Risk Management Research
-
An Integrated Approach to Managing Application Security
Sponsored by: IBMThis white paper will discuss the major challenges organizations face when protecting apps from today's threats and examines solutions you can leverage to enable risk-based app security.
-
World War C: Understanding Nation-State Motives Behind Today’s Advanced Cyber Attacks
Sponsored by: FireEyeThis guide explores the unique characteristics of cyber-attack campaigns waged by governments worldwide.
-
Protect People, Processes, and Technology From Web Application Threats
Sponsored by: IBMThis resource discusses the security challenges created by web applications and offers insight and advice to help you address these issues.
-
Defending Against Malware: A Holistic Approach to One of Today's Biggest IT Risks
Sponsored by: IBMThis white paper offers background on today's malware and its 4 predictable steps. Click through to discover a set of integrated solutions that offer improved visibility and defense to block advanced attacks.
-
Leverage Security Intelligence for Government Agencies
Sponsored by: IBMThis resource features a security intelligence platform that's paired with data analytics to help prevent, defend, remediate, and analyze more security incidents and policy violations than traditional information security systems.
-
A New Standard for Security Leaders. Insights from the 2013 IBM CISO Assessment
Sponsored by: IBMThis guide discusses security leaders' top concerns with today's aggressive threat landscape.
-
Insider Edition: Antimalware Technologies and Techniques to the Rescue
Sponsored by: TechTarget SecurityIn this special edition of Information Security, our experts examine the recent advances in anti-malware detection and prevention, and which ones can tip the scale in your favor in the fight against malware.
-
The Definitive Guide to the Next Generation of Threat Protection
Sponsored by: FireEyeThis in-depth eBook examines the next generation of threat protection and provides key insights into critical topics, such as advanced persistent threats and zero-day attacks.
-
Discover How Mail Express Solves 2 of Your Biggest IT Headaches
Sponsored by: GlobalscapeMail Express can easily solve your most troublesome headaches surrounding email and it can reduce costs, too. Get all the answers instantly when you download this whitepaper.
-
A Planner's Realistic Guide to Cloud Data Security
Sponsored by: Dell, Inc. and Intel®This expert e-guide will walk you through the creation of a safe and secure cloud environment.
-
Cloud Computing Insider Threats: Exploring Risk Scenarios, Mitigations
Sponsored by: Dell, Inc. and Intel®This expert e-guide highlights possible insider threat scenarios, as well as 11 security issues to consider when choosing a cloud service provider.
-
Anti-Evasion: Why It’s a Critical Component of Intrusion Prevention Systems
Sponsored by: DellEMC and Intel®This resource explores anti-evasion technology, an intrusion prevention system (IPS) add-on that blocks encoded attacks more effectively than traditional solutions.
-
NoSQL Does Not Have to Mean No Security
Sponsored by: IBMThis white paper explores the data security and compliance challenges with NoSQL ("not only SQL") databases, and offers key recommendations on how to address these problems.
-
Understanding and Selecting Data Masking Solutions
Sponsored by: IBMThis white paper examines data masking technology, and pinpoints the must-have features to look for when choosing a solution.
-
PCI DSS compliance 101
Sponsored by: DellEMC and Intel®This white paper guides you through a series of deployments that help you achieve PCI compliance, thus improving overall network security practices.
-
Advanced Attacks Require Federal Agencies to Reimagine IT Security
Sponsored by: FireEyeThis guide outlines the malware "kill-chain" model used in many of today's cyber-attacks and how these can overwhelm traditional security tools.
-
Supply Chain Analysis: From Quartermaster to Sunshop
Sponsored by: FireEyeThis in-depth guide explores the current threat landscape and the role of APTs. Read now for more information on how APTs are being used for wide-scale cybercrime campaigns.
-
IAM for the Real World – Privileged Account Management
Sponsored by: One IdentityRead this e-book for essential information on common security issues with privileged account management (PAM) – and how you can minimize or eliminate them.
-
Behavioral Analytics Applied to Security
Sponsored by: FileTrekThis white paper details a new approach to threat detection that leverages big data and behavioral analytics technology to improve data protection and risk prevention.
-
Security in the Skies
Sponsored by: (ISC)2 UK LtdThis white paper highlights the major cloud security concerns and threats, and offers a list of controls to include in your security strategy to prevent these inherent risks.
-
Unified Threat Management: RFP Technology Decisions
Sponsored by: TechTarget SecurityTo properly evaluate unified threat management (UTM) products, you must understand what each vendor offers and how well it fits with your organization.
-
Unified Threat Management: Decision Time
Sponsored by: TechTarget SecurityLearn how to evaluate your potential vendor's UTM product and its ability to meet your specific business requirements.
-
Operation "Ke3chang": Targeted Attacks Against Ministries of Foreign Affairs
Sponsored by: FireEyeThis guide explores a specific cyber-espionage campaign, how it used advanced persistent threats to infiltrate systems and what you can do to prevent similar attacks.
-
Why You Need A Next-Generation Firewall
Sponsored by: Hewlett-Packard EnterpriseThis white paper explains how next-generation firewalls protect security systems from advanced attacks, and how they fit in with your business strategy.
-
Assuring Software Security Through Testing
Sponsored by: (ISC)2 UK LtdThis white paper offers key recommendations for software developers to test for quality and security assurance before releasing products to the market.