the weakest links in an organization’s security efforts – exploited in 81% of hacking-related breaches, according to Verizon. This white paper underlines the problems with passwords and suggests alternative authentication methods – read on to get started.
Posted: 27 Oct 2020 | Published: 27 Oct 2020
|
|
|
Threat Report: TeamTNT: The First Cryptojacking Worm to Steal AWS Credentials
sponsored by Cysiv
WHITE PAPER:
Because most online services now run in the cloud (AWS, Azure, Google Cloud, etc.), these cloud service providers have become an important new target for cybercriminals to install cryptojacking malware and to mine cryptocurrency. The Cysiv threat research team has analyzed this malware – read their report to learn what they discovered.
Posted: 27 Oct 2020 | Published: 19 Oct 2020
|
|
|
How to Approach an Identity Management & Governance Program
sponsored by Quest
WHITE PAPER:
Although already widespread in use, identity and access management (IAM) programs are expected to continue to grow in popularity, especially among remote workforces. This white paper underlines the importance of a diligent IAM program and provides readers with the 5 basic tenets of an effective approach to IAM.
Posted: 26 Oct 2020 | Published: 26 Oct 2020
|
|
|
Hacking Active Directory – From A Pen Tester
sponsored by Quest
WHITE PAPER:
Active Directories (AD) provides authentication and protects credentials, information systems and intellectual property from unauthorized access – protecting your organization from financial and reputational harm. However, cybercriminals have found ways to exploit ADs – read this white paper to see the 8 most common AD-specific threats.
Posted: 26 Oct 2020 | Published: 26 Oct 2020
|
|
|
Security Starts Here AD: Account Lifecycle Management
sponsored by Quest
WHITE PAPER:
Active Directory (AD) security is no laughing matter. Your users are depending on you to grant them the right permissions without delay or compromise, but if your AD suffers a security breach, you and your organization are both in big trouble. Don’t get caught out – read this white paper on Active Directory-centered identity management.
Posted: 23 Oct 2020 | Published: 23 Oct 2020
|
|
|
The 2020 Spotlight Report on Office 365
sponsored by Vectra AI
WHITE PAPER:
Account takeovers are responsible for upwards of $7 billion in annual losses across multiple industries, according to Forrester. The following Spotlight Report from Vectra provides a comprehensive analysis of the cyberthreats targeting Office 365 users, and why some of these attacks are succeeding – read on to learn more.
Posted: 22 Oct 2020 | Published: 22 Oct 2020
|
|
|
Security for Modern Data Centers
sponsored by Fortinet, Inc.
WHITE PAPER:
Data centers are a magnet for cybercriminals – likely due to the amount of sensitive or confidential information they manage. This Ponemon Institute white paper provides an overview of the importance of data center security and how to protect modern data centers – read on to get started.
Posted: 22 Oct 2020 | Published: 22 Oct 2020
|
|
|
Critical Considerations for Securing Hybrid and Hyperscale Data Centers
sponsored by Fortinet, Inc.
WHITE PAPER:
Modern hybrid and hyperscale data center architectures must include security that can keep pace. But in many of these data center environments today, traditional network security solutions underperform and underserve, forcing compromises on either security or performance. Read this checklist to learn how you can work around this issue.
Posted: 22 Oct 2020 | Published: 22 Oct 2020
|
|
|
Emergency Preparedness: Was Your Company Ready for COVID-19?
sponsored by VMware International Unlimited Company
WHITE PAPER:
Emergency preparedness is tricky – it’s nearly impossible to plan for every emergency or incident. This research report from Osterman Research provides an in-depth analysis of emergency preparedness plans pre-COVID-19 and offers best practices for improving incident readiness going forward.
Posted: 22 Oct 2020 | Published: 30 Apr 2020
|
|