Risk Assessment Research
-
How Threat Intelligence Can Give Enterprise Security the Upper Hand
Sponsored by: SurfWatch LabsThis expert e-guide explores the value of security intelligence in giving you the upper hand on outside threats.
-
6 Ways Hackers Try to Break Secure Sockets Layer-Encrypted Data
Sponsored by: Symantec & Blue Coat SystemsHow do hackers break through secure sockets layer-encrypted data exactly? This expert e-guide has the answer, exploring six common methods these cyber-criminals use.
-
Beyond Passwords: Protect the mobile enterprise with smarter security solutions
Sponsored by: IBMFind out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
-
IDC 2014 WW MarketScape Report for Federated Identity Management and SSO
Sponsored by: IBMFind out how vendors fared in IDC's assessment of IAM offerings for federated identity management and single sign-on.
-
Managing User Identities and Access in the Cloud
Sponsored by: IBMLearn how IBM can help design, deploy and manage critical identity and access management controls in cloud environments.
-
Extending Security Intelligence with Big Data
Sponsored by: IBMLearn how IBM Security Intelligence with Big Data can help organizations gain insights into advanced data threats.
-
Protect People, Processes and Technology from Web Application Threats
Sponsored by: IBMSecuring externally facing applications is an important step toward safeguarding your critical assets. Find out why.
-
Data Loss Prevention: Decision Time
Sponsored by: TechTarget SecurityThis expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.
-
Countering Cyber-Crime with a Sharp Eye and a Clear Plan
Sponsored by: TechTarget SecurityBigger, more diverse networks mean a bigger attack surface for hackers. Today's networking pros must assess and update network security strategies to account for new vulnerabilities and respond to inevitable attacks.
-
IT Executive Guide to Security Intelligence
Sponsored by: IBMThis helpful guide discusses one company's approach to security intelligence, and how this innovation could entirely change the way that businesses approach threat management.
-
Examining Cloud Computing Threats and Mitigations
Sponsored by: CenturyLink Technology SolutionsThis expert e-guide details the new threats that come with cloud computing and how you should deal with them.
-
CIO's Guide to Managing Cloud Adoption and Risk
Sponsored by: SkyHighThis whitepaper details how to handle shadow IT by taking the right approach to risk management in the cloud.
-
Information Security E-Zine – June 2014
Sponsored by: TechTarget SecurityGlobal threat intelligence services have continued to evolve and play more of role in SIEM and endpoint security products. How can threat intelligence benefit risk scenarios?
-
Workflow, governance and reporting – Solvency II
Sponsored by: IBMThe following white paper provides readers with industry-leading insights into the key challenges and issues arising when managing all 3 pillars of Solvency II. Learn how to manage workflow around internal models, which process surround reporting and the integration with risk modeling, and more.
-
EMC Isilon for Healthcare
Sponsored by: PivotalThis brief resource provides information on a solution that reduces costs and improves operational efficiency by consolidating image data from each department PACS into a single, unified independent storage solution.
-
Webcast: Symantec Internet Security Threat Report 2014
Sponsored by: Symantec CorporationDownload and tune in to this exclusive webcast to get the Internet Security Threat Report for 2014. Get the intel you need to strengthen and defend your systems against breaches, malware, and targeted attack campaigns.
-
Discovering Vulnerable Web Applications
Sponsored by: QualysThis paper describes how large enterprises can effectively discover, catalog and scan web applications to control vulnerabilities as part of their organization's overall vulnerability management program.
-
10 Network Security Tools and Tests Everyone Should Use
Sponsored by: Global KnowledgeThis paper provides a list of 10 security tools or tests that will help you check out suspicious issues and keep ahead of new risks and threats.
-
The Safe On-Ramp to Big Data
Sponsored by: InformaticaThis white paper examines the risk and reward of big data and highlights how leading organizations are utilizing Informatica technology as a safe on-ramp to big data that reduces risk and cost while speeding insights and innovation.
-
Are you minding your business's reputation? What can you do to mind it better?
Sponsored by: IBMChanging social, cloud, and mobile technologies makes our lives smarter, more connected and more productive – but it also exposes us to bigger risks. In this video, learn about a simple tool that will help you assess how well you're managing your reputation and your IT investment.
-
Managing Security Risks and Vulnerabilities
Sponsored by: IBMRead now to learn about automated labor-saving automation, a platform that incorporates vulnerability analysis, risk management, and remediation support, all within a single console.
-
Leverage Security Intelligence for Retail
Sponsored by: IBMThis informative solution brief highlights the challenges and potential solutions that can be implemented to help embrace mobile customers, protect payment and personal data and deliver a secure shopping experience.
-
A Planner's Realistic Guide to Cloud Data Security
Sponsored by: Dell, Inc. and Intel®This expert e-guide will walk you through the creation of a safe and secure cloud environment.
-
Leverage Security Intelligence to Protect Sensitive Healthcare Data
Sponsored by: IBMThis guide explores the importance of end-to-end system visibility and security intelligence for healthcare organizations, and how to combat a full range of security threats.
-
Your Personal Web Attack Survival Guide
Sponsored by: ImpervaThis white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.