ComputerWeekly.com Research Library

Powered by Bitpipe.com

Information Security Research

  • Best Practices in eCatalog Management

    Sponsored by: Ariba, Inc.

    At the heart of procurement systems is a catalog. Even in environments lacking automation, requisitioners consult a hard copy or customer service reps use a catalog at the other end of a phone line. Getting everyone to use the correct catalog from a preferred vendor at the contracted price will ensure that negotiated savings are actually realized.

  • Case Study: Munder Capital Helps to Safeguard $21 Billion in Funds with CA ARCserve Backup

    Sponsored by: arcserve

    Read this case study to learn how this investment firm implemented a simple and scalable disaster recovery solution to protect their sensitive information.

  • Security Threat Report: 2010

    Sponsored by: Sophos UK

    The first decade of the 21st century saw a dramatic change in the nature of cybercrime. Hackers have evolved from teenage boys spreading graffiti for kicks and notoriety to organised, financially motivated gangs. Read this white paper for a better understanding of the history of malware and learn to craft a better, safer future for internet users.

  • ZeuS: A Persistent Criminal Enterprise

    Sponsored by: Trend Micro

    This research paper, presented by Trend Micro, examines the ZeuS botnet; a cyber-criminal tool primarily used to steal money. Access this paper now to learn how ZeuS works, who is behind this crimeware, ZeuS variants now emerging and more.

  • Information Security Magazine: May 2010 - Data: Do you know where it’s going?

    Sponsored by: Information Security Magazine

    This month’s cover story deals with database activity monitoring and how to keep vigilant watch over your data. Other features cover new stealthy and sophisticated malware that aims at hijacking business banking accounts and Windows 7 operating system security improvements. Read on and take a look at all three featured articles and much more.

  • E-Guide: IT Decision Checklist: SIMs and Log Management

    Sponsored by: Tripwire, Inc.

    Security information management systems are effective platforms for the collection, analysis and storage of events from a broad range of systems and devices. We’ll outline what you should look for to get the most relevant data from SIMs. Read this paper to find out more.

  • Your Small Business Security Questions Answered: Social Networks, Sensitive Data, and Business Banking

    Sponsored by: AVG Technologies USA, Inc.

    This brief paper provides in depth answers to three pressing questions that many small businesses are asking about IT security: If social networks are such a risk, shouldn't we just block them? How liable am I for the loss of sensitive data? How safe is online business banking? Read on to learn the answers to these three questions and more.

  • Information Security Magazine - April 2010: Endpoints on the Loose

    Sponsored by: Information Security Magazine

    This month’s cover story focuses on the security threats that mobile devices and portable storage introduce. Other articles expound on topics like fraud prevention, security planning, and code outsourcing. Read on to learn about these important subjects and more.

  • Information Security Magazine - March 2010: Linking ‘Who’ and ‘What’

    Sponsored by: Information Security Magazine

    This month’s cover story, “Linking ‘Who’ and ‘What’”, explains the new trend of joining SIM and IAM strategies to tie system vulnerabilities and policy violations to the user activity that causes them. Other articles in this month’s issue cover topics such as security management, vulnerability assessment, compliance, and more.

  • Information Security - IT Decision Checklist: Application Security

    Sponsored by: Ounce Labs, an IBM Company

    Standards such as SOAP and XML have made it easier to test applications for security holes. We'll explain how to go about this process and what tools are available to help you secure the application layer.

  • Databases at Risk: Current State of Database Security (Enterprise Strategy Group)

    Sponsored by: IBM

    This ESG Research Brief analyzes the current state of database security and categorizes databases as a “dangerous and growing security gap”. Read this brief which offers steps to improve database security across the enterprise.

  • Presentation Transcript: Insider Threats -- an Interview with Bill Crowell -- Former Deputy Director of the NSA

    Sponsored by: Imperva

    Bill Crowell, former Deputy Director of the NSA, is interviewed in this presentation transcript. He talks extensively about insider threats, shares some stories from the trenches, and discusses the nature of cybercrime. Bill also covers the importance of sensitive data protection – especially around mission-critical applications and databases.

