Protect People, Processes, and Technology From Web Application Threats
sponsored by IBM
WHITE PAPER:
This resource discusses the security challenges created by web applications and offers insight and advice to help you address these issues.
Posted: 05 Mar 2014 | Published: 30 Nov 2013
|
|
|
Defending Against Malware: A Holistic Approach to One of Today's Biggest IT Risks
sponsored by IBM
WHITE PAPER:
This white paper offers background on today's malware and its 4 predictable steps. Click through to discover a set of integrated solutions that offer improved visibility and defense to block advanced attacks.
Posted: 05 Mar 2014 | Published: 31 Jan 2014
|
|
|
Leverage Security Intelligence for Government Agencies
sponsored by IBM
WHITE PAPER:
This resource features a security intelligence platform that's paired with data analytics to help prevent, defend, remediate, and analyze more security incidents and policy violations than traditional information security systems.
Posted: 05 Mar 2014 | Published: 31 Mar 2013
|
|
|
A New Standard for Security Leaders. Insights from the 2013 IBM CISO Assessment
sponsored by IBM
WHITE PAPER:
This guide discusses security leaders' top concerns with today's aggressive threat landscape.
Posted: 05 Mar 2014 | Published: 31 Oct 2013
|
|
|
Insider Edition: Antimalware Technologies and Techniques to the Rescue
sponsored by TechTarget Security
EZINE:
In this special edition of Information Security, our experts examine the recent advances in anti-malware detection and prevention, and which ones can tip the scale in your favor in the fight against malware.
Posted: 05 Mar 2014 | Published: 05 Mar 2014
|
|
|
The Definitive Guide to the Next Generation of Threat Protection
sponsored by FireEye
EBOOK:
This in-depth eBook examines the next generation of threat protection and provides key insights into critical topics, such as advanced persistent threats and zero-day attacks.
Posted: 04 Mar 2014 | Published: 31 Dec 2013
|
|
|
Discover How Mail Express Solves 2 of Your Biggest IT Headaches
sponsored by Globalscape
WHITE PAPER:
Mail Express can easily solve your most troublesome headaches surrounding email and it can reduce costs, too. Get all the answers instantly when you download this whitepaper.
Posted: 04 Mar 2014 | Published: 31 Dec 2012
|
|
|
A Planner's Realistic Guide to Cloud Data Security
sponsored by Dell, Inc. and Intel®
EGUIDE:
This expert e-guide will walk you through the creation of a safe and secure cloud environment.
Posted: 04 Mar 2014 | Published: 04 Mar 2014
|
|
|
Cloud Computing Insider Threats: Exploring Risk Scenarios, Mitigations
sponsored by Dell, Inc. and Intel®
EGUIDE:
This expert e-guide highlights possible insider threat scenarios, as well as 11 security issues to consider when choosing a cloud service provider.
Posted: 03 Mar 2014 | Published: 03 Mar 2014
|
|
|
Anti-Evasion: Why It’s a Critical Component of Intrusion Prevention Systems
sponsored by DellEMC and Intel®
WHITE PAPER:
This resource explores anti-evasion technology, an intrusion prevention system (IPS) add-on that blocks encoded attacks more effectively than traditional solutions.
Posted: 28 Feb 2014 | Published: 31 Dec 2013
|
|
|
NoSQL Does Not Have to Mean No Security
sponsored by IBM
WHITE PAPER:
This white paper explores the data security and compliance challenges with NoSQL ("not only SQL") databases, and offers key recommendations on how to address these problems.
Posted: 28 Feb 2014 | Published: 31 Jul 2013
|
|
|
Understanding and Selecting Data Masking Solutions
sponsored by IBM
WHITE PAPER:
This white paper examines data masking technology, and pinpoints the must-have features to look for when choosing a solution.
Posted: 28 Feb 2014 | Published: 10 Aug 2012
|
|
|
PCI DSS compliance 101
sponsored by DellEMC and Intel®
WHITE PAPER:
This white paper guides you through a series of deployments that help you achieve PCI compliance, thus improving overall network security practices.
Posted: 27 Feb 2014 | Published: 27 Feb 2014
|
|
|
Advanced Attacks Require Federal Agencies to Reimagine IT Security
sponsored by FireEye
WHITE PAPER:
This guide outlines the malware "kill-chain" model used in many of today's cyber-attacks and how these can overwhelm traditional security tools.
Posted: 27 Feb 2014 | Published: 27 Feb 2014
|
|
|
Supply Chain Analysis: From Quartermaster to Sunshop
sponsored by FireEye
WHITE PAPER:
This in-depth guide explores the current threat landscape and the role of APTs. Read now for more information on how APTs are being used for wide-scale cybercrime campaigns.
Posted: 27 Feb 2014 | Published: 27 Feb 2014
|
|
|
IAM for the Real World – Privileged Account Management
sponsored by One Identity
WHITE PAPER:
Read this e-book for essential information on common security issues with privileged account management (PAM) – and how you can minimize or eliminate them.
Posted: 27 Feb 2014 | Published: 31 Dec 2012
|
|
|
Behavioral Analytics Applied to Security
sponsored by FileTrek
WHITE PAPER:
This white paper details a new approach to threat detection that leverages big data and behavioral analytics technology to improve data protection and risk prevention.
Posted: 27 Feb 2014 | Published: 27 Feb 2014
|
|
|
Security in the Skies
sponsored by (ISC)2 UK Ltd
WHITE PAPER:
This white paper highlights the major cloud security concerns and threats, and offers a list of controls to include in your security strategy to prevent these inherent risks.
Posted: 26 Feb 2014 | Published: 26 Feb 2014
|
|
|
Unified Threat Management: RFP Technology Decisions
sponsored by TechTarget Security
EBOOK:
To properly evaluate unified threat management (UTM) products, you must understand what each vendor offers and how well it fits with your organization.
Posted: 26 Feb 2014 | Published: 26 Feb 2014
|
|
|
Unified Threat Management: Decision Time
sponsored by TechTarget Security
EBOOK:
Learn how to evaluate your potential vendor's UTM product and its ability to meet your specific business requirements.
Posted: 26 Feb 2014 | Published: 26 Feb 2014
|
|
|
Operation "Ke3chang": Targeted Attacks Against Ministries of Foreign Affairs
sponsored by FireEye
WHITE PAPER:
This guide explores a specific cyber-espionage campaign, how it used advanced persistent threats to infiltrate systems and what you can do to prevent similar attacks.
Posted: 26 Feb 2014 | Published: 31 Dec 2013
|
|
|
Why You Need A Next-Generation Firewall
sponsored by Hewlett-Packard Enterprise
WHITE PAPER:
This white paper explains how next-generation firewalls protect security systems from advanced attacks, and how they fit in with your business strategy.
Posted: 26 Feb 2014 | Published: 31 Dec 2013
|
|
|
Assuring Software Security Through Testing
sponsored by (ISC)2 UK Ltd
WHITE PAPER:
This white paper offers key recommendations for software developers to test for quality and security assurance before releasing products to the market.
Posted: 25 Feb 2014 | Published: 25 Feb 2014
|
|
|
Manage Identity and Access for Continuous Compliance and Reduced Risk
sponsored by IBM
WHITE PAPER:
This valuable resource shows how policy-driven IAM governance will protect assets from unauthorized access without diminishing productivity.
Posted: 24 Feb 2014 | Published: 24 Feb 2014
|
|
|
Security Trends 2014
sponsored by Global Knowledge
WHITE PAPER:
In this resource, find out what you need to know about security trends in 2014.
Posted: 21 Feb 2014 | Published: 21 Feb 2014
|
|