Information Security Research
-
November ezine: An issue covering the latest techniques in selling security and what to pitch in Q4
Sponsored by: MicroScopeIn the wake of the TalkTalk hacking scandal it would be all too easy for the channel to use it to sell security, but that would be a mistake as customers want to hear more positive thoughts.
-
Global Threats and an Intelligent Response
Sponsored by: SearchSecurity.comIn today's world of multipronged, global threats, a global threat intelligence service is becoming essential to enterprise security strategy.
-
Computer Weekly – 4 August 2015: Cyber risks hit the road
Sponsored by: ComputerWeekly.comIn this week's Computer Weekly, after hackers took remote control of a Jeep Cherokee, we assess the security concerns for internet-connected cars. With the growth of digital banking, is there a need for high-street branches anymore? And we examine whether email overload is hindering the UK's economic productivity. Read the issue now.
-
Surviving in a State of DDoS Denial
Sponsored by: SearchSecurity.comDDoS attack prevention begins with understanding the nature of the latest sophisticated attacks. In this guide, leading security pros explain the mechanics of DDoS, the nature of the newest mega-attacks, and provide concrete, actionable guidance to make your systems as strong as possible.
-
The Essential Guide for Threat Intelligence Services: What to Look For
Sponsored by: SearchSecurity.comThis Buyer's Essential guide explains what you need to know if you're in the market for a threat intelligence service. It outlines the must-have features, like a threat intelligence score, and also explains what you need to do to ensure you benefit as much as possible from adding a threat intelligence feed to your security system.
-
Protecting Your Critical Data with Integrated Security Intelligence
Sponsored by: IBMAccess this white paper to gain actionable insights that can help you reduce security risks and boost compliance.
-
How SIEM Helps IT Security, Compliance, Operations and Management
Sponsored by: CDW CorporationSecurity information and event management (SIEM) tools offer more than just security. In fact, many organizations overlook some of the most useful aspects of SIEM technology, including fraud prevention and operations management. In this expert resource, discover the value of SIEM tools for four different audiences.
-
Top 5 Truths About Big Data Hype and Security Intelligence
Sponsored by: Hewlett Packard EnterpriseThis resource outlines the top five truths behind the Big Data hype and explains why Big Data Security Analytics (BDSA) is the future of security intelligence. Read on to learn how it offers the insight you need to perform real-time threat detection and defense.
-
Countering Cyber-Crime with a Sharp Eye and a Clear Plan
Sponsored by: SearchSecurity.comBigger, more diverse networks mean a bigger attack surface for hackers. Today's networking pros must assess and update network security strategies to account for new vulnerabilities and respond to inevitable attacks.
-
Microsoft Office 365: Strengthening Security, Compliance, and Control
Sponsored by: MimecastThis white paper discusses how third party enhancements focused on security, archiving, and encryption can provide more capable, granular services than Microsoft offers in Office 365.
-
Preventing Dangerous File-Sharing
Sponsored by: GlobalscapeThis resource offers 4 steps to help prevent employees from using unsecured consumer-grade file-sharing solutions.
-
MicroScope May 2014: An issue covering changes in the security market
Sponsored by: MicroScopeAn issue highlighting the changing security landscape and the opportunities for resellers.
-
CIO Decisions E-zine: May 2014
Sponsored by: SearchCIO.comInnovations of the new mobility age, including the connected car, mean that CIOs need to reframe their mobile strategy with a customer-focused slant.
-
Virtualization Security Report: 10 Ways to Regain Control and Reduce Risk
Sponsored by: CitrixThis resource highlights the top 10 benefits of adding desktop virtualization to information security strategies for an increasingly diverse and expansive IT environment.
-
MicroScope April 2014: A special issue covering the information security market
Sponsored by: MicroScopeA special issue covering the opportunities for resellers selling security, and advice on the use of social media.
-
How to Protect the Increasingly Vulnerable Energy Industry
Sponsored by: IBMLearn how an integrated security intelligence platform provides the necessary components to help energy and utilities companies automate compliance and risk management, detect and manage threats, and protect the smart grid from both security breaches and cyber-attacks.
-
Business Driven Governance: Managing Policies for Data Retention
Sponsored by: IBMThis resource explains how you can establish and manage an overall data retention strategy through information governance and database archiving policies.
-
Business-driven data privacy policies - Establish and enforce enterprise data privacy policies to support compliance and protect sensitive data.
Sponsored by: IBMThis resource offers insight to help you establish and enforce business-driven data privacy policies. Read on to learn how to comply with privacy regulations, navigate data governance requirements, and more.
-
Security in the Skies
Sponsored by: (ISC)2 UK LtdThis white paper highlights the major cloud security concerns and threats, and offers a list of controls to include in your security strategy to prevent these inherent risks.
-
Supporting the Zero Trust Model of Information Security
Sponsored by: IBMThis Forrester Research, Inc. report introduces a zero trust model to reduce risk of insider and outsider threats. Learn about this security strategy's 3 main concepts, and discover how the intrusion prevention system (IPS) can be used to fulfill this model.
-
Your Personal Web Attack Survival Guide
Sponsored by: ImpervaThis white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.
-
An Expert Guide to the PCI DSS 3.0
Sponsored by: SearchSecurity.comThis expert handbook gives you the information that you require right now to understand the updated requirements for the PCI DSS 3.0, which went into effect in early 2014.
-
Understanding Big Data So You Can Act with Confidence
Sponsored by: IBMEnsuring your data is secure and trustworthy is paramount to harnessing the power of big data, but it's also a difficult task when you've got such a large volume and variety of information coming into the business. Unfortunately, traditional methods of governing and correcting often aren't applicable to big data -- so what can you do?
-
Why Information Governance Must be Addressed Now, an Aberdeen Report
Sponsored by: IBMThis Aberdeen Group research report explores the challenges of data quality and information governance in the age of big data, and offers must-see advice for avoiding these problems and driving business success.
-
Enterprises Have Room for Improvement in Secure IT Asset Disposition
Sponsored by: Iron MountainAccess this resource to learn why secure IT disposition is a must in order to prevent data loss and compliance violations.