Hackers Research
-
Five critical steps to achieving an effective application security program
Sponsored by: IBMThis white paper explains a variety of application threats that organisations deal with, and introduces 5 practical steps to take when implementing application security.
-
A Manifesto for Cyber Resilience
Sponsored by: Symantec CorporationIn this white paper, find out what it takes to become cyber resilient in this age of escalating threats.
-
Defending Against Application-Layer DDoS Attacks
Sponsored by: Juniper Networks, Inc.This white paper explains the serious problem that DDoS threats present, and how it impacts your business.
-
Security Operations Center (SOC) Essentials for the SME
Sponsored by: AT&T CybersecurityWatch this webcast to develop a greater understanding about SOC and the benefits small and medium enterprises can gain from it.
-
HP TippingPoint Intrusion Prevention System halts threats at the door - Solution increases visibility to potential threats, attacks and policy violations against HP systems
Sponsored by: Hewlett-Packard EnterprisePrevent future cyber attacks from occurring by modifying your company's security infrastructure.
-
Webinar: 20 Critical Controls for Cyber Defense
Sponsored by: ISACAJoin ISACA for a webinar hosted by internationally recognized speaker, Dr. Vilius Benetis, on Tuesday, June 24, 2014 at 12:00 PM EDT (16:00 UTC), who will discuss the 20 critical controls identified by SANS and the Council on Cybersecurity.
-
Protecting DNS Infrastructure—Inside and Out
Sponsored by: InfobloxThis white paper unveils the critical risk your domain name system (DNS) is in, and offers leading strategies to help you protect your infrastructure against outside-in and inside-out threats.
-
Protecting Critical Data is a Main Priority for the U.S. Army
Sponsored by: GlobalscapeIn this white paper, learn how the U.S. Army can protect their $68 billion-worth of annual data with a set of security solutions that easily integrate with their Standard Army Management Information System (STAMIS).
-
Coming at You: How to Deal with the Latest DDoS Attacks
Sponsored by: TechTarget SecurityAccess this TechGuide to learn more about DDoS threats and how to protect your systems—while shape-shifting cyberattackers are tough to stay ahead of, they're too destructive to ignore.
-
Combatting Advanced Threats with Endpoint Security Intelligence
Sponsored by: IBMAdvanced security threats are exploding worldwide and the sophistication of these attacks is higher than ever. How can organizations stay ahead of these advanced threats? This white paper discusses how to combat advanced security threats by adopting an integrated, intelligent and automated approach to endpoint security.
-
How Are DDoS Attacks Evolving?
Sponsored by: Neustar®This resource highlights the top 8 changes in distributed denial of service (DDoS) attacks that most organizations aren't ready to defend against.
-
Webinar: Protecting Critical SaaS Data Before It’s Too Late
Sponsored by: Spanning Cloud AppsThis webinar goes through the best practices for SaaS data protection. Presented by industry experts, it touches on the key points for understanding how to ensure SaaS data protection and how to find the right provider.
-
Virtualization Security Report: 10 Ways to Regain Control and Reduce Risk
Sponsored by: CitrixThis resource highlights the top 10 benefits of adding desktop virtualization to information security strategies for an increasingly diverse and expansive IT environment.
-
The Danger Deepens: Neustar Annual DDoS Attacks and Impact Report
Sponsored by: Neustar®This resource analyzes survey results regarding distributed denial of service (DDoS) attacks to see how they've evolved into an even great threat. Click through to learn how you should prepare.
-
Web Security – Virtual Appliance
Sponsored by: Cisco Systems, Inc.Watch this webcast to see how you can best protect your Web-accessible assets with a strong protection solution that ensures security wherever your data goes.
-
Taking Managed Security Services To The Next Level
Sponsored by: OpenText Security SolutionsThis white paper discusses the changing IT security landscape, how MSPs will be impacted, and what they can do for their customers in the face of these security challenges.
-
Evaluating the True Impact of Fraud on Financial Institution
Sponsored by: IBMThis guide makes an effective business case for fraud-prevention technology and evaluates the true impact of fraud on various financial institutions.
-
Real Time Endpoint Compliance for Continuous Diagnostics and Mitigation
Sponsored by: IBMAccess this white paper to explore an endpoint management solution that will help federal agencies continuously monitor, manage, and detect vulnerabilities across their critical networks.
-
Cisco 2014 Annual Security Report
Sponsored by: CiscoThis information-packed resource acts as a guide for developing a robust security approach given today's issues with trust, threat intelligence, and varying industry trends. Click through to explore key findings, as well as recommendations for your next steps.
-
Managing Security Risks and Vulnerabilities
Sponsored by: IBMRead now to learn about automated labor-saving automation, a platform that incorporates vulnerability analysis, risk management, and remediation support, all within a single console.
-
Protect People, Processes, and Technology From Web Application Threats
Sponsored by: IBMThis resource discusses the security challenges created by web applications and offers insight and advice to help you address these issues.
-
Your Personal Web Attack Survival Guide
Sponsored by: ImpervaThis white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.
-
Cutting the Cost of Application Security
Sponsored by: ImpervaThis white paper presents a cost breakdown of a Web application firewall solution versus the potential costs of remediation after a successful Web attack. Click now to see why this solution is worth the investment.
-
Hidden Lynx – Professional Hackers for Hire
Sponsored by: Symantec CorporationThis in-depth resource explores the strategies behind hackers-for-hire and what you can do to prevent them from compromising your system.
-
An Expert Guide to the PCI DSS 3.0
Sponsored by: TechTarget SecurityThis expert handbook gives you the information that you require right now to understand the updated requirements for the PCI DSS 3.0, which went into effect in early 2014.