ComputerWeekly.com Research Library

Powered by Bitpipe.com

Information Security Research

  • November Information Security Magazine - Re-architect Your Provisioning System Into a First Line of Defense for Access Management

    Sponsored by: Information Security Magazine

    November's edition of Information Security Magazine covers a variety of IT security related topics. Check out this e-zine to learn about re-architecting your provisioning system, meeting mandates in the cloud, how the economy is affecting information security professionals, and much more!

  • E-Guide A Decision Maker’s Guide to Log Management

    Sponsored by: ArcSight, an HP Company

    While often underappreciated by IT professionals, logs are an extremely useful source of data for IT shops. Often undervalued as a strategic weapon, log management tools can play a vital role in securing mission-critical data and assuring accountability. Learn what to consider when it’s time to get a handle on your logs.

  • Essential Guide to SIMs Strategy

    Sponsored by: Information Security Magazine

    Take an incremental approach to security information and event management. Start slow, narrow your goals and be patient with these expensive and complex tools, otherwise data overload will bring you down. Read this guide to find out so much more.

  • Information Security Magazine – October 2010: Database Auditing Tools – The Human Factor

    Sponsored by: Information Security Magazine

    This issue also discusses database audit tools, applications and the selection process. Learn how your organization can leverage these tools to understand database transaction activity, monitor insiders for malicious activity, and how these logs and audit trails can improve your compliance programs.

  • IT@Intel Brief: Enterprise Security Benefits of Microsoft Windows 7

    Sponsored by: Intel

    Read this solution brief to learn how Microsoft Windows 7 provides enterprise information security and protects against malware and phishing. This paper discusses all the key features.

  • Your September Issue of Information Security Magazine– Readers’ Choice Awards

    Sponsored by: Information Security Magazine

    In this month’s issue we provide our 5th annual Readers’ Choice Awards for the best security products in the market. We’ve talked with over 1,500 Information Security readers to find what their favorite products are and why. Read through to see which ones take the gold.

  • Anatomy of a Data Breach - Why Breaches Happen and What to Do About It

    Sponsored by: Symantec Corporation

    This paper examines the three most common sources of data breaches, and offers a broad perspective on what can be done to stop data breaches, as well as specific recommendations to take preventive action.

  • Identity Finder Enterprise Suite 4.5

    Sponsored by: Identity Finder, LLC

    Identity Finder accurately finds and allows remediation of sensitive data across desktops, laptops, servers, databases, and websites. This can be performed agent or agentlessly with full dynamic policy and reporting capability.

  • Data Protection Solutions at Midsize Organizations

    Sponsored by: Trend Micro, Inc.

    In January of 2008, a random sample of online technical newsletter subscribers at midsize companies (100- 5,000 employees) received an email invitation to participate in a survey about data protection solutions use at their organizations. The goal of the survey was to identify sources of and/or reasons for information security breaches and more.

  • Improving Clinician Workflows with One-Touch Desktop Roaming

    Sponsored by: Imprivata

    The move from paper-based medical records systems to EMR is rightly viewed as a step toward improved patient care, increased clinician productivity, and lower costs. But striking a balance between access for clinicians and privacy for patients can be a difficult task. This paper presents a one-touch desktop roaming solution that benefits both.

  • Information Security Magazine – June 2010: Laptop Lockdown

    Sponsored by: Information Security Magazine

    This month’s cover story is on useful and affordable encryption options for preventing data loss in your organization’s riskiest endpoints. Other articles in this issue cover cloud security, Symantec’s recent acquisitions, compliance management, and a debate over hiring convicted hackers. Read these great articles and more in this month’s issue.

  • Best Practices in eCatalog Management

    Sponsored by: Ariba, Inc.

    At the heart of procurement systems is a catalog. Even in environments lacking automation, requisitioners consult a hard copy or customer service reps use a catalog at the other end of a phone line. Getting everyone to use the correct catalog from a preferred vendor at the contracted price will ensure that negotiated savings are actually realized.

  • Case Study: Munder Capital Helps to Safeguard $21 Billion in Funds with CA ARCserve Backup

    Sponsored by: arcserve

    Read this case study to learn how this investment firm implemented a simple and scalable disaster recovery solution to protect their sensitive information.

