Information Security Research
-
ISM Essentials Guide on Cloud and Virtualization Security
Sponsored by: TechTarget SecurityMoving applications, development and data to the cloud means a new paradigm of IT and security management. You’ll need clear visibility into how data moves outside your organization, where it’s stored and who has access to it. This essential guide from ISM offers expert advice on security around your organization’s cloud computing efforts.
-
e-Guide: Evolving IT security threats: Inside Web-based, social engineering attacks
Sponsored by: TechTarget SecurityDefending IT infrastructure involves understanding attack methods that are effective today. This expert e-guide highlights several characteristics of modern computer security threats to keep in mind as you assess and improve your information security program, and provides recommendations for dealing with them.
-
Internal Controls Checklist for Corporate Data Protection and Compliance
Sponsored by: TechTarget SecurityIn this expert tip, Eric Holmquist details four key governance items that should be on every enterprise’s internal controls checklist to ensure corporate data protection.
-
Computer Weekly 8 November 2011: Read this week's issue of the UK's leading technology publication, with the news, analysis and opinion that matters to IT managers.
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we report from the London Cyberspace Conference where world leaders gathered to discuss internet security. We examine the tools available to help migrate from Windows XP to Windows 7; and hear from Royal Bank of Scotland about how to build a business case for virtual desktops. Download the new issue now.
-
Governance and control: Focus risk management on multiple levers of control
Sponsored by: IBMWritten by Jeremy Hope from Beyond Budgeting Round Table, this paper describes how CFOs should set the highest standards of ethical reporting and behavior.
-
HP ArcSight Express 3.0
Sponsored by: HP Enterprise Security.View this white paper to explore how to maintain the security of your corporate IT assets by detecting more incidents and addressing larger set of log data with HP ArcSight SIEM solutions.
-
E-Guide: Minimize enterprise data exposure inside and outside the organization
Sponsored by: IBMThis expert e-guide provides data masking best practices and explains how to implement an effective strategy for reducing the risk of data exposure from inside and outside the organization.
-
Charlotte County Public Schools: Accelerating Web Applications, Streaming Media, and SSL
Sponsored by: BlueCoatView this case study to discover how Blue Coat SG appliances helped Charlotte County Public Schools radically reduce bandwidth consumption, ensure quality streaming media to large number of students, speed SSL encrypted traffic, provide overall security and control, and more.
-
SearchSecurity.com E-Guide: Ease compliance efforts with a robust information security program Part 2
Sponsored by: IBMThis expert tip highlights the various ways compliance has advanced information security, the new challenges it has introduced and how security pros can further their efforts to adequately secure the organization.
-
SearchSecurity.com E-Guide: Balancing compliance with information security threat assessment
Sponsored by: IBMWhile compliance regulations and standards have improved information security, they have also created unique challenges when it comes to adequately securing the organization. This expert tip offers authoritative, technical advice on how to balance compliance with your information security threat assessment.
-
E-Guide: Striving for Better Information Security Intelligence
Sponsored by: Tripwire, Inc.The need for realistic awareness of the threat landscape has led many businesses to expand their investment to broader insight outside the organization, and deeper visibility within. This expert tip explains how to turn data deluge into business opportunity and offers advice on managing threat exposure in complex IT environments.
-
Information Security Magazine September 2011—Reader’s Choice Awards
Sponsored by: Information Security MagazineBrought to you by SearchSecurity.com, this month’s Information Security Magazine cover story unveils the 2011 Information Security Reader’s Choice Awards. Learn which products your peers voted as the best in the market spanning 14 different categories including; antimalware, mobile data security, vulnerability management and remote access.
-
SearchSecurity.com E-Guide: Ease compliance efforts with a robust information security program
Sponsored by: IBMThis expert tip highlights the various ways compliance has advanced information security, the new challenges it has introduced and how security pros can further their efforts to adequately secure the organization.
-
SearchSecurity.com E-Guide: The critical role of privileged account management in data security
Sponsored by: IBMPrivileged accounts are extremely difficult to secure and now represent the biggest threat to today’s enterprises. This expert tip discusses the technology and strategies available to help organizations take better control over privileged accounts.
-
Presentation Transcript: The Cybercrime War; When Are We Going to Win?
Sponsored by: Dell SecureWorksWhy are information security issues so persistent? Why does it feel like we win small battles, yet the war keeps escalating? What does the next 20 years look like? Erik Petersen, Vice President of Security and Risk Consulting at Dell SecureWorks discuss micro and macro-economic theory to grapple with the core questions of “why.”
-
Technical Guide on SIM
Sponsored by: TechTarget SecuritySecurity information and event management solutions are an indispensible technology in IT security programs to help solidify data protection and compliance initiatives. In this comprehensive guide to SIM, our experts provide authoritative technical advice to help ensure effective SIM deployments and proper on-going maintenance.
-
When Advanced Persistent Threats Go Mainstream
Sponsored by: EMC CorporationThe threat landscape is evolving and a new breed of sophisticated cyber attacks have emerged – APT. APT is highly targeted, thoroughly researched, amply funded, and difficult to detect. This report offers expert insight from information security leaders on APT, risks and defensive measures you can take against escalating threats.
-
Easy DLP - Data Protection Loss
Sponsored by: Boldon JamesThis paper provides technical solutions that address the security requirements of DLP. Explore how Easy DLP can provide major benefits of controlling information flow and raising end-user awareness without wasting time and effort.
-
U.S. Army Relies on GlobalSCAPE® Secure Information Exchange Solutions to Protect Critical Data
Sponsored by: GlobalscapeNow you can get a file sharing solution that the U.S. Army uses and eliminate any worries you have about transferring sensitive business data. This case study will show you how this solution has been very successful for the Army and will teach you how your business could benefit a great deal as well.
-
Real-Time Risk Monitoring: Timely Monitoring and Management of Positions/Exposures
Sponsored by: Sybase, an SAP companyCheck out this white paper now, compliments of Sybase, and learn how you can get timely monitoring and management of your positions and exposures—with less risk!
-
June Issue of Information Security magazine: Mobile Security: A New Game Plan
Sponsored by: Information Security MagazineThis month's Information Security Magazine Online cover story highlights the importance for an updated security game plan due to the influx of personal smartphones and other computing devices making their way into the enterprise. Also, learn how to focus your SIM solution to avoid information overload and explore FISMA challenges.
-
Information Security Ezine- Europe
Sponsored by: TechTarget ComputerWeekly.comThis e-zine presented by SearchSecurity.co.UK will give key tips on how to comply to data protection regulations, and will help you find a product that is right for your business.
-
Threat Analysis: Understanding and Combating DDoS Attacks
Sponsored by: Dell SecureWorksThis analysis focuses on the types of attacks generally referred to as distributed denial-of-service, or DDoS, attacks. DDoS attacks are most often used to extort or damage businesses whose websites or online assets are a major source of revenue, are an indicator of brand value, or are critical to operations.
-
Internal controls checklist for corporate data protection, compliance
Sponsored by: Novell, Inc.In this expert tip, Eric Holmquist details four key governance items that should be on every enterprise’s internal controls checklist to ensure corporate data protection.
-
Cybersecurity Readiness Study: An Executive Summary
Sponsored by: ArcSight, an HP CompanyThis study by Ponemon Institute will cover the development of cyber attacks and the development of security systems that can prevent an detect these attacks. It will also tell you when organizations are doing to counter these threats and how you can find out if your organization is prepared for these threats.