Information Security Research
-
Tips on Managing the Deluge of Information Security Threat Reports
Sponsored by: TechTarget SecurityDon't get overwhelmed by today's cyber-attacks: Access this expert e-guide to take advantage of threat report data and use it as actionable intelligence. Read on to discover the real impact of insider security threats.
-
MicroScope May 2014: An issue covering changes in the security market
Sponsored by: MicroScopeAn issue highlighting the changing security landscape and the opportunities for resellers.
-
CIO Decisions E-zine: May 2014
Sponsored by: TechTarget CIOInnovations of the new mobility age, including the connected car, mean that CIOs need to reframe their mobile strategy with a customer-focused slant.
-
Virtualization Security Report: 10 Ways to Regain Control and Reduce Risk
Sponsored by: CitrixThis resource highlights the top 10 benefits of adding desktop virtualization to information security strategies for an increasingly diverse and expansive IT environment.
-
MicroScope April 2014: A special issue covering the information security market
Sponsored by: MicroScopeA special issue covering the opportunities for resellers selling security, and advice on the use of social media.
-
How to Protect the Increasingly Vulnerable Energy Industry
Sponsored by: IBMLearn how an integrated security intelligence platform provides the necessary components to help energy and utilities companies automate compliance and risk management, detect and manage threats, and protect the smart grid from both security breaches and cyber-attacks.
-
Business Driven Governance: Managing Policies for Data Retention
Sponsored by: IBMThis resource explains how you can establish and manage an overall data retention strategy through information governance and database archiving policies.
-
Business-driven data privacy policies - Establish and enforce enterprise data privacy policies to support compliance and protect sensitive data.
Sponsored by: IBMThis resource offers insight to help you establish and enforce business-driven data privacy policies. Read on to learn how to comply with privacy regulations, navigate data governance requirements, and more.
-
Security in the Skies
Sponsored by: (ISC)2 UK LtdThis white paper highlights the major cloud security concerns and threats, and offers a list of controls to include in your security strategy to prevent these inherent risks.
-
Supporting the Zero Trust Model of Information Security
Sponsored by: IBMThis Forrester Research, Inc. report introduces a zero trust model to reduce risk of insider and outsider threats. Learn about this security strategy's 3 main concepts, and discover how the intrusion prevention system (IPS) can be used to fulfill this model.
-
Your Personal Web Attack Survival Guide
Sponsored by: ImpervaThis white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.
-
An Expert Guide to the PCI DSS 3.0
Sponsored by: TechTarget SecurityThis expert handbook gives you the information that you require right now to understand the updated requirements for the PCI DSS 3.0, which went into effect in early 2014.
-
Understanding Big Data So You Can Act with Confidence
Sponsored by: IBMEnsuring your data is secure and trustworthy is paramount to harnessing the power of big data, but it's also a difficult task when you've got such a large volume and variety of information coming into the business. Unfortunately, traditional methods of governing and correcting often aren't applicable to big data -- so what can you do?
-
Why Information Governance Must be Addressed Now, an Aberdeen Report
Sponsored by: IBMThis Aberdeen Group research report explores the challenges of data quality and information governance in the age of big data, and offers must-see advice for avoiding these problems and driving business success.
-
Enterprises Have Room for Improvement in Secure IT Asset Disposition
Sponsored by: Iron MountainAccess this resource to learn why secure IT disposition is a must in order to prevent data loss and compliance violations.
-
December Information Security Magazine
Sponsored by: TechTarget SecurityEveryone in the information security filend knows how hard it is to stay ahead of the rapidly evolving threat landscape. In this month's edition of Information Security, learn about a variety of sercurity issues.
-
KPN focuses on Information Security with HP
Sponsored by: Hewlett-Packard EnterpriseView this brief webcast to gain insight on an information security solution one organization chose to defend against today's highly motivated hackers, and how they're benefiting.
-
Mobile Security Insider's Edition
Sponsored by: TechTarget SecurityThis Insider Edition explores some of the most useful tools and strategies for reducing threats to your network and protecting your critical data in the era of BYOD.
-
Analyst advice for IT security leaders
Sponsored by: IBMBusiness leaders around the world are increasingly concerned about the protection of intellectual property. In this informative Forrester report, view the results of a survey of 225 IT security leaders about their investments in information security.
-
Making the Most of BYOD Opportunities
Sponsored by: Dell and VMwareAccess this informative white paper to unveil the true value behind bring-your-own-device (BYOD) programs, and properly enable device diversity and enforce appropriate safeguards to keep personal and business items separate for optimum business productivity.
-
Economic & Productivity Impact of IT Security on Healthcare - Video
Sponsored by: ImprivataView this webcast to explore the results of a recent Ponemon Institute study that indicate a clear need for healthcare institutions to invest in modern communications technology to ensure efficient patient care, as well as compliance with the Health Insurance Portability and Accountability Act (HIPAA) regulations.
-
Clearswift Government Communications 2.0
Sponsored by: ClearswiftIn this resource, explore the evolving trends in the public sector landscape, and what this means for information governance and security. Learn how crucial it is to prevent data leakage for the sake of regulations and citizens' trust.
-
Pay-as-you-Grow Data Protection
Sponsored by: IBMThis resource examines the data protection requirements of small to midsize businesses (SMBs), and introduces a strategy that enables your organization meet the challenges of explosive data growth.
-
Podcast: The challenges of managing mobile devices across a corporate IT environment
Sponsored by: BlackBerryThis informative podcast discusses the common mobile device management challenges that IT faces and what your organization can do to alleviate them.
-
Intelligent Business Strategies whitepaper: Enterprise Information Protection - The Impact of Big Data (March 2013)
Sponsored by: IBMThis informative white paper examines what the effects of big data on information security and privacy are, discussing the requirements that organizations need to meet before introducing big data and identifying its impact on said requirements.