  • Anatomy of a Database Attack

    Sponsored by: Imperva

    Corporate databases are in constant danger. Outside criminals can exploit web applications and employees with malicious intent present an even greater threat. This webcast traces the steps involved in breaking into a database and presents a reference architecture and checklist for implementing iron-clad database security measures.

  • Top-10 Guide for Protecting Sensitive Data from Malicious Insiders

    Sponsored by: Imperva

    For years, organizations have worked diligently to lock down their perimeters only to find out that the most devastating enemy is already inside. Insider threats abound -- both careless mistakes and malicious attacks. This guide will explore the top ten ways to protect sensitive data from the very people that need access to it.

  • Seven Practical Steps for Federal Cyber Security and FISMA Compliance

    Sponsored by: Tripwire, Inc.

    This paper provides seven practical steps any information security organization can take to improve information system security and achieve compliance with relevant regulations, standards and internal security and operational policy.

  • E-Book - Online Fraud: Mitigation and Detection to Reduce the Threat of Online Crime

    Sponsored by: TechTarget Security

    As our economy struggles to regain its footing, online fraud is more prevalent than ever. In this E-Book, experts reveal a model for common fraud and present tips on easing fraud pains. Also, find out how financial fraud affects consumer bank behavior. Read on to learn more.

  • Internet Gambling Sites: Expose Fraud Rings and Stop Repeat Offenders with Device Reputation

    Sponsored by: iovation, Inc.

    This white paper will help you understand what new and innovative techniques can be used to combat online fraud and abuse, and how online casinos can realize a true return on investment by reducing losses from fraud exposure and increasing operational efficiency within the fraud detection process.

  • Healthcare Data Loss Assessment: Measure sensitive patient data loss on your network

    Sponsored by: Code Green Networks, Inc.

    Loss of patient data is a top concern for any healthcare organization. They handle some of the most sensitive and personal data on the individuals they treat. Patients trust healthcare organizations to safeguard sensitive data. Read this whitepaper to find more about how a data loss prevention (DLP) solution can protect patient data.

  • LogRhythm 3-Minute Product Demo

    Sponsored by: LogRhythm, Inc.

    This 3 ½ minute overview will give you an introduction to the LogRhythm solution and how it empowers organizations to comply with regulations in audit, secure their networks and optimize their IT infrastructure.

  • Protecting Healthcare Organizations from Patient Data Loss

    Sponsored by: Code Green Networks, Inc.

    Negative publicity from a data breach can have lasting consequences, undermining patient confidence and damaging an organization's reputation. This paper covers potential data breaches within healthcare organizations and strategies for preventing them. Read on to learn more about the steps you can take to protect patients' sensitive information.

  • The Best PCI Audit of Your Life

    Sponsored by: Lumension

    This white paper will detail a strategy that enables companies to easily gain PCI compliance and ensure effective security. By mapping technical controls to PCI standards and by continuously monitoring, assessing, and reporting the status of your environment, you can make your PCI audit the most efficient and actionable of your life.

  • The Critical Security Controls – Moving Beyond the Checklist Mentality

    Sponsored by: Lumension

    The "Critical Security Controls" (CSC) guidelines are designed to help organizations move beyond a "checklist" mentality by making security an integral part of, instead of an adjunct to, the operations and management of systems and networks. Learn more about the CSC guidelines and how they can help your organization.

  • Practical Steps to Achieve and Maintain NERC Compliance

    Sponsored by: Tripwire, Inc.

    This paper describes seven practical steps information security professionals can take to integrate controls into IT production operations, to simultaneously achieve NERC compliance goals, and also IT operational and security goals.

  • Fixing the "Everyone" Problem

    Sponsored by: Varonis

    Read this paper to learn what exactly the problem is with "everyone" access and what new solutions Varonis has to offer.

  • Information Security Magazine, June 2009 - SIMs: More than just a pile of logs

    Sponsored by: Information Security Magazine

    This month's issue of Information Security Magazine covers a breadth of topics. The cover story this month is about SIM and how it can boost compliance, visibility, and overall business intelligence. Other featured articles cover risk management, convergence, and even the security concerns that come with cloud computing. Read on to learn more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.