Log More to Improve Visibility and Enhance Security
sponsored by CrowdStrike
WHITE PAPER:
ph
Posted: 22 Sep 2023 | Published: 22 Sep 2023
|
|
|
Cyber-Resilient Infrastructure Starts with Server Security
sponsored by Dell Technologies & AMD
WHITE PAPER:
In this White Paper, discover how Dell's PowerEdge servers combined with AMD's EPYC line or processors can keep your datacenter secure.
Posted: 16 May 2023 | Published: 16 May 2023
|
|
|
Six Myths of SIEM
sponsored by IBM
WHITE PAPER:
Traditionally, SIEM solutions were complex and targeted towards larger organizations. But with the need for security solutions ever-increasing, progressive SIEM vendors cater to businesses of all sizes.In this white paper, uncover the top 6 myths about SIEM and what organizations should expect from SIEM today. Read on to learn more.
Posted: 20 Oct 2021 | Published: 06 Oct 2020
|
|
|
CISSP Exam Guide: Chapter 1: Security and Risk Management
sponsored by McGraw Hill
WHITE PAPER:
In this 174-page chapter download from McGraw Hill, learn everything you need to know about the first domain, security and risk management, to help you excel at your CISSP exam.
Posted: 08 Mar 2021 | Published: 31 Dec 2020
|
|
|
2020 State of SOAR Report
sponsored by Palo Alto Networks
WHITE PAPER:
Get your copy of the State of SOAR Report 2020 and see how your security team can leverage SOAR to improve, automate and securely enable your SOC.
Posted: 08 Feb 2021 | Published: 05 Jan 2021
|
|
|
What Is The Next Step For Next-Gen Antivirus?
sponsored by Palo Alto Networks
WHITE PAPER:
Enterprises need new strategies and more intelligent investments to holistically protect their valuable data from adversaries today and in the future. Get the paper today and protect your organization against tomorrow's attacks.
Posted: 08 Feb 2021 | Published: 05 Jan 2021
|
|
|
Are Devops And Security Mutually Exclusive?
sponsored by Puppet
WHITE PAPER:
IBM research has found that it costs 6 times more to fix a bug found during implementation than to fix one identified during design. Accelerating software delivery has obvious implications for your security practice. In this guide, learn how to make DevOps assist your security agenda, rather than threaten it.
Posted: 08 Feb 2021 | Published: 08 Dec 2020
|
|
|
Enable And Protect Your Remote Workforce
sponsored by AT&T Cybersecurity
WHITE PAPER:
Download this white paper to learn about the cybersecurity challenges associated with an increasingly remote and virtual workforce, and what to look for in a remote security solution.
Posted: 08 Feb 2021 | Published: 30 Oct 2020
|
|
|
GoSecure Cybersecurity Perceptions Versus Reality
sponsored by GoSecure
WHITE PAPER:
This 29-page research report provides the key findings from a recent GoSecure survey designed to better understand the biases, gaps and misconceptions surrounding cybersecurity. Read on to learn more about this disconnect and discover how to address and overcome it.
Posted: 08 Feb 2021 | Published: 16 Sep 2020
|
|
|
Danger within: email and security awareness training strategies for effective account takeover protection
sponsored by Mimecast
WHITE PAPER:
It’s a common misconception that email-borne attacks come only from outside the organisations. Can your employees discern an impersonation email or email attack using a legitimate internal account? How good is your security posture? Take a look at this whitepaper how you can create more effective email security as well as a more vigilant workforce.
Posted: 08 Feb 2021 | Published: 24 Aug 2020
|
|
|
The state of SIEM
sponsored by AT&T Cybersecurity
WHITE PAPER:
Take a look at the state of the SIEM in 2020 and how platforms like AT&T Unified Security Management (USM) are redefining this space by going beyond simply collecting, correlating, and analyzing log data.
Posted: 08 Feb 2021 | Published: 21 May 2020
|
|
|
The Relationship Between Security Maturity and Business Enablement
sponsored by AT&T Cybersecurity
WHITE PAPER:
AT&T Cybersecurity, in partnership with ESG, completed a research survey to parallel the NIST cybersecurity framework by assessing organizations’ postures across the 5 foundational cybersecurity functions from the framework: Identify, Protect, Detect, Respond, and Recover. Read on to uncover the results.
Posted: 08 Feb 2021 | Published: 20 May 2020
|
|
|
5 Building blocks for strengthening your IT security program
sponsored by AT&T Cybersecurity
WHITE PAPER:
Given how rapidly cybersecurity threats emerge and change, it can be hard to keep up. Security leaders must be ready to build security programs that will take their operations to a whole new level of risk reduction— without hampering the flexibility and recovery offered by digital transformation in a post-pandemic business world.