  • Security Threat Report: 2010

    Sponsored by: Sophos UK

    The first decade of the 21st century saw a dramatic change in the nature of cybercrime. Hackers have evolved from teenage boys spreading graffiti for kicks and notoriety to organised, financially motivated gangs. Read this white paper for a better understanding of the history of malware and learn to craft a better, safer future for internet users.

  • ZeuS: A Persistent Criminal Enterprise

    Sponsored by: Trend Micro

    This research paper, presented by Trend Micro, examines the ZeuS botnet; a cyber-criminal tool primarily used to steal money. Access this paper now to learn how ZeuS works, who is behind this crimeware, ZeuS variants now emerging and more.

  • Information Security Magazine: May 2010 - Data: Do you know where it’s going?

    Sponsored by: Information Security Magazine

    This month’s cover story deals with database activity monitoring and how to keep vigilant watch over your data. Other features cover new stealthy and sophisticated malware that aims at hijacking business banking accounts and Windows 7 operating system security improvements. Read on and take a look at all three featured articles and much more.

  • E-Guide: IT Decision Checklist: SIMs and Log Management

    Sponsored by: Tripwire, Inc.

    Security information management systems are effective platforms for the collection, analysis and storage of events from a broad range of systems and devices. We’ll outline what you should look for to get the most relevant data from SIMs. Read this paper to find out more.

  • Your Small Business Security Questions Answered: Social Networks, Sensitive Data, and Business Banking

    Sponsored by: AVG Technologies USA, Inc.

    This brief paper provides in depth answers to three pressing questions that many small businesses are asking about IT security: If social networks are such a risk, shouldn't we just block them? How liable am I for the loss of sensitive data? How safe is online business banking? Read on to learn the answers to these three questions and more.

  • Information Security Magazine - April 2010: Endpoints on the Loose

    Sponsored by: Information Security Magazine

    This month’s cover story focuses on the security threats that mobile devices and portable storage introduce. Other articles expound on topics like fraud prevention, security planning, and code outsourcing. Read on to learn about these important subjects and more.

  • Information Security Magazine - March 2010: Linking ‘Who’ and ‘What’

    Sponsored by: Information Security Magazine

    This month’s cover story, “Linking ‘Who’ and ‘What’”, explains the new trend of joining SIM and IAM strategies to tie system vulnerabilities and policy violations to the user activity that causes them. Other articles in this month’s issue cover topics such as security management, vulnerability assessment, compliance, and more.

  • Information Security - IT Decision Checklist: Application Security

    Sponsored by: Ounce Labs, an IBM Company

    Standards such as SOAP and XML have made it easier to test applications for security holes. We'll explain how to go about this process and what tools are available to help you secure the application layer.

  • Databases at Risk: Current State of Database Security (Enterprise Strategy Group)

    Sponsored by: IBM

    This ESG Research Brief analyzes the current state of database security and categorizes databases as a “dangerous and growing security gap”. Read this brief which offers steps to improve database security across the enterprise.

  • Presentation Transcript: Insider Threats -- an Interview with Bill Crowell -- Former Deputy Director of the NSA

    Sponsored by: Imperva

    Bill Crowell, former Deputy Director of the NSA, is interviewed in this presentation transcript. He talks extensively about insider threats, shares some stories from the trenches, and discusses the nature of cybercrime. Bill also covers the importance of sensitive data protection – especially around mission-critical applications and databases.

  • Anatomy of a Database Attack

    Sponsored by: Imperva

    Corporate databases are in constant danger. Outside criminals can exploit web applications and employees with malicious intent present an even greater threat. This webcast traces the steps involved in breaking into a database and presents a reference architecture and checklist for implementing iron-clad database security measures.

  • Top-10 Guide for Protecting Sensitive Data from Malicious Insiders

    Sponsored by: Imperva

    For years, organizations have worked diligently to lock down their perimeters only to find out that the most devastating enemy is already inside. Insider threats abound -- both careless mistakes and malicious attacks. This guide will explore the top ten ways to protect sensitive data from the very people that need access to it.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2021 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.

Cookie Preferences