Identity Theft Research
-
Preventing identity theft in a data breach
Sponsored by: ComputerWeekly.comIn this e-guide, we will explore the links between ransomware attacks, data breaches and identity theft. First, Nicholas Fearn investigates the phenomenon of the double extortion attack, and shares some insider advice on how to stop them, while we'll explore the top five ways data backups can protect against ransomware in the first place.
-
Computer Weekly Buyer's Guide: Identity and Access Management
Sponsored by: ComputerWeekly.comWhen used effectively, identity and access management can streamline business processes. In this 17-page buyer's guide, Computer Weekly looks at the challenges it can bring largecompanies, the implications of cloud and how to pick the right service for your firm.
-
Preventing identity theft in a data breach
Sponsored by: ComputerWeekly.comIn this e-guide, we will explore the links between ransomware attacks, data breaches and identity theft. First, Nicholas Fearn investigates the phenomenon of the double extortion attack, and shares some insider advice on how to stop them, while we'll explore the top five ways data backups can protect against ransomware in the first place.
-
How to Know It’s Time to Change Your Identity Vendor
Sponsored by: SailPoint TechnologiesChanging identity governance vendors can be a difficult decision. But some situations make it almost mandatory to change identity governance vendors. At the end of the day, this is a business decision based on the facts. In this white paper, explore 7 situations which would warrant you to change your identity vendor.
-
4 Ways SailPoint Predictive Identity™ Puts You in Control
Sponsored by: SailPoint TechnologiesAs digital transformation continues to reshape today’s modern enterprise, it is vital that organizations keep focus on protecting and securing their data, no matter where it resides. In this white paper, learn 4 key ways that SailPoint Predictive Identity can help your organization by putting you in control.
-
A Framework for Cybersecurity and Compliance
Sponsored by: OneNeck ITIn this white paper, discover an outline of how you can methodically assess and structure enterprise security to protect your data and address compliance mandates such as HIPPA, PCI DSS, SOX, as well as NIST SP-800-171 if appropriate, by applying a NIST-based approach to your IT environment.
-
Norfolk County Council Bolsters Productivity with IdentityIQ
Sponsored by: SailPoint TechnologiesNorfolk County Council (NCC) needed to prioritize an identity-centric security program that alleviated the growing concern over disparate systems and manual processes. In this case study, learn how NCC leveraged SailPoint to manage the identities working within their organization for all types of employment.
-
How long does it take to get owned?
Sponsored by: ComputerWeekly.comA study to investigatethe amount of time that it takes for stolen credentials to be used by a hacker.
-
The various ways to fight new and emerging cybercrime
Sponsored by: SearchSecurity.comCybercrime is a constant battle companies face on a daily basis. Criminal tactics in this field of crime are always changing and advancing in style. This expert E-Guide will provide new approaches to defeating the risks of cybercrime, along with keeping you updated on the various forms that can threaten your company.
-
Security Access Controls Over Identities Must Be Priority
Sponsored by: SearchSecurity.comNo company should take IAM for granted. Every business faces the potential of a breach, as evidenced by the access control struggles experienced by Amazon Web Services customers. In this e-guide, learn how important a role identity- and access-based security plays in keeping enterprise and individual data safe.
-
4 Top Identity and Access Management Trends
Sponsored by: OnfidoAs end-user security threats continue to rise, it becomes more crucial for IT pros to have identity and access management tools. However, the tools offered in the identity and access management market are evolving and IT pros need to catch up. In this e-guide, explore the top 4 identity and access management trends shaping the market right now.
-
What to Look for in Web Fraud Detection Systems
Sponsored by: SearchSecurity.comIn this TechTarget Buyer's Guide readers will learn the key features of a Web fraud detection product and how to choose the best product for their company.
-
5 Steps to Raising Ransomware Resistance
Sponsored by: SearchSecurity.comThis TechGuide explores the nature of the threat and the latest ransomware trends. It outlines several steps information security pros should take in order to heighten their organization's resistance and prevent ransomware attacks.
-
Time for an IAM Overhaul
Sponsored by: SearchSecurity.comIAM security policies must take into account the latest technology developments, especially cloud and the Internet of Things. Access this three-part technical guide to gain valuable information on IAM strategy in the face of rapidly evolving technology.
-
Information Security Asean November 2015
Sponsored by: TechTarget ANZThe cover story looks at the cyber crime landscape in Singapore and what organisations in the city state are doing to combat it
-
Information Security ASEAN March 2015
Sponsored by: SearchSecurity.comOrganizations are faced with the double challenge of having to secure a growing volume of endpoints, and dealing with an increasing number of security threats.
-
Information Security ANZ March 2015
Sponsored by: SearchSecurity.comExperts at Dell and Dimension data in Australia discuss the challenge of securing the end point.
-
What to Look for in Web Application Firewall Products
Sponsored by: SearchSecurity.comIn this buyer's guide, experts explain how a WAF works, describe the features that different WAFs possess, and reveal how to weight these factors in selecting the right WAF to protect your enterprise's sensitive data.
-
Information Security ANZ November
Sponsored by: SearchSecurity.comIn this expert e-zine, learn how industry leaders like Symantec, CSC and BAE Systems are expanding Australian facilities and working to stake their claim in the face of rising threats and a diminishing skills-base. Additionally, learn about operational challenges as cyber security gets "censored" and how open source security needs serious help.
-
Internet-Scale Identity Systems:An Overview and Comparison
Sponsored by: Ping Identity CorporationThis white paper provides an overview of the benefits of implementing an Internet-based identity system and explores the similarities, differences and synergies among the top technologies and initiatives available.
-
HID Global's ActivID® Authentication: Online Banking
Sponsored by: HID GlobalThis short webcast highlights an authentication system with SMS ID verification and cloud-based threat detection offerings. Learn how services such as online banking can truly benefit from this system to ensure secure access to user accounts.
-
Underexposed risks of public Wi-Fi hotspots
Sponsored by: ComputerWeekly.comThis article in our Royal Holloway Information Security series assess the hidden security risks of public Wi-Fi hotspots.
-
The Deloitte Consumer Review: A more secure customer
Sponsored by: ComputerWeekly.comThis report from Deloitte assesses the impact of cybercrime on consumers and offers advice to businesses on how to respond.
-
Presentation Transcript: Automating Access Certification in Just 17 Days
Sponsored by: AveksaThis presentation transcript describes the benefits one of your peers enjoyed after implementing a particular IAM solution which helped them automate their certification process.
-
SonicWALL PCI Compliance Solution Brief
Sponsored by: SonicWALLThe Payment Card Industry (PCI) Data Security Standard (DSS) applies to any organization that processes, transmits or stores payment card transactions or cardholder information. PCI applies not only to retailers but also to any business that accepts a single payment card transaction, no matter the size or industry.