EZINE:
It is not uncommon for computer systems to be compromised by a company's own employees. In this week's issue we look at the Sage data breach, which highlights the risk every organisation faces from its staff. Staff are often motivated by revenge, but sometimes internal logins can be compromised, enabling hackers to circumvent firewalls.
WHITE PAPER:
Databases store extraordinarily valuable and confidential data. An increasing number of compliance regulations compel organizations to audit access to this sensitive data and protect it from attack and abuse.
WHITE PAPER:
Oracle Fusion GRC Applications improve bottom-line performance by continuously monitoring transactions and applying advanced forensic analysis and embedded application controls across business processes. Learn how you can detect more incidents and respond faster, preventing problems before they escalate or even occur.
EZINE:
This month’s issue of Information Security magazine takes you deep inside the Data Accountability And Trust Act (DATA), pending legislation that could reshape the national privacy landscape and impact the way enterprises and midmarket companies architect their security operations.
WEBCAST:
This webinar will go through the most critical challenges faced by mid-market companies, and illustrate how collecting and analyzing event data across the enterprise can address those challenges in the context of budget and staff constraints.
EZINE:
This month’s cover story focuses on the security threats that mobile devices and portable storage introduce. Other articles expound on topics like fraud prevention, security planning, and code outsourcing. Read on to learn about these important subjects and more.
WEBCAST:
View this webcast to explore an intelligent investigation platform that proactively investigates, prevents, detects, and discovers fraud cases.
WHITE PAPER:
This guide makes an effective business case for fraud-prevention technology and evaluates the true impact of fraud on various financial institutions.
WHITE PAPER:
Read this white paper and find out how cybercrimes have become so pervasive and how these sophisticated attacks work. Discover today's cybercrime techniques and how to recognize them.