Information Security Research
-
Stopping Privilege Creep: Limiting User Privileges with Access Reviews
Sponsored by: SearchSecurity.comThis SearchSecurity.com e-guide outlines the risks of privilege creep and outlines the remedies available to help you successfully mitigate them. View now to learn more!
-
Information Security Threats: Building Risk Resilience
Sponsored by: SearchSecurity.comEnterprises need an agile risk management strategy to deal with today's evolving threats. Read this expert E-Guide and discover the correct ways to build up your organizations risk resilience against these ever growing threats.
-
Security Big Data: Preparing for a Big Data Collection Implementation
Sponsored by: SearchSecurity.comThis expert e-guide from SearchSecurity.com offers realistic advice to help your enterprise information security team understand what technology and processes must be in place in order to properly and securely take advantage of big data.
-
Webcast: IBM Information Management in the New Era of Computing
Sponsored by: IBMDepending on the approach that your organization takes, big data can be either a golden opportunity or a significant business obstacle. This webcast explores information management in the new era of computing, and outlines a strategy that will enable you to reduce costs, improve decision-making, and more.
-
Hitting the Information Governance and Compliance Sweet Spot
Sponsored by: IBMIn this expert e-guide from SearchCompliance.com, technology law expert Jeffrey Ritter discusses the complications and benefits that arise between data governance and compliance rules.
-
Tackling the Data Security Challenge
Sponsored by: IBMIn this e-guide, brought to you by searchCompliance.com, learn about the data governance and security obstacles organizations must consider when implementing a bring your own device (BYOD) policy.
-
Information Governance for Business Value
Sponsored by: IBMIn this expert e-guide, brought to you by searchCompliance.com, learn how incorporating IT compliance and information governance policy best practices can provide huge benefits to overall corporate strategy.
-
Setting the Stage for the Data Governance: A CIO's Guide
Sponsored by: IBMIn this e-guide, brought to you by searchCIO.com, read about the five preconditions for success. Also, technology law expert Jeffrey Ritter discusses the increased focus on information governance strategy and how businesses should approach corporate information governance in the digital age.
-
Enterprise Information Protection - The Impact of Big Data
Sponsored by: IBMIn this comprehensive resource, explore the requirements for information security and privacy in the age of big data. You'll discover how a holistic approach to enterprise information, along with the right big data technologies, enables you to keep data classified, secure, and organized.
-
Computer Weekly – 30 July 2013: The threat within – balancing security and employee privacy
Sponsored by: ComputerWeekly.comIn this week's Computer Weekly, as more data breaches come from inside an organisation, we examine how to balance information security and employee privacy. Tech City CEO Joanna Shields talks about the opportunity for CIOs from working with startups. And we look at how mobile technology can help improve patient care in the NHS. Read the issue now.
-
Modern Retention Enablement
Sponsored by: IBMThis quick video explains why legal departments need the what, who, and where of records and information management (RIM) files.
-
IT Reputational Risk Study Overview
Sponsored by: IBMThis short video summarizes the findings from a recent study on risks to your business reputation resulting from failures in your IT environment.
-
Computer Weekly – 2 July 2013: Business value from the internet of things
Sponsored by: ComputerWeekly.comIn this week's Computer Weekly, we hear from manufacturing giant GE about its plan for gaining business value from the "internet of things", analysing huge amounts of machine data in an industrial internet. Our latest buyer's guide looks at HR management systems. And we look at ways to improve the detection of data breaches. Read the issue now.
-
What you didn’t know about Certificate-Based Authentication
Sponsored by: OpenTrustYou may want to consider a next-generation Public Key Infrastructure (PKI) solution to improve IT security cost-effectively. Read this whitepaper to learn what you should know about next-gen PKI.
-
How to add Mobile Devices to Enterprise PKI solutions
Sponsored by: OpenTrustExtending Public Key Infrastructure’s (PKI) certificate-based authentication to include mobile devices is the only way to restore the security of computing assets in the BYOD era. Read this whitepaper to learn how to add mobile devices to your Enterprise PKI solution.
-
Sharing Security Intelligence: How to Build a Strong Network
Sponsored by: Hexis Cyber Solutions IncThis expert e-guide from SearchSecurity.com explores how joining and creating strong security networks within which you share security intelligence data are crucial to avoiding security incidents and remaining secure.
-
Understanding Web-Based Crime-Fighting Techniques To Protect Your Critical Data
Sponsored by: ImpervaIn this e-guide, brought to you by SearchCompliance.com, you will gain an understanding of the risks to your data and strategies to protect your systems within the limits of your resources.
-
Security University: Data Loss Prevention
Sponsored by: SearchSecurity.comThe difference between suite and point product approaches; assessing what you'll focus on within your own organization, and pitfalls in DLP implementation. In this security school we'll examine real-world tactics to ensure a successful DLP deployment.
-
Bring Your Own Security to the Cloud
Sponsored by: CenterBeamWatch this video to learn how the bring-your-own-security (BYOS) model allows you to have authorization and authentication for cloud-hosted services against your own active directory, not the hosts.
-
Where BCDR and GRC Come Together: A CIO's Guide
Sponsored by: EssextecIn this e-guide, our experts from SearchSecurity.com will help you establish better security with this IT disaster preparation and recovery guide for enterprise CIOs.
-
Network Security Visibility and Analysis Technical Guide
Sponsored by: SearchSecurity.comThis TechGuide explores how to improve network security visibility with network flow analysis tools, cloud security monitoring solutions and anomaly-based monitoring technology. Read on now to secure the data traveling across your network with these monitoring strategies.
-
Computer Weekly – 11 June 2013: Do you know who is on your network?
Sponsored by: ComputerWeekly.comIn this week's Computer Weekly, our latest buyer's guide looks at how identity and access management can improve your information security. We go behind the scenes at Microsoft HQ to find out how the software giant deals with product security. And the CIO from Domino's Pizza tells us why the retailer is moving to the cloud. Read the issue now.
-
Enterprise Mobility Management Options to Keep Corporate Data Safe
Sponsored by: MobileIronThis guide from out experts at SearchConsumerization.com will teach you the essential differences between MDM, MAM, and MIM you need to know in order to deploy each effectively, and how to best approach each in order to keep mobile devices and users as secure as possible. Read on to learn more.
-
Build a Business Case: Embrace Change. Maintain Control. CYOD Lets You Do Both.
Sponsored by: InsightRead on to learn more about CYOD and why so many organizations are seeing this as a viable option to adopt mobility in the enterprise without the security hassles of BYOD. Explore the business case for CYOD, how CYOD works, and more.
-
Achieving a BYOD (Bring-Your-Own-Device) Strategy That Works for You
Sponsored by: InsightRead this white paper to learn five key steps that will help you create a successful BYOD management strategy. Read on and learn the best ways to address device policies, security threats, employee awareness, and more.