Hackers Research
-
Extending Security Intelligence with Big Data solutions
Sponsored by: IBMCybercriminals are continuing to grow and their tactics are becoming more refined. This guide outlines the role big data plays in IT security and how analytics can help thwart cybercrminals.
-
Three Guiding Principles to Improve Data Security and Compliance
Sponsored by: IBMIn this resource, explore a more holistic approach to data protection that simplifies security measures and compliance reporting in an increasingly complex IT landscape.
-
Information Security Emagazine: Best Practices for the Evolving Threat Landscape
Sponsored by: Hewlett-Packard EnterpriseIn this security emagazine, discover a variety of resources that offer exclusive best practices on how to boost security strategies to address the rise in cyber threats.
-
Best Practices For Your Threat Management Program
Sponsored by: IBMIn this expert e-guide, industry leader Diana Kelley shares 5 exclusive tips on how to build successful threat and vulnerability programs. Click now to uncover these key features!
-
KPN focuses on Information Security with HP
Sponsored by: Hewlett-Packard EnterpriseView this brief webcast to gain insight on an information security solution one organization chose to defend against today's highly motivated hackers, and how they're benefiting.
-
IBM X-Force 2013 Mid-Year Trend and Risk Report
Sponsored by: IBMIn this detailed white paper, explore this year's report on the latest risks and security challenges organizations are facing today, and offers best practices to boost security fundamentals and policies to meet these advanced persistent threats (APTs).
-
2013 Cost of Cyber Crime – UK, France and Germany Findings
Sponsored by: Hewlett-Packard EnterpriseClick to view a Q&A session with Larry Ponemon, Founder of Ponemon Institute, as he unveils the results from a global survey on cybercrime, and how the UK, France, and Germany have specifically dealt with the costs of these IT security attacks.
-
A “How-To” Guide on Using Cloud Services for Security-Rich Data Backup
Sponsored by: IBMAccess this resource for a cloud solution that uses a collaboration of hardware, software, and services with advanced technologies to ensure data and application security, while allowing you to focus on business priorities.
-
Hidden Lynx: Professional Hackers for Hire
Sponsored by: Symantec CorporationIn this white paper, uncover the facts behind security's most threatening presence, the Hidden Lynx group, which uses more sophisticated, targeted attacks, and has the ability to adapt to defense methods.
-
Symantec Intelligence Report - August 2013
Sponsored by: Symantec CorporationIn this white paper, get the most recent analysis on cybersecurity threats and trends, and gain insight on what to expect in the future.
-
Malicious Mobile Apps
Sponsored by: OpenText Security SolutionsIn this white paper, get industry statistics about today's IT threat landscape, and why IT professionals should heighten mobile security to defend against significant malicious mobile applications.
-
Weaponized malware now threatens the private sector
Sponsored by: LumensionAccess this resource for crucial information about the next class of advanced persistent threats (APT) and uncover how you can boost endpoint security management to reduce the risk of these attacks.
-
Security Intelligence – Is Security a Battle You Can Win
Sponsored by: IBMThis white paper details the need for IT teams to discover the benefits of security intelligence (SI), and how it can simplify the complex security environment for better security analytics.
-
Measuring End User Susceptibility and Defenses Against Phishing Attacks with CORE Insight
Sponsored by: Core Security TechnologiesThis white paper contains critical information about spear phishing and how to prepare your users and systems from falling for these targeted attacks being masked as trustworthy content.
-
Building An Intelligence - Driven Security Operations Center
Sponsored by: EMC CorporationAccess this white paper for insider tips on rapid cyber threat detection and remediation as well as how to coordinate technologies, personnel, and processes for better security.
-
Protecting Your Website With Always On SSL
Sponsored by: Symantec CorporationThis white paper discusses the imperative need for always on SSL, and the steps you can take to deliver end-to-end protection for your users. It also includes detailed accounts of four organizations that are leading the way with always on SSL in a cooperative effort to make the internet more secure.
-
Symantec Internet Security Threat Report
Sponsored by: Symantec CorporationThis report reveals the latest information about today's top security vulnerabilities and threats – from targeted attacks and exploits to spam and phishing – to help you keep your organization safe. View now to learn more!
-
Advanced Identity Tracking for Social Networking Sites
Sponsored by: Hewlett Packard EnterpriseThis resource details the methods used to assist social networking sites in identifying online predators and thwarting potentially serious attacks. View now to learn more!
-
The Trouble Heading for Your Business 2013
Sponsored by: Trend MicroThis resource details the current state of targeted attacks and explores why putting an effective defensive strategy in place is so critical. View now to uncover the effects of these potentially disastrous attacks and what you can do to stay protected.
-
Underexposed risks of public Wi-Fi hotspots
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Information Security series assess the hidden security risks of public Wi-Fi hotspots.
-
The Deloitte Consumer Review: A more secure customer
Sponsored by: TechTarget ComputerWeekly.comThis report from Deloitte assesses the impact of cybercrime on consumers and offers advice to businesses on how to respond.
-
IBM Security Network Intrusion Prevention System
Sponsored by: IBMThis 3-minute video explains the benefits of a network intrusion prevention system (IPS) and how one can help you reduce your exposure of risk while simultaneously cutting down your liability. View now to learn more.
-
ISM December 2012
Sponsored by: TechTarget SecurityIn this month's issue, Information Security magazine contributor and award-winning technology journalist, Robert Lemos, explores this rapidly expanding market and shows you exactly how to profit from Zero-day exploits.
-
Bit9 Parity for Servers: International Communications Company Locks Down Domain controllers
Sponsored by: Bit9, Inc.Domain controllers have become an increasingly popular target for malicious hackers for its access to an organization’s sensitive and intellectual property. This case study uncovers how one international communications firm was able to protect 225 of its domain controllers using Bit9 Parity for Servers and the key benefits they gained.
-
Computer Weekly - 17 April 2012: How to ensure smartphone security
Sponsored by: TechTarget ComputerWeekly.comThis week’s Computer Weekly examines the growing threat from smartphones being targeted by hackers and viruses as the devices are increasingly used for work. Hospitality giant Mitchells & Butlers talks about its migration to the cloud and the CIO of Airbus discusses his IT priorities and how he spends €500m a year on IT.