Security Industry Research
-
The Evolution of Application Vulnerabilities, Spam Threats, and Incident Response
Sponsored by: IBMThis report details the many breaches and security incidents that have plagued organizations in recent years; threats from past years that are currently showing signs of resurgence; and issues to be aware of in today's security landscape.
-
A Manifesto for Cyber Resilience
Sponsored by: Symantec CorporationIn this white paper, find out what it takes to become cyber resilient in this age of escalating threats.
-
Security Operations Center (SOC) Essentials for the SME
Sponsored by: AT&T CybersecurityWatch this webcast to develop a greater understanding about SOC and the benefits small and medium enterprises can gain from it.
-
Microsoft Office 365: Strengthening Security, Compliance, and Control
Sponsored by: MimecastThis white paper discusses how third party enhancements focused on security, archiving, and encryption can provide more capable, granular services than Microsoft offers in Office 365.
-
Coming at You: How to Deal with the Latest DDoS Attacks
Sponsored by: TechTarget SecurityAccess this TechGuide to learn more about DDoS threats and how to protect your systems—while shape-shifting cyberattackers are tough to stay ahead of, they're too destructive to ignore.
-
Taking Managed Security Services To The Next Level
Sponsored by: OpenText Security SolutionsThis white paper discusses the changing IT security landscape, how MSPs will be impacted, and what they can do for their customers in the face of these security challenges.
-
International Mobile Security: Survey Research Highlights and Considerations for Enterprise IT
Sponsored by: CiscoThis resource contains the results of an international survey on enterprise mobility, consumerization, and mobile security, and also includes considerations for IT departments in light of this new information.
-
Modern network security for modern threats
Sponsored by: Palo Alto NetworksThis exclusive paper discusses the current state of network security and examines a set of flexible solutions that account for changes to applications, threats, and users, providing air-tight security.
-
Managing Security Risks and Vulnerabilities
Sponsored by: IBMRead now to learn about automated labor-saving automation, a platform that incorporates vulnerability analysis, risk management, and remediation support, all within a single console.
-
Your Personal Web Attack Survival Guide
Sponsored by: ImpervaThis white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.
-
An Expert Guide to the PCI DSS 3.0
Sponsored by: TechTarget SecurityThis expert handbook gives you the information that you require right now to understand the updated requirements for the PCI DSS 3.0, which went into effect in early 2014.
-
A Manager’s Guide to Unified Threat Management and Next-Gen Firewalls
Sponsored by: SophosUnified Threat Management (UTM) is a common tool for most security professionals because of its ability to integrate multiple security technologies onto one platform. This brief guide explores the various questions you should ask when deciding your UTM system.
-
Mobile Security Insider's Edition
Sponsored by: TechTarget SecurityThis Insider Edition explores some of the most useful tools and strategies for reducing threats to your network and protecting your critical data in the era of BYOD.
-
Planning a Career Path in Cybersecurity
Sponsored by: Global KnowledgeThe need for personnel knowledgeable and experienced in security implementation and management has never been greater, and the need is growing.
-
Internal API Management
Sponsored by: Intel CorporationThis exclusive paper examines a flexible platform approach to managing the custom business models and data center deployment needs of today's APIs.
-
Enhancing End-to-End Cloud Security: Part 3
Sponsored by: Intel SecurityThis brief video explores the security options to secure cloud data centers, devices, data and more and then explains the future developments that will make the cloud even more secure. View now to enhance end-to-end cloud security.
-
Protecting Your Website With Always On SSL
Sponsored by: Symantec CorporationThis white paper discusses the imperative need for always on SSL, and the steps you can take to deliver end-to-end protection for your users. It also includes detailed accounts of four organizations that are leading the way with always on SSL in a cooperative effort to make the internet more secure.
-
Cyber Security Intelligence Index - Analysis of Cyber Security attack and incident data
Sponsored by: IBMIBM Managed Security Services continuously monitors tens of billions of events per day, and this white paper provides you the opportunity to gain insight into what this data really means. Read on to discover the prevalent types of attacks and attackers and the key factors enabling them.
-
Case Study - System One
Sponsored by: OpenText Security SolutionsThis brief case study demonstrates how System One Services, a provider of technical outsourcing solutions for clients in the energy, discovered an endpoint protection system that enhanced mobile user protection and reduced network bandwidth while providing vastly improved endpoint security.
-
Online Enemy #1: Blackhole Exploit Kit
Sponsored by: Threat Track SecurityThis short white paper offers key insight and advice for combatting Blackhole malware attacks on your organization's machines. Learn how to successfully thwart these types of threats with automated, centralized software patching.
-
It’s Time Businesses Wake up to Mobile Security Reality
Sponsored by: Threat Track SecurityThis resource underlines the importance of Mobile Device Management (MDM) in ensuring the security of your enterprise in the face of BYOD. Read now to learn how you can alleviate the pressure to account for, manage, and secure the wide range of new endpoints within your organization.
-
Closing the security gap: 2012 IOUG enterprise data security survey
Sponsored by: Oracle Corporation UK LtdThis exclusive paper surveys 350 data center managers to find out what the most prevalent threats are to data security today. Discover what your peers are doing to overcome these challenges, and learn helpful strategies for safeguarding your critical information.
-
Enterprise Security: Why you need Effective Log Management
Sponsored by: TechTarget SecurityFor many, collecting and maintaining logs is a compliance requirement. But IT leaders will soon discover that there are many other practical reasons for maintaining logs. Access today's resource to uncover ways in which log management can tighten data security and boost overall IT performance.
-
Computer Weekly – 2 April 2013: The benefits of context-aware security
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we look at context-aware security – a next generation technology that promises to improve corporate information security. As banks implement more short-term fixes to cope with new regulations, we assess the IT implications. And we examine the benefits of executive coaching for CIOs. Read the issue now.
-
The Demise in Effectiveness of Signature and Heuristic Based Antivirus
Sponsored by: TechTarget ComputerWeekly.comAnti-virus technology is failing to protect organisations from malicious attacks. Security professionals should look at alternative strategies, the NNC group argues in this report.