Risk Management Research
-
Lake Health Enhances Patient Experience with HP ArcSight
Sponsored by: Hewlett Packard EnterpriseUncover the SIEM a healthcare provider put in place which helped them take a proactive approach to information security, mitigate anomalies, increase visibility, ensure regulatory compliance, and more!
-
Webinar: 20 Critical Controls for Cyber Defense
Sponsored by: ISACAJoin ISACA for a webinar hosted by internationally recognized speaker, Dr. Vilius Benetis, on Tuesday, June 24, 2014 at 12:00 PM EDT (16:00 UTC), who will discuss the 20 critical controls identified by SANS and the Council on Cybersecurity.
-
A Survey of Zero-day Attacks in 2013 and What They Say About the Traditional Security Model
Sponsored by: FireEyeThis informative survey explores zero-day attacks in 2013 and what they say about the traditional security model.
-
Can a Federated Identity Service Strengthen SSO?
Sponsored by: Radiant Logic, Inc.With the challenge of identity silo, user overlap, and heterogeneous sources, you need a single access point to access identities from across the infrastructure
-
The Insider Threat of Bring Your Own Cloud (BYOC)
Sponsored by: SkyHighThis Ponemon study highlights the latest bring-your-own-cloud (BYOC) trend, and names the top risks associated with personal cloud services in the workplace.
-
CIO's Guide to Managing Cloud Adoption and Risk
Sponsored by: SkyHighThis whitepaper details how to handle shadow IT by taking the right approach to risk management in the cloud.
-
Beyond the Breach
Sponsored by: FireEyeThis informative whitepaper takes a look at today's threat landscape and outlines the unfortunate news – security breaches are inevitable.
-
Cloud Adoption & Risk Report
Sponsored by: SkyHighThis survey reveals the ongoing struggle with the growing risks in cloud adoption in 2014 to help IT leaders better prepare for future migration projects.
-
Managing Cloud Adoption and Risk
Sponsored by: SkyHighThis 12-item checklist is to help IT pros securely fulfill a cloud adoption.
-
Information Security E-Zine – June 2014
Sponsored by: TechTarget SecurityGlobal threat intelligence services have continued to evolve and play more of role in SIEM and endpoint security products. How can threat intelligence benefit risk scenarios?
-
Tips for Expediting Incident Response
Sponsored by: Threat Track SecurityThis informative resource explores the importance of malware analysis and outlines how to enhance your incident response strategy.
-
Banca Intesa Counters Threats with HP ArcSight
Sponsored by: Hewlett Packard EnterpriseExplore how Banca Intesa, Serbia's leading bank, stays one step ahead of cyber-crime with the help of their security information and event management (SIEM) solution and HP ArcSight – which correlates info across their entire infrastructure.
-
DLL Side-loading: A Thorn in the Side of the Anti-Virus Industry
Sponsored by: FireEyeThis informative whitepaper explores the history of DLL side-loading and its role in the malware arena – affecting your enterprise security.
-
Protecting DNS Infrastructure—Inside and Out
Sponsored by: InfobloxThis white paper unveils the critical risk your domain name system (DNS) is in, and offers leading strategies to help you protect your infrastructure against outside-in and inside-out threats.
-
The University of Leeds Stops Millions of Attacks and Countless Illegal Downloads with HP TippingPoint
Sponsored by: Hewlett Packard EnterpriseThis case study focuses on the University of Leeds' experience with an intrusion prevention system (IPS) that helped IT secure networks without disturbing Web access.
-
15 Point Checklist Cloud Data Protection
Sponsored by: SkyHighThis resource offers 5 exclusive tips for protecting business data across all cloud services.
-
The File Transfer Security Evolution
Sponsored by: GlobalscapeThis white paper highlights 4 key features of a managed file transfer solution that is business-ready and meets increasing user demands for convenience.
-
Case Study: Globalscape® WAFS Expands the Panama Canal
Sponsored by: GlobalscapeThis case study reveals a wide area file services solution that the engineering firms working on the Panama Canal expansion chose to securely exchange large files and collaborate efficiently.
-
Identity and Access Management Guidelines
Sponsored by: Radiant Logic, Inc.This expert e-guide from SearchSecurity.com offers identity and access management best practices to lock in a strategy that lasts.
-
It's Time to Simplify Large File Exchanges
Sponsored by: GlobalscapeAccess this resource to explore a range of security solutions built to fit varying business needs for exchanging large files.
-
Workflow, governance and reporting – Solvency II
Sponsored by: IBMThe following white paper provides readers with industry-leading insights into the key challenges and issues arising when managing all 3 pillars of Solvency II. Learn how to manage workflow around internal models, which process surround reporting and the integration with risk modeling, and more.
-
Consultants: How Can You Secure Your Information with Customers?
Sponsored by: GlobalscapeThis case study focuses on management consulting firm Arthur D. Little's experience with an enterprise-level file exchange solution that was easy to use, secure, rapid to deploy, and scalable.
-
Protecting Critical Data is a Main Priority for the U.S. Army
Sponsored by: GlobalscapeIn this white paper, learn how the U.S. Army can protect their $68 billion-worth of annual data with a set of security solutions that easily integrate with their Standard Army Management Information System (STAMIS).
-
How desktop and app virtualization affects IT security
Sponsored by: CitrixThis white paper highlights a "secure-by-design" solution that not only simplifies data protection, access control, user provisioning, and compliance for virtualized applications and desktops, but reduces the tools needed to best protect them.
-
Cyber Preppers Guide
Sponsored by: Threat Track SecurityThis informative guide provides an effective security preparedness plan – which outlines key strategies for stopping advanced persistent threats (APTs) and other forms of sophisticated malware.