Risk Management Research
-
Disaster recovery and business continuity: Essential guide
Sponsored by: TechTarget ComputerWeekly.comNot only can a solid business continuity strategy protect organisations from reputational damage and lost trade, but – for those operating in regulated industries – it can also prevent firms being hit with downtime-related enforcement action.
-
Resource Center: Stop Threats and Prevent Data Loss
Sponsored by: McAfee, Inc.Get a deeper understanding of who is behind theft, the types of data being stolen and the ways it is getting outside of organizations. Though it's difficult to completely stop, discover policies and procedures you can easily follow to reduce overall data loss.
-
Resource Center: How to Safeguard Data
Sponsored by: McAfee, Inc.This Ponemon Institute study, a featured resource on this custom site, details the critical components of data loss prevention (DLP) maturity and gives you eye-opening statistics on data loss incidents worldwide.
-
SIEM Analysis Interfaces for Security Professionals
Sponsored by: LogRhythm, Inc.This expert e-guide explains how you can avoid SIEM errors by implementing an analysis interface in your SIEM system to ease assessment and interpretation tasks for security professionals.
-
Explore the Evolving DDoS Threat Landscape
Sponsored by: RadwareDelve into the evolution of DDoS threats: learn how to deliver clean network traffic to your customers and mitigate the threat DDoS presents. Additionally, discover how to formulate a DDoS-resistant cloud by taking advantage of content delivery networks, reducing publicly exposed environments, and more.
-
Using DNS Monitoring to Detect Network Breaches
Sponsored by: DynNumerous DNS monitoring methods exist, but 3 stand above the rest. Access this e-guide for our IT security expert's take on DNS monitoring to detect network breaches.
-
What are Threat Intelligence Services?
Sponsored by: UnisysTo help identify advanced attacks, a variety of vendors have created threat intelligence services. In this guide, you'll discover what threat intelligence services entail, learn how they work and uncover how these services differ. Determine whether these services can reduce the risk that specific types of threats pose to your enterprise.
-
DDoS Attacks Are On The Rise – And Fatal to Most Businesses
Sponsored by: Arbor NetworksThis e-guide arms you with the information you need to prepare your defenses for distributed denial of service (DDoS) attacks. Learn how DDoS attacks target your security weak spots, how responses to attacks are improving, and the central challenges surrounding attack prevention.
-
Importance of Incident Response Collaboration
Sponsored by: Dimension DataThis e-guide helps you create a formal incident response plan that allows for effective and efficient collaboration between groups so you can mitigate threats fast. Ensure smooth containment and recovery whenever a breach occurs.
-
Protect Yourself From Antivirus
Sponsored by: Palo Alto NetworksTraditional antivirus (AV) is no longer the solution to preventing endpoint breaches—it's the problem. Access this resource to learn why traditional AV no longer offers meaningful security value for your organization, and see how to get started protecting your endpoints without AV.
-
Cloud Services Take Off, GRC Doesn't
Sponsored by: TechTarget SecurityThe ability for organizations to implement cloud governance models is increasingly challenged by the proliferating use of services by business units and workgroups. This issue of Information Security shares tips on gaining more insight when employees are migrating critical apps and data to the cloud.
-
Former Healthcare CIO Talks Cybersecurity in Healthcare
Sponsored by: OptumGary Seay, former vice president and CIO of Community Health Systems, was one of the earliest victims of a healthcare data breach back in 2014. In this e-guide, Seay shares what he believes every healthcare organization should do to ward off cyberattacks and shares specific technologies involved in maintaining cybersecurity for healthcare.
-
Healthcare CIOs Address Cybersecurity Vulnerabilities
Sponsored by: OptumAs breaches continue in healthcare, it's imperative that CIOs know what best practices and technologies they should be implementing to safeguard their organization. Discover the proven practices that best stave off healthcare cybersecurity vulnerabilities based on advice from four CIOs attending HIMSS 2016.
