Security Infrastructure Research
-
How to update, automate your IR processes
Sponsored by: Booz Allen HamiltonIn the era of nonstop security threats, creating a cyber threat intelligence team and leveraging incident response (IR) tools can help with detection and automation of processes. Explore the tools and considerations for updating your IR processes.
-
The Case for Modern SOCs
Sponsored by: TechTarget SecurityIn this issue of ISM we look at ways to optimize the next-gen SOC and integration and automation strategies that will help you get there. Additionally, our experts dive into Q&A with the Xerox CISO, how companies are using threat intelligence, why companies are failing to manage vulnerabilities in critical systems and applications, and more.
-
What does a CISO do now? It's a changing, increasingly vital role
Sponsored by: TechTarget SecurityWhat does a CISO do now, with risks proliferating and the most-needed security skills in short supply? Learn why the CISO role is more vital than ever.
-
Why Security in DevOps is Essential to Software Development
Sponsored by: TechTarget SecurityWhat is the point of releasing new software that's loaded up with security vulnerabilities? Security is now an essential ingredient in software development. Inside this handbook, experts take a closer look at how IT professionals can fit security into their development process and how they will benefit from doing so.
-
Owner-controlled PKI: The Next Step in Securing IoT
Sponsored by: DigiCertLearn how owner-operated PKI is making strides in becoming the most secure option for IoT users.
-
Cisco ASA 5500 Series Adaptive Security Appliances
Sponsored by: Cisco Systems, Inc.Cisco ASA 5500 Series Adaptive Security Appliances are purpose-built solutions that integrate world-class firewall, unified communications security, VPN, intrusion prevention (IPS), and content security services in a unified platform. Download this paper for further technical details.
-
The Risks and Flaws of Open Source Security
Sponsored by: Flexera SoftwareIs open source software too much of a risk for enterprises? Before using open source software, you should consider (and understand) the risks involved. In this expert e-guide, featuring tips from industry pros Mike O. Villegas and Michael Cobb, learn what you need to watch out for when it comes to open source security.
-
Ransomware and Cloud Security: Keys to Stop the Threat
Sponsored by: Cisco UmbrellaHighly complex threats are targeting corporate assets and resources every day. In this e-guide, security expert Kevin Beaver reveals 5 ways to prevent a ransomware infection through network security and assistant editor Kathleen Casey explores 5 ways to fend off cloud security threats.
-
Six Criteria for Buying Data Loss Prevention Products
Sponsored by: InteliSecureDiscover 6 steps your organization can take when thinking about what data loss prevention means to your security posture and what to look for to shore up your own defenses.
-
Introduction to Data Loss Prevention Tools
Sponsored by: InteliSecureIn this e-guide discover what it means for security for data to be in use, in motion, and at rest; how DLP works in a standalone vs. integrated context; the DLP learning curve; and more.
-
How the Basics of Network Security Have Evolved
Sponsored by: Fortinet, Inc.In this e-guide, networking expert Andrew Froehlich explores some of the fundamental shifts in network security – drilling down into how modern tools work better together, replacing yesterday's isolated, autonomous components. Learn about 4 cutting-edge security tools that every enterprise network should be evaluating in the coming months.
-
Your Guide to Combatting Ransomware's Domination of 2017
Sponsored by: CyberArkLearn how to boost your ransomware security awareness in this expert e-guide. Additionally, discover why ransomware continues to be a major threat and what ransomware prevention tools can help you win the battle.
-
SSL: Get the Best for You and Mitigate Vulnerabilities
Sponsored by: A10 NetworksInside this e-guide industry experts uncover how security professionals can overcome SSL security issues. Access now to discover how to approach SSL security, tactics to choose the best SSL for your business, 7 steps to overcome SSL vulnerabilities and more.
-
Your IIoT Security Plan: Risks in Manufacturing
Sponsored by: Bayshore NetworksIn this e-guide learn how to get smart about industrial IoT security risks in manufacturing, as well as how to map out an industrial IoT plan to create a smooth-running, smart factory.
-
How to Resolve a Web Application Security Vulnerability
Sponsored by: Veracode, Inc.Discover the importance of application security testing and Web application firewalls (WAFs) in the delivery of modern web-based application deployments.
-
Application Development Security Requires Forethought
Sponsored by: Veracode, Inc.Learn how RASP, or runtime application self-protection, could be the answer to prevent vulnerabilities from slipping through the web app review process and block new, unforeseen threats.
-
Resolve Web Security Issues with Industry Experts' Advice
Sponsored by: Veracode, Inc.Learn how to bridge the communication divide between app developers and security pros, as well as foster secure coding practices in your enterprise to mitigate the vulnerabilities in your web applications.
-
How to Effectively Manage the Cloud Logs of Security Events
Sponsored by: SplunkDiscover the security growing pains created by the growth of cloud file sharing and collaboration services and how they are presenting new problems including "shadow cloud" and alert fatigue.
-
Comparing Top Shelf Email Encryption Software Products
Sponsored by: Hewlett Packard EnterpriseAccess this expert e-guide to learn how the top of the line email encryption software measures up to one another. Find out what to look for when it comes to strength of cryptography, file security, mobile device support, and more.
-
Incident Response Tools Can Help Automate Your Security
Sponsored by: ModoModoA major security incident happening isn't a matter of "if", it's simply a matter of "when" for the modern business. This expert e-guide will lead you through the pillars of a solid incident response plan, how to automate your policy with incident response tools, and more.
-
Top Mobile Security Threats: Insight Into Threats and Attackers
Sponsored by: LookoutDiscover how IT can tackle the top modern mobile security threats by identifying vulnerabilities, integrating successfully with the cloud, and more.
-
Incident Response Tools Can Help Automate Your Security
Sponsored by: Cisco Umbrella and Dimension DataIn this era of nonstop security threats, incident response tools that help automate detection and reaction are now essential. In this expert e-guide, learn how to update your IR process.
-
7 Elements of Cybersecurity Readiness
Sponsored by: Cisco Umbrella and Dimension DataDiscover the 7 elements of cybersecurity readiness an organization needs to possess for a high degree of situational awareness into its network operations and network utilization.
-
Building an Application Security Program: Why Education is Key
Sponsored by: tCellGain insight into what an application security program might look like as it develops and what experts have to say about what it could mean for the future of application development.
-
Application Development Security Requires Forethought
Sponsored by: tCellLearn how to define security requirements at the beginning, and what can be learned from the RASP approach in closing the gap left by application security testing.