Tips for Preparing an RFP for SOC-as-a-Service & Evaluation Criteria
sponsored by Cysiv
WHITE PAPER:
SOCs are a critical aspect to effectively identifying and addressing potential threats – however the evaluation process and subsequent RFP drafting process can be overwhelming with the amount of available options. The following white paper provides evaluation best practices and tips to guide RFP drafting to help you get started.
Posted: 14 Oct 2020 | Published: 14 Oct 2020
|
|
|
Thales for Cybersecurity Maturity Model Certification (CMMC)
sponsored by Thales
WHITE PAPER:
The DoD’s Cybersecurity Maturity Model Certification (CMMC) combines various cybersecurity controls standards and has specific requirements for how data is managed. Read this white paper to discover an overview of CMMC, including requirements, best practices and how Thales can help your organizations align with these new guidelines.
Posted: 01 Feb 2021 | Published: 01 Feb 2021
|
|
|
Responding to Public Sector Cybersecurity Threats: Views of Public Sector Professionals and Where-to From Here
sponsored by BlackBerry
WHITE PAPER:
If you’re working in the public sector in Australia, look at this in-depth report about the state of cybersecurity on the continent, presented by Blackberry. It details key findings, presents critical themes for a rock-solid cybersecurity strategy and outlines the ‘Essential Eight’ Maturity Model for security technology.
Posted: 16 Oct 2020 | Published: 16 Oct 2020
|
|
|
The Business Executive’s Guide to Cybersecurity
sponsored by Dell SecureWorks
WHITE PAPER:
The days of cybersecurity being a siloed business function is no longer appropriate when considering the financial, reputational and legal implications of today’s cyberthreats. This white paper provides a guide for communication and collaboration between technical and non-technical business leaders – read on to learn more.
Posted: 01 Oct 2020 | Published: 01 Oct 2020
|
|
|
Threat Intelligence Report: RSA Conference Edition 2020
sponsored by Mimecast
WHITE PAPER:
The Mimecast Threat Intelligence Report: RSA Conference Edition provides a comprehensive analysis of the key findings, trends and recommendations observed by Mimecast’s Threat Center team from October to December 2019. Download the report to discover their results – such as the rise of significant cyberattack campaigns by 145% over last quarter.
Posted: 22 Jul 2020 | Published: 22 Jul 2020
|
|
|
How to Manage macOS Systems Remotely with an MDM
sponsored by JumpCloud
WHITE PAPER:
The mobile device management (MDM) and identity and access management (IAM) markets were heavily impacted by the global shift to remote work in 2020. This white paper highlights some of the major changes and offers guidance for remotely securing and managing macOS systems in your fleet.
Posted: 05 Jan 2021 | Published: 05 Jan 2021
|
|
|
3 Powerful Ways to Slash Mobile App Security Costs
sponsored by NowSecure
WHITE PAPER:
There’s never a bad time to find ways to cut costs, enhance productivity and expand security capabilities – especially when it comes to the constantly evolving mobile application landscape. Download this white paper to review 3 scenarios that showcase how automating mobile app security testing can save money while fostering productivity.
Posted: 15 Jun 2020 | Published: 15 Jun 2020
|
|
|
Auth0’s Approach to Information Security Identity in the Real World
sponsored by Auth0
WHITE PAPER:
Identity solutions, like any cybersecurity tool, require more than just strength and ability – they need to be flexible in order to meet the needs of your business environment and fit into your strategy. This white paper takes a closer look at the role of extensibility and practicality for identity solutions, read on to learn more.
Posted: 02 Jul 2020 | Published: 02 Jul 2020
|
|
|
5 Questions Every CIO Must Answer in the Coronavirus Age
sponsored by Hitachi Vantara
WHITE PAPER:
The Coronavirus has completely changed the notion of a business environment, and there’s no telling when employees will be back in the office, if ever. In order to help IT and security leaders address these challenges, this white paper offers 5 questions for CIOs to ask themselves right now regarding identity and access management (IAM).
Posted: 25 Jun 2020 | Published: 23 Jun 2020
|
|
|
Key Steps in Defining a Shared Responsibility Model for Public Cloud Services
sponsored by Alert Logic
WHITE PAPER:
As public cloud has become more widely adopted, cybercriminals have altered their tactics to exploit cloud environments. Read this e-guide to discover how (and why) to implement the Shared Responsibility Model for public cloud services.
Posted: 16 Feb 2021 | Published: 16 Feb 2021
|
|
|
|
|