Posted: 08 Feb 2021 | Published: 08 May 2020
|
|
|
A guide to build vs. buy service models for threat detection and response
sponsored by AT&T Cybersecurity
WHITE PAPER:
Many important considerations and factors go into choosing DIY vs. managed service models for threat detection and response. Each has pros and cons, plus tradeoffs from both a risk and cost perspective. In this guide, decide which path is best for your organization today.
Posted: 08 Feb 2021 | Published: 07 May 2020
|
|
|
PERIMETER SECURITY NOISE LEAVES APPLICATIONS VULNERABLE TO ATTACKS
sponsored by Contrast Security
WHITE PAPER:
Learn how you can get AppSec protection that can compensate with the necessary visibility, accuracy, scalability, and ease of deployment to keep pace with modern application vulnerabilities without generating false positives and false negatives.
Posted: 08 Feb 2021 | Published: 08 Apr 2020
|
|
|
How Data Security Enables Cross-Regulatory Compliance
sponsored by Comforte AG
WHITE PAPER:
Understanding current regulatory expectancies and complying accordingly is crucial to the survival of any business storing potentially at risk data. Read this white paper to learn about recent international data protection regulations and discover how you can develop a data-centric compliance strategy.
Posted: 08 Feb 2021 | Published: 31 Jan 2019
|
|
|
8 Simple Steps for Automating Governance, Risk and Compliance (GRC)
sponsored by ServiceNow
WHITE PAPER:
Automating Governance, Risk, and Compliance (GRC) greatly reduces costs and improves efficiency. This paper provided 8 simple steps for automating GRC.
Posted: 08 Feb 2021 | Published: 07 Nov 2018
|
|
|
Ponemon - Costs and Consequences of Gaps in Vulnerability Response
sponsored by ServiceNow
WHITE PAPER:
Ponemon Institute surveyed almost 3,000 IT security professionals across the globe to understand how organizations are responding to vulnerabilities. This paper presents the findings of the most recent report and compares it to the 2018 study – read on for the complete results.
Posted: 08 Feb 2021 | Published: 06 Aug 2020
|
|
|
GETTING GDPR RIGHT
sponsored by Attunity
WHITE PAPER:
Today's businesses can no longer treat customer privacy as an afterthought. Without a singular mandated solution, companies need to create the right GDPR roadmap. Download this white paper to learn more.
Posted: 09 Oct 2018 | Published: 09 Oct 2018
|
|
|
8 Simple Steps for Automating Governance, Risk and Compliance (GRC)
sponsored by ServiceNow
WHITE PAPER:
Automating Governance, Risk, and Compliance (GRC) greatly reduces costs and improves efficiency. This paper provided 8 simple steps for automating GRC.
Posted: 01 Oct 2018 | Published: 07 Nov 2018
|
|
|
Five Principles for Securing DevOps
sponsored by Veracode, Inc.
WHITE PAPER:
Access this white paper to learn the five principles that solutions seeking to integrate application security into DevOps and CI/CD must address.
Posted: 02 Feb 2018 | Published: 02 Feb 2018
|
|
|
How We Build Risk Into Applications
sponsored by Veracode, Inc.
WHITE PAPER:
There are a number of ways you could be building risks into your applications from design to production. Download this infographic to find out how to avoid building risks into your apps in 3 steps.
Posted: 02 Feb 2018 | Published: 02 Feb 2018
|
|
|
Veracode Secure Development Survey
sponsored by Veracode, Inc.
WHITE PAPER:
Download this resource to see how your peers are responding to the biggest challenges to the current state of secure software development and its changing methodologies.
Posted: 02 Feb 2018 | Published: 02 Feb 2018
|
|
|
Software Today: What Applications Now Look Like
sponsored by Veracode, Inc.
WHITE PAPER:
Download this infographic to see how modern applications are different today, and learn where you can take steps to prevent security risks throughout the development process.
Posted: 02 Feb 2018 | Published: 02 Feb 2018
|
|
|
Firewall Buyer's Guide
sponsored by Palo Alto Networks
WHITE PAPER:
Your network is more complex than ever before and because of this complexity along with your security infrastructure, your ability to respond to cybersecurity challenges may be hindered. Read this Firewall Buyer's Guide to uncover 10 considerations to keep in mind when choosing a firewall to advance your security posture and incident response.
Posted: 28 Nov 2017 | Published: 28 Nov 2017
|
|