Security Infrastructure Research
-
Focus: IT Security in the Middle East
Sponsored by: TechTarget ComputerWeekly.comIn this issue, we look at the challenges facing organisations in the Middle East as they increasingly rely on digital technologies to engage with customers and citizens.We also analyse specific risks to enterprises, such as malware sneaking into networks under the guise of encryption.
-
Sandnet++ – A framework for analysing and visualising network traffic from malware
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Security Series looks at Sandnet++, a framework for analysing and visualising network traffic from malware
-
BadUSB 2.0: Exploring USB man-in-the-middle attacks
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Security Series explores the uses and capabilities of rogue USB hardware implants for use in cyber espionage activities.
-
How to Segment Cloud Workloads for Better Security
Sponsored by: IBMEnterprise cloud workloads can be better secured by using microsegmentation. In this e-guide, Ed Moyle explains the best ways to execute a segmentation strategy.
-
Using DNS Monitoring to Detect Network Breaches
Sponsored by: DynNumerous DNS monitoring methods exist, but 3 stand above the rest. Access this e-guide for our IT security expert's take on DNS monitoring to detect network breaches.
-
When Your IAM Policy Encounters the Internet of Things
Sponsored by: UnisysLearn how to manage the interactions of identity and access management technology, cloud and virtual environments, and the IoT in your company.
-
IoT Security Testing: Cover All Your Bases
Sponsored by: SynopsysWithout the proper IoT security testing, your organization could end up in hot water. In this e-guide industry experts dive into the important of IoT security testing. Get help securing IoT devices and the networks and services they connect to.
-
Five Ways to Secure Mobile Data with EMM
Sponsored by: vmware airwatchIn this expert guide, discover five ways to improve your enterprise mobility management (EMM) policies and secure sensitive data on unsecure devices. Learn how to restrict mobile data movement and neutralize mobile data threats to improve business continuity.
-
The Connection between IoT and DDoS Attacks
Sponsored by: Arbor NetworksIn this e-guide learn of recent DDoS attacks on organizations, how botnets are getting bigger and stronger, and the true cost of being targeted by one of these attacks.
-
How to Use an Incident Response Policy to Better Collaborate
Sponsored by: Delta RiskIn this e-guide learn how to not only prepare your organization's response to a security incident, but also how to work with outside forces more effectively to detect, analyze, contain, and eradicate – as well as, recover essential data.
-
Why So Many Enterprises Lack Proper Authentication Methods
Sponsored by: RSA SoftcatSingle-factor authentication, while allowing for simplicity and ease, leaves companies unnecessarily vulnerable to intrusion. Learn the benefits of multi-factor authentication and what you can do today to improve your organization's authentication and authorization polices.
-
5 Ways to Prevent a Ransomware Infection through Network Security
Sponsored by: IBMEven though ransomware attacks are becoming more creative, getting back to the basics of network security could be the key to preventing future infections. In this e-guide, we explore 5 key steps for preventing ransomware attacks.
-
How to Mitigate Shadow Cloud Services Security Risks
Sponsored by: IBMShadow cloud services are an unavoidable part of the modern enterprise. The natural reaction is often to block access to all unsanctioned cloud services, but this is an outdated approach. In this e-guide, Rob Shapland discusses how to handle shadow cloud services and provides a few simple steps to identify shadow cloud apps and protect your data.
-
How Global Threat Intelligence Fits into a Security Strategy
Sponsored by: IBMBefore considering global threat intelligence services, there are some critical dangers that you may need to address closer to home. In this e-guide, Rob Shapland shares his advice on how simple tools like staff training and awareness can help prevent breaches from phishing attacks and more.
-
Do You Have the Right Authentication Tools to Keep the Bad Guys Out?
Sponsored by: RSA SoftcatMultifactor authentication (MFA) can be a critical component of an enterprise security strategy, but choosing the right product or service is a challenge. Access this e-guide to learn about 8 of the top MFA products in the market, and determine which is best for your enterprise.
-
Recovering From Ransomware Starts with a Data Protection Strategy
Sponsored by: Dell SoftwareStopping ransomware is almost impossible, but recovering from it doesn't have to be. Discover how to devise a solid ransomware recovery plan to successfully return your organization to normal conditions after an outbreak. Using your existing data protection tools and regular back-ups, you can ensure business continuity after disaster strikes.
-
How to Protect Data from Ransomware
Sponsored by: Dell SoftwareIt can be difficult to recover data that is encrypted by ransomware malware. In this expert guide, discover how to stop ransomware from breaching your network in the first place and backup all of your data.
-
Get the Most Out of Your SIEM System
Sponsored by: TrustwaveSIEM platforms remove a huge burden from your security team and allow them to focus on other analysis-related tasks. However, SIEM systems are not infallible. Discover how to better employ your SIEM system to produce the most accurate event analysis you can hope for.
-
Importance of Incident Response Collaboration
Sponsored by: Dimension DataThis e-guide helps you create a formal incident response plan that allows for effective and efficient collaboration between groups so you can mitigate threats fast. Ensure smooth containment and recovery whenever a breach occurs.
-
Protect Yourself From Antivirus
Sponsored by: Palo Alto NetworksTraditional antivirus (AV) is no longer the solution to preventing endpoint breaches—it's the problem. Access this resource to learn why traditional AV no longer offers meaningful security value for your organization, and see how to get started protecting your endpoints without AV.
-
From DevOps to DevSecOps: Integrating Security
Sponsored by: BMCThey key to launching successful DevSecOps initiatives is to help teams spread security activities throughout the development lifecycle, a skillset that experts suggest many developers lack. Discover ways to integrate security into DevOps practices, and how to encourage collaboration within these teams.
-
How Etsy's DevOps Teams Fend off Fraudsters
Sponsored by: BMCIn this e-guide, experts reveal how innovative online businesses like Etsy are implementing next-generation web application firewalls that support DevSecOps initiatives. Learn what insiders are saying about guarding borders vs. securing during the development process, how the latter model could have prevented high-profile breaches, and more.
-
IoT: What it Takes to Run a Wireless, Secure, Mobile Strategy
Sponsored by: Aruba NetworksThe Internet of Things is here and the knowledge of how to run it effectively is vital. Without a plan and without a vision, the IoT can fall apart catastrophically. In this e-guide, learn what it takes to run an IoT wireless network, how BYOD and IoT device onboarding can improve security, and what your mobile security strategy should look like.
-
How to Secure Azure and Recover From the Worst Disasters
Sponsored by: Softchoice CorporationIn this e-guide, expert Rob Shapland breaks down how two new Microsoft Azure features aim to boost cloud security for enterprises. Learn how to keep Azure secure and keep your business going if disaster strikes and the worst is realized.
-
The Current Landscape of Advanced Persistent Threats
Sponsored by: ProofpointIn this e-guide, discover not only how to talk about Advanced Persistent Threats within your enterprise, but also uncover what the current landscape looks like in regards to these ever-evolving malicious attacks.