Security Management Research
-
Fundamentals of Endpoint Security: Anti-Malware Protection
Sponsored by: CitrixAccess this e-guide to learn about anti-malware protection and how endpoint security technology can prevent malware from infecting end-user computers and corporate networks.
-
Ins and Outs of Setting up a SOC
Sponsored by: Respond SoftwareFind out why a security operations center (SOC) can be a valuable part of your organization's cybersecurity strategy. Learn how to set one up, from the 3 types of SOC employees needed to core principles that organizations should follow when setting up their SOC.
-
How to Make the Most of your Detection and Response
Sponsored by: Respond SoftwareLearn from Gartner analyst Anton Chuvakin and Drew Conry-Murray from Packet Pushers, about incident detection and response processes that an organization needs when starting out.
-
Adapt Security for Hybrid Cloud Environments
Sponsored by: CitrixIn this expert e-guide, find out how you can overcome the security challenges of hybrid cloud, and learn about the organizational and cultural changes that accompany this shift in security.
-
Automation in Cybersecurity
Sponsored by: Juniper NetworksDuring his RSA Conference keynote, Juniper CEO Rami Rahim encouraged leaders to be "agents of change" that embrace automation in cybersecurity and new training techniques. Find out how automation in cybersecurity emphasizes the working relationship between AI and humans to prevent attacks.
-
New Cloud Threats to Watch Out for in 2018
Sponsored by: Juniper NetworksSafeguarding your critical data is getting harder as threat actors embrace the advantages, and missteps, of cloud. Inside this expert guide, Kathleen Richards details what to watch out for in 2018.
-
Information Security: Companies Aren't the Only Ones Migrating to Cloud
Sponsored by: TechTarget SecurityHackers are embracing all advantages of the cloud, launching lucrative attacks like malicious cryptomining, DDoS, and ransomware. In this issue of Information Security magazine, editor Kathleen Richards looks at cloud security in 2018 and reveals strategies to protect sensitive data from new internal and external threats.
-
The time is ripe to implement cybersecurity automation
Sponsored by: TechTarget SecurityIt's past time to implement cybersecurity automation. Learn what automation can do for your IT defenses and how to get started in our latest handbook.
-
Mobile security trends point to unifying policy and tools
Sponsored by: TechTarget SecurityMobile security trends reflect how threats shift and devices evolve. The trend now in mobile security is toward unified endpoint management.
-
5 Overlooked Windows 10 Security Risks
Sponsored by: VMwareWindows 10 is being promoted as a cure for several security woes, and while it does hold up against zero-day attacks, there are still several weaknesses. This exclusive guide discusses five Windows 10 security issues that are easy to overlook.
-
Five Principles for Securing DevOps
Sponsored by: Veracode, Inc.Access this white paper to learn the five principles that solutions seeking to integrate application security into DevOps and CI/CD must address.
-
Botnet attacks are evolving; your defenses must too
Sponsored by: AppGuardBotnet attacks will expand and evolve. The best way to fight back is to stop searching for the perfect botnet-protection tool and layer defenses instead.
-
How to update, automate your IR processes
Sponsored by: Booz Allen HamiltonIn the era of nonstop security threats, creating a cyber threat intelligence team and leveraging incident response (IR) tools can help with detection and automation of processes. Explore the tools and considerations for updating your IR processes.
-
How SMBs are Changing their Security Tactics
Sponsored by: Booz Allen HamiltonSecurity has changed dramatically over the decades. In this e-guide, learn why firms look to security analytics to keep pace with cyber threats and how closer collaboration between departments, such as business continuity and information security, could help raise staff awareness.
-
What GDPR privacy requirements mean for U.S. businesses
Sponsored by: TechTarget SecurityEnforcement of the EU's new GDPR privacy regulations is imminent, and potential fines send a clear message to companies to protect their customers, or else.
-
Security Analysis Principles and Techniques for IT Pros
Sponsored by: TechTarget SecurityAs a result of the recent developments affecting security analytics, uncover these tips for ensuring you get the most out of your security analytics tool.
-
The Tug of War Between UBA and SIEM
Sponsored by: TechTarget SecurityIn this issue of Information Security magazine, we look at SIEM, UBA tools and considerations for effectively implementing user behavior analytics. Additionally, our experts dive into Q&A with John Germain, CISO at Duck Creek Technologies and security research expert, Blaine Burnham.
-
Exploring Two New Ways of Getting Insight into the Cybersecurity Landscape
Sponsored by: Juniper Networks, Inc.This e-guide sheds some light on 2 technologies changing the insight we have on our IT security infrastructures. First, explore how to evaluate the machine learning offerings in the cybersecurity market. Then find out what boons shared cloud security assessments can have on your organization.
-
Buyers Guide: Network Security Management
Sponsored by: Palo Alto NetworksWhen it comes to network security, organizations often repeat processes. In this buyers guide, access 10 features your network security management should include and the benefits of network security management. As an added bonus, quiz yourself to determine if it's time to move to network security management.
-
The Case for Modern SOCs
Sponsored by: TechTarget SecurityIn this issue of ISM we look at ways to optimize the next-gen SOC and integration and automation strategies that will help you get there. Additionally, our experts dive into Q&A with the Xerox CISO, how companies are using threat intelligence, why companies are failing to manage vulnerabilities in critical systems and applications, and more.
-
What does a CISO do now? It's a changing, increasingly vital role
Sponsored by: TechTarget SecurityWhat does a CISO do now, with risks proliferating and the most-needed security skills in short supply? Learn why the CISO role is more vital than ever.
-
Logrythm's Security Analytics Platform: Product Overview
Sponsored by: LogRhythm, Inc.In this e-guide, expert Dan Sullivan examines LogRhythm's Security Analytics Platform, a tool that leverages big data analytics and machine learning to help protect enterprises. Learn how this platform works, as well as insights on its support, cost, and deployment.
-
SIEM Analysis for Security Professionals
Sponsored by: LogRhythm, Inc.This expert e-guide explores why it's important that SIEM systems have an analysis interface for security professionals, as well as how advanced security analytics can safeguard your enterprise.
-
Managing Access to Keep Privileged Users' Credentials Secure
Sponsored by: TechTarget SecurityFighting creep through privileged user management is an essential but too often overlooked security practice. Inside this handbook, experts Michael Cobb and Joseph Granneman explain why the fight against privilege creep should be at the top of your security team's to-do list.
-
Why Security in DevOps is Essential to Software Development
Sponsored by: TechTarget SecurityWhat is the point of releasing new software that's loaded up with security vulnerabilities? Security is now an essential ingredient in software development. Inside this handbook, experts take a closer look at how IT professionals can fit security into their development process and how they will benefit from doing so.