Security Management Research
-
Comparing Top Shelf Email Encryption Software Products
Sponsored by: Hewlett Packard EnterpriseAccess this expert e-guide to learn how the top of the line email encryption software measures up to one another. Find out what to look for when it comes to strength of cryptography, file security, mobile device support, and more.
-
Incident Response Tools Can Help Automate Your Security
Sponsored by: ModoModoA major security incident happening isn't a matter of "if", it's simply a matter of "when" for the modern business. This expert e-guide will lead you through the pillars of a solid incident response plan, how to automate your policy with incident response tools, and more.
-
The Evolving Role of Managed Security Service Providers
Sponsored by: TechTarget SecurityIn this issue of Information Security, we look at the evolution of the managed security provider and why services are the fastest-growing part of security.
-
Top Mobile Security Threats: Insight Into Threats and Attackers
Sponsored by: LookoutDiscover how IT can tackle the top modern mobile security threats by identifying vulnerabilities, integrating successfully with the cloud, and more.
-
Incident Response Tools Can Help Automate Your Security
Sponsored by: Cisco Umbrella and Dimension DataIn this era of nonstop security threats, incident response tools that help automate detection and reaction are now essential. In this expert e-guide, learn how to update your IR process.
-
7 Elements of Cybersecurity Readiness
Sponsored by: Cisco Umbrella and Dimension DataDiscover the 7 elements of cybersecurity readiness an organization needs to possess for a high degree of situational awareness into its network operations and network utilization.
-
Building an Application Security Program: Why Education is Key
Sponsored by: tCellGain insight into what an application security program might look like as it develops and what experts have to say about what it could mean for the future of application development.
-
Application Development Security Requires Forethought
Sponsored by: tCellLearn how to define security requirements at the beginning, and what can be learned from the RASP approach in closing the gap left by application security testing.
-
Five Windows 10 security risks that are easy to overlook
Sponsored by: vmware airwatchAs more organizations upgrade from Windows 7, the time is right to think about how to create the perfect Windows 10 security setup. But before upgrading to Windows 10, understand these 5 security risks that are easy to overlook.
-
How to Start Building an Enterprise Application Security Program
Sponsored by: tCellIn this expert e-guide, get a handle on where to start with application security so that you never give attackers a chance.
-
How To Limit Privileged Accounts And Boost Security
Sponsored by: DevolutionsToo many privileged accounts can result in access abuse in enterprises.This expert e-guide details which account privileges should be limited to reduce security incidents, how pervasive the risk is, and the challenges associated with privileged accounts.
-
How mobile remote desktop apps work
Sponsored by: LogMeIn Rescue LensMobile remote desktop apps can be an important tool for enterprises in keeping up with today's on-the-go workforce. The benefits of greater accessibility mean they could be a strategic fit in a variety of enterprise environments. Learn how to select the right mobile remote desktop products for your business, and how they work.
-
Sleeping Android: the danger of dormant permissions
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Information Security Thesis series explains how weaknesses in the Android platform could leave users open to exploitation or abuse.
-
The Current State of Blockchain Compliance
Sponsored by: BAE Systems Applied IntelligenceIn this expert e-guide, we examine blockchains and how they're affecting digital enterprise assets and cybersecurity. Discover how these distributed ledgers relate to Bitcoin and data security. Plus, learn how blockchain innovation and apps like smart contracts are affecting compliance.
-
Artificial Intelligence and Machine Learning: Cybersecurity Advances
Sponsored by: TechTarget SecurityIn this issue of Information Security magazine, we look at machine learning in security and how recent advances may bolster your defenses.
-
Get Smart About Threat Intel Tools and Services
Sponsored by: TechTarget SecurityLearn how threat intelligence tools can improve enterprise security and where they should fit into the broader security scheme.
-
Secure Information Exchange in the Digital Age
Sponsored by: OpenTextForrester Senior Analyst Heidi Shey answers five questions regarding secure information exchange (SIE) and discusses how digital transformations are changing the way that IT decision-makers have to approach SIE in the digital age.
-
SWIFT Banking System Boosts Security Following Cyberattacks
Sponsored by: BAE Systems Applied IntelligenceFollowing a number of attacks on the SWIFT banking system that led to the theft of millions of dollars, SWIFT promised new rules to improve security for bank transfers. In this e-guide, we examine these targeted malware attacks and explore SWIFT's response to them. Find out if their 5-part strategic program was enough to bolster security.
-
Risk Assessment: The Roles Vendors and Frameworks Play
Sponsored by: BitSightAssessing risk is vital to protecting your organization. Discover how to mitigate the risk that third-party vendors present to your organization with an effective, risk-driven assessment framework.
-
Security Rating Scores for Third-Party Vendors Catching On
Sponsored by: BitSightIn this e-guide discover why implementing security rating scores for third-party vendors is catching on, and if their impact is showing to be an overall positive one for the industry.
-
Third-Party Risk Management: How to Avoid the Dangers of Weak Controls
Sponsored by: ModoModoIf you know where the risk points are, you can request additional safeguards to protect the system and data access of trusted business partners. In this guide, security expert Michael Cobb, CISSP-ISSAP, explains how to avoid security risks and implement a third-party risk assessment plan.
-
Why Being Confident in Your Disaster Recovery Plan is Key to Stopping New and Rising Threats
Sponsored by: Iron MountainAs the threat landscape evolves, you need to be able to change with it. In this expert guide, learn some of the ways ransomware operates in order to ready yourself for what may be an inevitable attack. Then, read about what tactics other companies use that allow them to be confident in the strength of their disaster recovery plan.
-
How IAM has Evolved on the Cloud: The Good and the Bad
Sponsored by: IBMLearn how IAM has evolved on the cloud, what has worked well and what IAM procedures need to be strengthened to meet future threats in various virtual environments.
-
Mobile Network Security Remains an Enterprise Challenge
Sponsored by: AppthorityThis expert e-guide addresses the needs enterprises need to meet to successfully deploy a secure, available, and lightning-fast mobile network.
-
Risk Management: Best and Worst Practices
Sponsored by: BitSightDiscover the downsides to digitization, how to manage the risk to your organization's data, and 5 top IT risk management mistakes.