10 Cybersecurity Best Practices for Securing Remote Workers
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER:
As a result of the pandemic, organizations are being forced to re-allocate their resources in order to focus on securing their predominantly remote workers. In order to help organizations adjust to the new normal, Arctic Wolf created this checklist of 10 WFH best practices – read on to get started.
Posted: 31 Aug 2020 | Published: 31 Aug 2020
|
|
|
10 Ways to Secure and Accelerate a Modern Workforce
sponsored by Cloudflare
EBOOK:
As organizations become increasingly dependent on remote users (employees, partners and contractors), protecting remote users and managing access becomes a critical part of an organization’s success. Read this e-book to uncover 10 best practices for ensuring remote access security without compromising productivity.
Posted: 30 Apr 2020 | Published: 30 Apr 2020
|
|
|
100 Days of Coronavirus (COVID-19)
sponsored by Mimecast
WHITE PAPER:
To better understand how the coronavirus pandemic has been (and will be) exploited by malicious users, Mimecast created this analyst report, 100 Days of Coronavirus (COVID-19), which analyzes activity across the first 100 days. Download the report to unlock the key trends and recommendations.
Posted: 15 Jul 2020 | Published: 31 May 2020
|
|
|
12 Reasons Why You Need Stronger Mobile App Security
sponsored by NowSecure
RESOURCE:
Whether it’s for internal communication, enhancing customer experience or part of a digital transformation initiative, mobile applications play a critical role and ensuring their protection is paramount. Download this infographic to discover 12 reasons why organizations need stronger mobile app security strategies.
Posted: 22 Jun 2020 | Published: 22 Jun 2020
|
|
|
13 Compliance Frameworks For Cloud-Based Organizations
sponsored by Horangi
WHITE PAPER:
The need for cloud compliance begins as soon as you build on the cloud. Considering the shared responsibility of cloud security, which are the regulatory frameworks that you need to be aware of? Leverage this article to get an in-depth look at 13 of them, broken down by cloud vendor, security framework, industry and location.
Posted: 27 Jan 2021 | Published: 27 Jan 2021
|
|
|
2017 IT Priorities in the Middle East
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE:
Benchmark your IT spending plans with our in-depth study of IT spending priorities in the Middle East.
Posted: 01 Mar 2017 | Published: 01 Mar 2017
|
|
|
2020 APPLICATION SECURITY OBSERVABILITY REPORT
sponsored by Contrast Security
WHITE PAPER:
Nearly 96% of applications contain at least one vulnerability, yet only 26% have a serious vulnerability – modern vulnerability management, especially when it comes to applications – is about effectively prioritization. For more findings and guidance for building an application security strategy, read this research report.
Posted: 21 Sep 2020 | Published: 13 Jul 2020
|
|
|
2020 Cost of Insider Threats Global report
sponsored by Proofpoint
WHITE PAPER:
Each year, the Ponemon Institute conducts a study, known as the Cost of Insider Threats Global Report study, to dissect and examine the costs (direct and indirect) that result from insider threats. Download the report to explore the results of the 2020 study.
Posted: 09 Jun 2020 | Published: 09 Jun 2020
|
|
|
2020 CROWDSTRIKE GLOBAL SECURITY ATTITUDE SURVEY
sponsored by CrowdStrike
ANALYST REPORT:
Supporting a remote workforce has made life even harder for IT security teams in organizations around the world. Cybercriminals have been capitalizing on the chaos, and this has been changing not only mindsets but processes in security. Access CrowdStrike’s 2020 Global Security Attitude Survey to see what’s necessitating security transformation.
Posted: 03 Feb 2021 | Published: 30 Sep 2020
|
|
|
2020 Election Security
sponsored by WhiteHat Security
WHITE PAPER:
Around the globe, we’ve witnessed how cybercriminals can create chaos during election cycles by disqualifying legitimate voters, corrupting voter data and launching denial-of-service attacks. In recent years, U.S. elections have come under continuous assault. See this white paper to learn about the security challenges this causes for the country.
Posted: 17 Nov 2020 | Published: 17 Nov 2020
|
|
|
2020 Enterprise Cloud Incident Response Survey
sponsored by Infoblox
RESEARCH CONTENT:
In this year’s SANS Enterprise Cloud Incident Response (IR) Survey, discover the key challenges that today’s IT and security leaders are facing as it relates to addressing cloud-related threats – which range from external risks like data theft to internal dangers like staffing shortages. Download the report now to get started.
Posted: 16 Feb 2021 | Published: 30 Sep 2020
|
|
|
2020 Remote Workforce Security Report
sponsored by Okta
RESEARCH CONTENT:
Enabling and securing a remote work posed significant challenges to the IT teams responsible. This research report highlights those specific challenges – from internal operational hurdles to external threats – as well as impacts that went beyond security. Read on to unlock the full report.
