Information Security Research
-
The Importance of Cybersecurity for Executives
Sponsored by: A-LignAs security threats become increasingly frequent, complex and disruptive, it’s critical for all leaders – not just the CIO, CTI and CISO – of an organization to play a role in ensuring security. In this white paper, explore the importance of cybersecurity for executives by looking at the common types of attacks and how to prevent them.
-
Ransomware Attacks: How to Get the Upper Hand
Sponsored by: Cisco UmbrellaThe rock group Radiohead is celebrated for its unconventional approach to recording and releasing music. Lately, the band is also turning heads for how it handled a hacker trying to sell its unreleased work. In this e-guide learn what security experts think of Radiohead’s strategy for dealing with the ransomware threat.
-
Foundation for Digital Transformation
Sponsored by: InfovistaIn this EIQ report, gain an understanding of the impact of new consumer expectations on applications, digital transformation and networking systems initiatives within retail, manufacturing and banking/finance industries.
-
Driving IT Hygiene with Tanium
Sponsored by: TaniumImproving IT Hygiene means creating a process to continuously identify assets, risks, and vulnerabilities across an environment and fixing them with speed at scale. In this solution brief, uncover the fundamental aspects of better IT Hygiene and explore Tanium’s IT Hygiene Platform. Read on to learn more.
-
Threat Intelligence: Far-Fetched Idea or Must-Have Security Tactic? How Every Ciso Can Make It a Priority
Sponsored by: MimecastIf threat intelligence isn't part of your cyber resilience strategy in some capacity, you have a massive gap on your hands. And you may be blindsided by a phishing attack, malware incident or worse. In this white paper, learn how CISOs can make threat intelligence a priority in their cyber resilience planning.
-
IT Security is Broken
Sponsored by: VMwareOnly 25% of EMEA business leaders are confident in their cybersecurity. In this infographic, learn how you can fix IT security by building intrinsic security into everything, encouraging a collaborative culture of cybersecurity awareness, and more.
-
The Titus Times: The CEO & CTO
Sponsored by: TITUSIn this e-magazine, learn about the roles of the CEO and the CTO and delve into how their concerns around data protection overlap – as well as where they diverge. Also, learn how to overcome discrepancies to build a strong data protection strategy.
-
Forrester Consulting: Is Your Company In Peril If Critical Data Is Breached?
Sponsored by: IBMDelegating data security to IT teams does not absolve the responsibility business leaders have to protect data. Forrester Consulting surveyed 150 IT, security, and risk decision makers and examined their approach to protecting their company's critical data. Download this report to explore key findings.
-
Forrester Consulting: Is Your Company In Peril If Critical Data Is Breached?
Sponsored by: IBMDelegating data security to IT teams does not absolve the responsibility business leaders have to protect data. Forrester Consulting surveyed 150 IT, security, and risk decision makers and examined their approach to protecting their company's critical data. Download this report to explore key findings.
-
CISO and Cybersecurity: A Report on Current Priorities and Challenges
Sponsored by: Fortinet, Inc.The CISO and Cybersecurity Report from Fortinet takes a snapshot of how CISOs are approaching cybersecurity, and how their organizations view the CISO. In this report, explore key takeaways from a survey of CISOs at large enterprises.
-
Top Research For CIOs: Security
Sponsored by: MASERGYSecurity no longer lives exclusively in the IT department. In this Forrest report, CIOs can gain insight into the trends and key issues in the security landscape. Also, explore opportunities for improving how security is managed regardless of whether you own the security function.
-
The Vital Role of Security in Digital Transformation
Sponsored by: TITUSA survey conducted by Market Strategies Internal showed that 78% of ITDMs believe that the success of their digital transformation relies heavily on strong IT security and data protection. In this research report, explore 2 different security professional personas and explore how they view digital transformation, security and data protection.
-
Patient Privacy Intelligence: The Intersection of Compliance, Legal and Information Security
Sponsored by: FairWarningDownload this white paper to explore the critical capabilities of a patient privacy intelligence tool required to meet the business and technical demands of modern care providers for regulatory compliance and information security.
-
5 Ways CIOs Can Optimize Communication With Other Executives
Sponsored by: BitSightDespite the fundamental importance of information technology and security, many organizations continue to treat it as separate from the rest of the organization. In this white paper, explore 5 ways CIOs can optimize communication with other executives to help strengthen an organization's security.
-
The exploitation of flaws in the HTTPS protocol
Sponsored by: ComputerWeekly.comFor both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.
-
April ezine: SD-WAN more than just networking
Sponsored by: MicroScopeAn issue covering SD-WAN, storage innovations and opportunities for channel growth
-
Implementing Agile Security Response
Sponsored by: ServiceNowData breaches constantly threaten enterprises today. The biggest challenge that organizations face is coordinating incident response across the organization. Download this resource for access to an essential security operations solution checklist to help your organization better respond to security threats and vulnerabilities.
-
December ezine: Tech for good
Sponsored by: MicroScopeRead about why more CEOs are discussing the positives of technology and why the channel will need to do the same
-
September ezine: Thinking digital in the world of storage
Sponsored by: MicroScopeThe full report of the recent MicroScope storage roundtable which discusses how cloud and GDPR has changed the industry
-
The difficulties of defending against web tracking
Sponsored by: ComputerWeekly.comThis article in our Royal Holloway information security series introduces you to web tracking, provides an overview of how organisations track users and discusses a few of the difficulties you may face when trying to defend against tracking.
-
Facing up to emerging technology: Risks and benefits
Sponsored by: SearchCIOCutting-edge technologies offer companies competitive advantages but also present security threats. Learn how to mitigate emerging technology risks.
-
Incident response playbook in flux as services, tools arrive
Sponsored by: SearchSecurity.comThe enterprise incident response "playbook" is getting a rewrite. An IR playbook guides an enterprise security team's work, identifying triggering events and outlining best practices or regulatory requirements. Download this handbook to learn more about the essential playbook revisions that are putting new technologies and services to use.
-
Recent Ransomware Attacks Got you? Don't Cry; Fight Back!
Sponsored by: SearchSecurity.comRecent ransomware attacks may make you WannaCry, but there's no time for that. It's time to learn what you can do to minimize the threat and how to deal if the worst happens. Start here to discover how to fight back against hackers, today.
-
Get Smart About Threat Intel Tools and Services
Sponsored by: SearchSecurity.comLearn how threat intelligence tools can improve enterprise security and where they should fit into the broader security scheme.
-
ITSM strategy for an agile, secure digital transformation
Sponsored by: SearchCIO.comAs digital transformation forces companies to rethink IT ops, balancing reliability and speed will be vital to successfully updating their ITSM strategy.