Risk Management Research
-
Open Source Strategies Spark Security and Integration Concerns
Sponsored by: Black Duck SoftwareIn this e-guide, experts discuss the importance of moving past security concerns with open source strategies. Find out how your enterprise can keep your infrastructure secure with open source strategies so that you can meet your high-performance needs.
-
Find the Right EFSS to Secure Employee File Sharing
Sponsored by: Trend Micro, Inc.This e-guide gives you a way to solve your enterprise file synchronization and sharing needs.
-
Keep Your Data Secure in the Wake of the Heartbleed OpenSSL Vulnerability
Sponsored by: Symantec Website SecurityIn this e-guide, learn about the web security implications of Heartbleed, the security defect found in several OpenSSL versions. View now to find out whether your enterprise should be concerned and how to protect your data from this bug.
-
Broadening Your VDI Horizon Beyond Thin Client Devices
Sponsored by: Dell, Inc. and Intel®This exclusive e-guide details how you can move beyond traditional thin client devices for VDI access to either existing, reconfigured PCs or mobile devices. Access now and you'll learn how most non-thin-client access uses exactly the same mechanisms as thin clients.
-
Why it's Time for Locked-Down Desktops
Sponsored by: Dell, Microsoft and CitrixAccess this exclusive e-guide to take a look at why IT teams are locking down desktops in order to restrict user-installed apps (UIAs). You'll also explore the benefits locked-down desktops can have on IT departments.
-
Physical vs. Virtual Desktop Security: It's Just Not The Same
Sponsored by: Dell, Inc. and Intel®This expert e-guide discusses the differences in security methods between physical and virtual desktops. Download now and you'll get access to a handy table with a complete breakdown of physical and virtual desktop security risks and techniques.
-
Virtual Desktop Security: Exploring VDI Features
Sponsored by: Dell, Inc. and Intel®This white paper discusses various virtual desktop security capabilities offered by VDI products. Some of the capabilities described within include encryption, application and role-based policy management and virtual sandboxing.
-
Layered Security Doesn't Stop Cybercriminals – but VDI Might
Sponsored by: Dell, Microsoft and CitrixThis exclusive e-guide discusses ways cybercriminals successfully breach even the most well-secured enterprise defenses. Read on and learn how VDI can offer an enhanced level of security enterprises require.
-
Under Attack? 2016 Defenses Escape Compromise
Sponsored by: TechTarget SecurityIn this issue of Information Security magazine, we look at security attack techniques and talk to top security researchers about enterprise threats in 2016.
-
Endpoint Threat Detection Gets More Response
Sponsored by: Solarwinds MSPThis white paper explains what cyber threats the United States faces on a daily basis and what tools they have to combat them.
-
Computer Weekly – 1 December 2015: Balancing speed and risk in IT projects
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, as IT leaders face boardroom pressure to roll out IT projects ever more quickly, we examine how to do that without running unacceptable risks. Michael Dell talks about how he sees the future for his company when it buys EMC. And we hear from IT chiefs about the challenges of implementing DevOps. Read the issue now.
-
"Hacking as a Service," and Other Emerging Threats
Sponsored by: TechTarget SecurityLethal threats to enterprise security are emerging from every which way. Access this exclusive edition of Information Security Magazine to learn just what you're up against.
-
What to Look for in Vulnerability Management
Sponsored by: TechTarget SecurityThis Buyer's Essentials guide helps InfoSec pros, like you, assess and purchase vulnerability management tools. It explains how they work and highlights key features you should look for.
-
Endpoint Security Management: Beyond Antivirus
Sponsored by: TechTarget SecurityAccess this e-book for expert tips from security experts on endpoint security that moves beyond outdated signature-based tools.
-
Is it time for a DLP system in your enterprise?
Sponsored by: TechTarget SecurityData loss prevention technology is a mature security control whose role is growing as DLP systems are made to respond to mobile and cloud technology in the enterprise.
-
Protect Your Web Applications from the OWASP Top 10
Sponsored by: IBMApplications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
-
Fighting Cybercrime in the 21st Century
Sponsored by: TechTarget SecurityStrengthen your security with these expert insights into fighting advanced crimeware.
-
Next-Generation Security in a Mobile Era
Sponsored by: TechTarget CIOMobile security isn't just a matter investing more in security technologies. Access this handbook to learn what CIO expert Harvey Koeppel thinks it will take to reformulate your mobile security strategy and tackle today's mobile risks. Also uncover the top 10 mobile security risks, a 7-point checklist for guarding mobile apps and devices, and more.
-
The Essential Guide for Threat Intelligence Services: What to Look For
Sponsored by: TechTarget SecurityThis Buyer's Essential guide explains what you need to know if you're in the market for a threat intelligence service. It outlines the must-have features, like a threat intelligence score, and also explains what you need to do to ensure you benefit as much as possible from adding a threat intelligence feed to your security system.
-
CIO Decisions E-Zine - February 2015
Sponsored by: TechTarget CIOWhen it comes to high-profile data breaches, hindsight is 20/20. In this issue of CIO Decisions, we examine the new security paradigm and how CIOs are strategizing to protect data.
-
The Bot Threat
Sponsored by: Hewlett Packard EnterpriseIn this white paper, get vital information about the malicious bot, also known as botnets when in large forces, and explore 4 key features that will help you build a defense-in-depth security system to prevent these attacks from compromising your networks.
-
Cost of a Breach Rising; How to Protect Against It
Sponsored by: TaaSeraThis expert e-guide explores how the Target breach of 2013 has changed the way organizations approach security.
-
How to Deal with Increasing DDOS Attacks
Sponsored by: Verisign, Inc.This expert e-guide explores how to protect your organization from distributed denial of service attacks.
-
Manage Your Operational Big Data Like a Super Hero
Sponsored by: IBMLearn about an industry-leading vendor's solution for IT operations analytics that can help you manage big data.
-
IBM System x Family Brochure
Sponsored by: Lenovo and IntelIf you’re looking for ways to create a dynamic infrastructure, look no further. This brochure shows how IBM System x and BladeCenter servers help to deliver an infrastructure that reduces operating costs, manages present and future risk, and improves services.