Posted: 12 Feb 2021 | Published: 12 Feb 2021
|
|
|
2020 Threat Hunting Survey Results
sponsored by DomainTools
RESEARCH CONTENT:
Each year, SANS conducts a Threat Hunting Survey to better understand the threat hunting landscape and how security professionals are conducting threat hunting in their organizations – read on to unlock the results from this year’s survey.
Posted: 18 Dec 2020 | Published: 18 Dec 2020
|
|
|
2021 Cyber Threat Intelligence Survey
sponsored by DomainTools
ANALYST REPORT:
Are you or other members of your organization looking to gain a greater understanding of bad actors and their efforts? Investigate the 2021 SANS Cyber Threat Intelligence Survey, which examines the capabilities, opportunities and intent of adversaries conducting cyber operations.
Posted: 27 Jan 2021 | Published: 27 Jan 2021
|
|
|
2021 Cybersecurity & Threat Intelligence Research Report
sponsored by Infoblox
RESEARCH CONTENT:
Each year, the SANS institute releases a comprehensive report highlight expert insight into all things cyber threat intelligence (CTI). This year’s SANS CTI Survey report explores how the pandemic impacted CTI programs and practices throughout the year. Unlock the full report and discover all of SANS’ findings from last year.
Posted: 11 Feb 2021 | Published: 11 Feb 2021
|
|
|
3 Powerful Ways to Slash Mobile App Security Costs
sponsored by NowSecure
WHITE PAPER:
There’s never a bad time to find ways to cut costs, enhance productivity and expand security capabilities – especially when it comes to the constantly evolving mobile application landscape. Download this white paper to review 3 scenarios that showcase how automating mobile app security testing can save money while fostering productivity.
Posted: 15 Jun 2020 | Published: 15 Jun 2020
|
|
|
3 Steps to Building Business-Centered Data Protection
sponsored by InteliSecure
EGUIDE:
As the threats targeting an organization’s data evolve, so too should data security strategies, approaches and mindsets. Read this white paper to unlock the first 3 steps needed to initiate the transformation from network and perimeter-based security to business-centered security—and help protect your organization into the future.
Posted: 24 Nov 2020 | Published: 24 Nov 2020
|
|
|
3 Steps to Secure Remote Workers and Students
sponsored by Cisco Umbrella
VIDEO:
As remote access appears to become the new norm for students, workers and medical patients, ensuring the security of the users and their devices is critical. In this webinar, join Meg Diaz, head of cloud security marketing at Cisco, as they offer their expertise for securing remote workers and students.
Posted: 05 May 2020 | Premiered: 30 Mar 2020
|
|
|
3 Threat Vectors Addressed by Zero Trust App Sec
sponsored by Traceable
WHITE PAPER:
Zero trust has been around for some time, but implementations of a zero-trust model for network and application security are few and far between. Now, you can explore how a zero-trust approach can help protect applications from 3 dangerous threat vectors. Read the full blog post to learn what they are and what you can do.
Posted: 23 Feb 2021 | Published: 23 Feb 2021
|
|
|
3 Top Ways To Improve Data Protection And Governance For Secure Remote Work
sponsored by Microsoft
RESOURCE:
If you’re using Microsoft products such as Outlook or Teams, don’t you want to make sure that the data going through them is protected, compliant and governed? Well you’re in luck – Microsoft has released specific integrations designed to make these processes simpler. Download this article to see 3 key ways these solutions meet the challenge.
Posted: 18 Dec 2020 | Published: 18 Dec 2020
|
|
|
4 Actions IT Can Take to Ensure Business Continuity Using PKI Automation
sponsored by Sectigo
EBOOK:
Managing risks has never been a greater challenge for IT professionals, and this is especially true when considering identity management. With an increasing number of angles for bad actors to steal passwords, it may be time for an evolution in authentication. Jump into this e-book to learn about public key infrastructure.
Posted: 08 Oct 2020 | Published: 08 Oct 2020
|
|
|
10 Steps to Email Security
sponsored by Clearswift
WHITE PAPER:
This white paper outlines the 10 simple steps to best practice in email security including the application of policy, technology and processes designed to keep email safe and secure.
Posted: 10 Sep 2010 | Published: 12 Aug 2013
|
|
|
10 Ways You Can Improve Web App Performance
sponsored by SOASTA, Inc
WHITE PAPER:
This resource counts down 10 issues that development and testing teams should consider in order to derive maximum performance from their Web applications.
Posted: 06 Jan 2014 | Published: 31 Dec 2013
|
|
|
2013 North American Software Defined Data Center Management Platforms New Product Innovation Award
sponsored by HPE and Intel®
RESEARCH CONTENT:
Take a look at this in-depth resource to find out why HP received a "New Product Innovation Award" for their software defined data center management platforms.
Posted: 06 Feb 2014 | Published: 31 Dec 2013
|
|
|
3 CIO Essentials: Top Trends To Help Your Business
sponsored by MuleSoft
WEBCAST:
This one-stop-shop for CIOs discusses the 3 most important trends companies can capitalize on to help future success. Access this webinar now for an in-depth look into essential topics.
Posted: 03 Nov 2015 | Premiered: Nov 2, 2015
|
|