Information Security Research
-
E-Guide: How to tie SIM to identity management for security effectiveness
Sponsored by: TechTarget SecuritySecurity information management systems and identity and access management systems were originally created to work independently, but combining these two disparate technologies presents greater security effectiveness and control.
-
Rethinking Information Security to Improve Business Agility
Sponsored by: IntelTo enable rapid adoption on new technology and usage models—and provide protection in an evolving threat landscape—Intel IT has embarked on a radical five-year redesign of Intel's information security architecture. Continue reading to learn more.
-
Handle with Care: Calculating and managing risk is tricky business
Sponsored by: TechTarget ComputerWeekly.comIn this inaugural issue of Information Security Europe, our cover story dives-deep into the difficult task of calculating and managing risk in the ever-changing European threat landscape.
-
Cloud Computing: Business Benefits With Security, Governance and Assurance Perspectives
Sponsored by: ISACAGlobalization and recent economic pressures have resulted in increased requirements for the availability, scalability and efficiency of enterprise information technology (IT) solutions.
-
Register Free to Visit Infosecurity Europe - 19th - 21st April 2011
Sponsored by: Infosecurity EuropeEurope's No. 1 Information Security event, with an unrivalled free education programme, exhibitors showcasing new and emerging technologies and offering practical and professional expertise.
-
Data Protection 2.0: It’s Not Just Names and Numbers Anymore
Sponsored by: Tripwire, Inc.The external forces of advanced threats and compliance obligations, combined with the internal forces of new business initiatives, lead to a complex set of data protection requirements. This paper provides an overview of the many data protection challenges CISOs face and suggests a sequence of five actions to take to address these challenges.
-
February Issue of Information Security magazine: “Safety Check: Enforcing endpoint security requires careful planning and deployment”
Sponsored by: Information Security MagazineThis month’s Information Security Magazine Online cover story explores the current state of endpoint security enforcement and the challenges enterprises face during implementation.
-
FISMA Compliance: A Holistic Approach to FISMA and Information Security
Sponsored by: IBMIBM can help your federal agency implement a holistic strategy that improves overall security posture and readiness. Read this white paper to learn about the IBM Internet Security Systems (ISS) strategic approach to cybersecurity and gain a clearer understanding of the latest FISMA legislation and compliance mandates.
-
Information Security Magazine – December 2010: Understanding the Data Accountability and Trust Act
Sponsored by: Information Security MagazineThis month’s issue of Information Security magazine takes you deep inside the Data Accountability And Trust Act (DATA), pending legislation that could reshape the national privacy landscape and impact the way enterprises and midmarket companies architect their security operations.
-
Presentation Transcript: Understanding Risk: An Opportunity for IT Managers
Sponsored by: IBMThis presentation transcript of the webcast “Understanding Risk: An Opportunity for IT Managers” outlines the results of an IBM Global Risk Study that was commissioned to understand how IT managers are working to understand and mitigate risk.
-
November Information Security Magazine - Re-architect Your Provisioning System Into a First Line of Defense for Access Management
Sponsored by: Information Security MagazineNovember's edition of Information Security Magazine covers a variety of IT security related topics. Check out this e-zine to learn about re-architecting your provisioning system, meeting mandates in the cloud, how the economy is affecting information security professionals, and much more!
-
E-Guide A Decision Maker’s Guide to Log Management
Sponsored by: ArcSight, an HP CompanyWhile often underappreciated by IT professionals, logs are an extremely useful source of data for IT shops. Often undervalued as a strategic weapon, log management tools can play a vital role in securing mission-critical data and assuring accountability. Learn what to consider when it’s time to get a handle on your logs.
-
Essential Guide to SIMs Strategy
Sponsored by: Information Security MagazineTake an incremental approach to security information and event management. Start slow, narrow your goals and be patient with these expensive and complex tools, otherwise data overload will bring you down. Read this guide to find out so much more.
-
Information Security Magazine – October 2010: Database Auditing Tools – The Human Factor
Sponsored by: Information Security MagazineThis issue also discusses database audit tools, applications and the selection process. Learn how your organization can leverage these tools to understand database transaction activity, monitor insiders for malicious activity, and how these logs and audit trails can improve your compliance programs.
-
IT@Intel Brief: Enterprise Security Benefits of Microsoft Windows 7
Sponsored by: IntelRead this solution brief to learn how Microsoft Windows 7 provides enterprise information security and protects against malware and phishing. This paper discusses all the key features.
-
Your September Issue of Information Security Magazine– Readers’ Choice Awards
Sponsored by: Information Security MagazineIn this month’s issue we provide our 5th annual Readers’ Choice Awards for the best security products in the market. We’ve talked with over 1,500 Information Security readers to find what their favorite products are and why. Read through to see which ones take the gold.
-
Anatomy of a Data Breach - Why Breaches Happen and What to Do About It
Sponsored by: Symantec CorporationThis paper examines the three most common sources of data breaches, and offers a broad perspective on what can be done to stop data breaches, as well as specific recommendations to take preventive action.
-
Identity Finder Enterprise Suite 4.5
Sponsored by: Identity Finder, LLCIdentity Finder accurately finds and allows remediation of sensitive data across desktops, laptops, servers, databases, and websites. This can be performed agent or agentlessly with full dynamic policy and reporting capability.
-
Data Protection Solutions at Midsize Organizations
Sponsored by: Trend Micro, Inc.In January of 2008, a random sample of online technical newsletter subscribers at midsize companies (100- 5,000 employees) received an email invitation to participate in a survey about data protection solutions use at their organizations. The goal of the survey was to identify sources of and/or reasons for information security breaches and more.
-
Improving Clinician Workflows with One-Touch Desktop Roaming
Sponsored by: ImprivataThe move from paper-based medical records systems to EMR is rightly viewed as a step toward improved patient care, increased clinician productivity, and lower costs. But striking a balance between access for clinicians and privacy for patients can be a difficult task. This paper presents a one-touch desktop roaming solution that benefits both.
-
Information Security Magazine – June 2010: Laptop Lockdown
Sponsored by: Information Security MagazineThis month’s cover story is on useful and affordable encryption options for preventing data loss in your organization’s riskiest endpoints. Other articles in this issue cover cloud security, Symantec’s recent acquisitions, compliance management, and a debate over hiring convicted hackers. Read these great articles and more in this month’s issue.
-
Best Practices in eCatalog Management
Sponsored by: Ariba, Inc.At the heart of procurement systems is a catalog. Even in environments lacking automation, requisitioners consult a hard copy or customer service reps use a catalog at the other end of a phone line. Getting everyone to use the correct catalog from a preferred vendor at the contracted price will ensure that negotiated savings are actually realized.
-
Case Study: Munder Capital Helps to Safeguard $21 Billion in Funds with CA ARCserve Backup
Sponsored by: arcserveRead this case study to learn how this investment firm implemented a simple and scalable disaster recovery solution to protect their sensitive information.
-
Security Threat Report: 2010
Sponsored by: Sophos UKThe first decade of the 21st century saw a dramatic change in the nature of cybercrime. Hackers have evolved from teenage boys spreading graffiti for kicks and notoriety to organised, financially motivated gangs. Read this white paper for a better understanding of the history of malware and learn to craft a better, safer future for internet users.
-
ZeuS: A Persistent Criminal Enterprise
Sponsored by: Trend MicroThis research paper, presented by Trend Micro, examines the ZeuS botnet; a cyber-criminal tool primarily used to steal money. Access this paper now to learn how ZeuS works, who is behind this crimeware, ZeuS variants now emerging and more.