Risk Management Research
-
The Insider Threat of Bring Your Own Cloud (BYOC)
Sponsored by: SkyHighThis Ponemon study highlights the latest bring-your-own-cloud (BYOC) trend, and names the top risks associated with personal cloud services in the workplace.
-
CIO's Guide to Managing Cloud Adoption and Risk
Sponsored by: SkyHighThis whitepaper details how to handle shadow IT by taking the right approach to risk management in the cloud.
-
Beyond the Breach
Sponsored by: FireEyeThis informative whitepaper takes a look at today's threat landscape and outlines the unfortunate news – security breaches are inevitable.
-
Cloud Adoption & Risk Report
Sponsored by: SkyHighThis survey reveals the ongoing struggle with the growing risks in cloud adoption in 2014 to help IT leaders better prepare for future migration projects.
-
Managing Cloud Adoption and Risk
Sponsored by: SkyHighThis 12-item checklist is to help IT pros securely fulfill a cloud adoption.
-
Information Security E-Zine – June 2014
Sponsored by: TechTarget SecurityGlobal threat intelligence services have continued to evolve and play more of role in SIEM and endpoint security products. How can threat intelligence benefit risk scenarios?
-
Tips for Expediting Incident Response
Sponsored by: Threat Track SecurityThis informative resource explores the importance of malware analysis and outlines how to enhance your incident response strategy.
-
Banca Intesa Counters Threats with HP ArcSight
Sponsored by: Hewlett Packard EnterpriseExplore how Banca Intesa, Serbia's leading bank, stays one step ahead of cyber-crime with the help of their security information and event management (SIEM) solution and HP ArcSight – which correlates info across their entire infrastructure.
-
DLL Side-loading: A Thorn in the Side of the Anti-Virus Industry
Sponsored by: FireEyeThis informative whitepaper explores the history of DLL side-loading and its role in the malware arena – affecting your enterprise security.
-
Protecting DNS Infrastructure—Inside and Out
Sponsored by: InfobloxThis white paper unveils the critical risk your domain name system (DNS) is in, and offers leading strategies to help you protect your infrastructure against outside-in and inside-out threats.
-
The University of Leeds Stops Millions of Attacks and Countless Illegal Downloads with HP TippingPoint
Sponsored by: Hewlett Packard EnterpriseThis case study focuses on the University of Leeds' experience with an intrusion prevention system (IPS) that helped IT secure networks without disturbing Web access.
-
15 Point Checklist Cloud Data Protection
Sponsored by: SkyHighThis resource offers 5 exclusive tips for protecting business data across all cloud services.
-
The File Transfer Security Evolution
Sponsored by: GlobalscapeThis white paper highlights 4 key features of a managed file transfer solution that is business-ready and meets increasing user demands for convenience.
-
Case Study: Globalscape® WAFS Expands the Panama Canal
Sponsored by: GlobalscapeThis case study reveals a wide area file services solution that the engineering firms working on the Panama Canal expansion chose to securely exchange large files and collaborate efficiently.
-
Identity and Access Management Guidelines
Sponsored by: Radiant Logic, Inc.This expert e-guide from SearchSecurity.com offers identity and access management best practices to lock in a strategy that lasts.
-
It's Time to Simplify Large File Exchanges
Sponsored by: GlobalscapeAccess this resource to explore a range of security solutions built to fit varying business needs for exchanging large files.
-
Workflow, governance and reporting – Solvency II
Sponsored by: IBMThe following white paper provides readers with industry-leading insights into the key challenges and issues arising when managing all 3 pillars of Solvency II. Learn how to manage workflow around internal models, which process surround reporting and the integration with risk modeling, and more.
-
Consultants: How Can You Secure Your Information with Customers?
Sponsored by: GlobalscapeThis case study focuses on management consulting firm Arthur D. Little's experience with an enterprise-level file exchange solution that was easy to use, secure, rapid to deploy, and scalable.
-
Protecting Critical Data is a Main Priority for the U.S. Army
Sponsored by: GlobalscapeIn this white paper, learn how the U.S. Army can protect their $68 billion-worth of annual data with a set of security solutions that easily integrate with their Standard Army Management Information System (STAMIS).
-
How desktop and app virtualization affects IT security
Sponsored by: CitrixThis white paper highlights a "secure-by-design" solution that not only simplifies data protection, access control, user provisioning, and compliance for virtualized applications and desktops, but reduces the tools needed to best protect them.
-
Cyber Preppers Guide
Sponsored by: Threat Track SecurityThis informative guide provides an effective security preparedness plan – which outlines key strategies for stopping advanced persistent threats (APTs) and other forms of sophisticated malware.
-
Symantec Endpoint Protection 12 Trialware
Sponsored by: Symantec CorporationAccess this trial software by Symantec and discover the benefits of effective endpoint security.
-
Cybersecurity Is Every CIO's Problem
Sponsored by: TechTarget CIOAs breaches mount, many CIOs are finding that enterprise cybersecurity is a competitive advantage and are showing the business how security investments bolster the bottom line.
-
Take Control of Critical Information for Your Employees' Sake
Sponsored by: ClearswiftThis webcast offers key tips on how to reduce insider threat and keep data protected from loss or exposure.
-
Cloud Security Designed for Amazon Web Services (AWS)
Sponsored by: Trend MicroThis white paper offers a brief overview of an Amazon Web Services security solution that relies on security pros to customize its offered features to efficiently and effectively defend your assets in the cloud.