-
If A Hacker Wants Your Data, Make Sure They Really Work For It
Sponsored by: Carbon BlackThis e-guide teaches you how to implement layered security within the infrastructure you control. Discover how to put strict controls on highly sensitive data and less stringent controls on data that's not so important with network segmentation. You can't entirely eliminate the risk of a breach, but you can make it harder on the attackers.
-
See Why Network Monitoring Tools are Critical in today's Hyperconnected World
Sponsored by: eTECH ChannelThis e-guide helps you determine how to best implement your NPM on day one. You'll learn why these performance-oriented network monitoring systems bear watching and how to resolve downtime issues.
-
BYOD and mHealth: Navigating Security and HIPAA
Sponsored by: OptumBYOD is almost the new norm for healthcare providers, and it has introduced the challenge of protecting devices and data without restricting employees' mobile capabilities. Find out how you can navigate the complex task of meeting HIPAA regulations while allowing the use of BYOD apps and devices, cloud services, and desktop virtualization.
-
Security Tips for HIPAA-Compliant Cloud Storage and Texting
Sponsored by: OptumUnderstanding the rules of HIPAA is only the first step. But then, you must ensure your practices – and your vendors – are compliant. Access this e-guide to gain tips and criteria for evaluating cloud storage vendors and texting systems for sensitive healthcare information.
-
Understand the Hype around Mobile Data Security Threats
Sponsored by: Check Point Software Technologies Ltd.In this expert e-guide, we explore some of the most effective security practices for assessing and managing mobile data security threats. Learn about the root cause for many big data breaches and gain access to 6 tips for radically improving endpoint device security.
-
Stop Future Threats though Careful Examination of the Malware Lifecycle
Sponsored by: Check Point Software Technologies Ltd.This e-guide takes a look at the malware lifecycle and explores how advanced attacks have evolved. Learn how specific advanced attacks work and how you can benefit from studying malware lifecycles to detect and defend against future attacks.
-
Endpoint threat detection gets more response
Sponsored by: Hewlett Packard EnterpriseDiscover how security teams worldwide are attempting to stop cyber-threats using various security methods and endpoint tools. InfoSec professionals have to evaluate what's best for their organizations and make the best judgment at the time -- knowing full well that today's security approach may become tomorrow's liability.
-
Best Practices for Monitoring Today's Murky Threat Environment
Sponsored by: Hewlett Packard EnterpriseIn today's murky threat environment, even cybersecurity firms are vulnerable to attack – proving that there is no such thing as "100% secure." Access this e-guide for tips from security expert Michael Cobb to help you prepare for a security vendor hack. Plus, learn the latest network monitoring means for rooting out fast-moving malicious actors.
-
QRadar: Expert SIEM Product Overview
Sponsored by: IBMLooking for all the security features IBM's security information and event management (SIEM) tool has to offer? Look no further. Principal consultant, Karen Scarfone takes an unbiased look into QRadar. Learn how its features allow easy collection of log data from hosted assets, operating systems, applications, vulnerabilities, and user behavior.
-
Cybersecurity skills shortage demands new workforce strategies
Sponsored by: IBMThe race to find InfoSec professionals who can outpace advanced threats has companies worldwide facing hurdles. This e-guide discusses organizations' want for better qualified candidates and reveals what skills exactly most security professionals are currently lacking.
-
Mobile Data Security Threats: Hype vs. Reality
Sponsored by: LookoutAs threats such as mobile malware evolve, so do the tools to combat them. It's a chess match, and you must stay well-educated to ensure protection. In this e-guide, learn about today's common mobile threats so you can prepare your network to combat them.
-
Office 365: Cloud Data Security Considerations to Explore Before Adopting
Sponsored by: ProofpointIT and security pros are excited about the benefits that Office 365 in the cloud can deliver, but it's important to understand how data security will be impacted. Explore 4 things to consider to ensure you're doing what's right to protect data in the cloud. In addition, security expert Dave Shackleford reviews security pros and cons of Office 365.