All Research Sponsored By:SearchSecurity.com

-
CISOs Map Out Their 2018 Cybersecurity Plans
As attack vectors increase and cyberattacks become more sophisticated, how are CISOs preparing? Find out inside this issue of Information Security magazine, where security professionals detail the process of developing effective one-year cybersecurity plans.
-
Cyber-Risk Strategies and Models for a Post-Perimeter Age
In our expert handbook, managing editor Brenda Horrigan and Nemertes Research president Johna Till Johnson explain how to implement a zero-trust approach to cybersecurity.
-
Information Security: Companies Aren't the Only Ones Migrating to Cloud
Hackers are embracing all advantages of the cloud, launching lucrative attacks like malicious cryptomining, DDoS, and ransomware. In this issue of Information Security magazine, editor Kathleen Richards looks at cloud security in 2018 and reveals strategies to protect sensitive data from new internal and external threats.
-
The time is ripe to implement cybersecurity automation
It's past time to implement cybersecurity automation. Learn what automation can do for your IT defenses and how to get started in our latest handbook.
-
Mobile security trends point to unifying policy and tools
Mobile security trends reflect how threats shift and devices evolve. The trend now in mobile security is toward unified endpoint management.
-
CISOs Map Out Their 2018 Cybersecurity Plans
As attack vectors increase and cyberattacks become more sophisticated, how are CISOs preparing? Find out inside this issue of Information Security magazine, where security professionals detail the process of developing effective one-year cybersecurity plans.
-
Defense-In-Depth Security: Key to Keeping IT Safe
The enterprise perimeter's demise is in part due to BYOD. Leverage this expert handbook to uncover an effective approach to constructing your IT security "fortress" and replacing the outdated idea of a security perimeter.
-
What GDPR privacy requirements mean for U.S. businesses
Enforcement of the EU's new GDPR privacy regulations is imminent, and potential fines send a clear message to companies to protect their customers, or else.
-
Security Analysis Principles and Techniques for IT Pros
As a result of the recent developments affecting security analytics, uncover these tips for ensuring you get the most out of your security analytics tool.
-
The Tug of War Between UBA and SIEM
In this issue of Information Security magazine, we look at SIEM, UBA tools and considerations for effectively implementing user behavior analytics. Additionally, our experts dive into Q&A with John Germain, CISO at Duck Creek Technologies and security research expert, Blaine Burnham.
-
The Case for Modern SOCs
In this issue of ISM we look at ways to optimize the next-gen SOC and integration and automation strategies that will help you get there. Additionally, our experts dive into Q&A with the Xerox CISO, how companies are using threat intelligence, why companies are failing to manage vulnerabilities in critical systems and applications, and more.
-
What does a CISO do now? It's a changing, increasingly vital role
What does a CISO do now, with risks proliferating and the most-needed security skills in short supply? Learn why the CISO role is more vital than ever.
-
Steps to Protect Your Growing Data
The distribution of data and the many ways in which it can be accessed has made handling data protection risks especially challenging. In this issue of Information Security, security experts examine data protection risks and considerations for implementing a data - centric security model.
-
Managing Access to Keep Privileged Users' Credentials Secure
Fighting creep through privileged user management is an essential but too often overlooked security practice. Inside this handbook, experts Michael Cobb and Joseph Granneman explain why the fight against privilege creep should be at the top of your security team's to-do list.
-
Why Security in DevOps is Essential to Software Development
What is the point of releasing new software that's loaded up with security vulnerabilities? Security is now an essential ingredient in software development. Inside this handbook, experts take a closer look at how IT professionals can fit security into their development process and how they will benefit from doing so.
-
Single Sign-On Service Requires a Cloud-Era Update
The best Single Sign-On today can handle the applications mobile workers use, identity as a service and more. In this guide, learn how you can make SSO and other identity management approaches more effective.
-
Web Security: Now What?
In this handbook, experts dive into the ongoing issues related to TLS security and HTTPS inspection. Uncover more about the journey of computer worms and how they play a role in advanced persistent threats.
-
How to Find the Best DDoS Attack Prevention and Detection Tools
Explore this expert handbook on how to evaluate DDoS prevention tools and services to identify the best ones for you.
-
4 Tech Disruptors that Could Radically Change Security Operations
Many information security programs are not on track to handle the internet of things and other technology disruptors. We help you dust off your crystal ball and get prepared for the near future.
-
Security Analysis Principles and Techniques for IT Pros
As a result of the recent developments affecting security analytics, uncover these tips for ensuring you get the most out of your security analytics tool.
-
Is the Endpoint Security Nightmare Ending?
In our Insider Edition of Information Security Magazine, experts Mike Chapple, Michael Heller and David Geer dive into the newest approaches in endpoint security, keys to maturing your mobile security strategy, and more.
-
Cloud access security brokers: Hard to tell what's real
In this issue of Information Security, we look at the momentum behind cloud access security brokers and find out how the uses and dangers stack up.
-
Cybersecurity Careers Soar
In the security field, certifications and degrees are nevera substitute for on-the-job experience. In this month's Information Security magazine, we look at cybersecurity careers. Should your company invest in first-time CISOs, threat hunters and more diversity?
-
Information Security magazine Insider Edition, April 2017
Managing IAM is more critical than ever to corporate security; Your IAM policy must be updated to reflect the current risks and IT advances. Discover how to tackle changes in the "identity layer" and consider other factors affecting your IAM policy. Also delve into multifactor authentication and the specific risks to cloud-based IAM tools.
-
Ransomware Detection and Prevention Tools You Need Now
Fighting today's malware threats requires a range of ransomware prevention tools. Learn how to tweak the tools you have and identify what new tools you need.