Security Management Research
-
Insider Security Threats: What CISOs Can Do to Mitigate Them
Sponsored by: Preempt SecurityInsider security threats will always exist, but there are steps you can take to limit their impact. Discover how to implement technical access control and authentication to ensure only the right eyes are consuming sensitive data.
-
Is Managed Security Monitoring Right for Your Organization?
Sponsored by: IBMThe effort it takes to keep a security monitoring platform up and running can often make the whole endeavor seem more of a hassle than it is worth. Access this white paper now to learn whether managed security monitoring is right for your organization, and how to find the best partner for you.
-
User Provisioning Best Practices: Access Recertification
Sponsored by: STEALTHbitsUser access recertification is the process of continually auditing users' permissions to make sure they have access only to what they need. Implementing recertification, however, can be challenging. Get best practices on creating a recertification process in this e-guide from IAM expert Randall Gamby.
-
Advanced Attacks are Catching On - Here's What you can Do
Sponsored by: KasperskyIn this e-guide, Kaspersky Lab reports on how enterprises can upgrade their security programs against APT-style attacks. Uncover the effectiveness of network segmentation when it comes to detecting attacks that have bypassed your controls.
-
Straddling the Security Divide Between On-Premises and Cloud
Sponsored by: TechTarget SecurityLegacy security tools designed for data centers don't work well in cloud infrastructures. We help you conquer the divide between on-premises and cloud security in this issue of Information Security.
-
User Behavioral Analytics Tools Can Thwart Security Attacks
Sponsored by: Preempt SecurityInside this expert e-guide, Johna Till Johnson explores the emerging world of User Behavioral Analytics (UBA) and how it can give you a clear view into what should, and what should not, be going on in your virtual environment. Inside you'll find a breakdown of the features a UBA provides, and a basic deployment plan to get your program running.
-
Bridge the Network Security Gap in IP Multifunction Machines
Sponsored by: HP IncIn the following e-guide, experts relay recommendations to secure IP printing and fax devices. Learn where to find guidance on copier and multifunction device security, and how often you should perform vulnerability scans on printers and related systems.
-
DNS Co-Founder Discusses the Need for a More Secure DNS
Sponsored by: DynThis expert e-guide features a Q&A with Paul Mockapetris, inventor of the Domain Name System, where he discusses the immediate need for a more secure DNS and Internet. Additionally, learn what security risks IoT will bring to DNS.
-
Are You Ready for RASP?
Sponsored by: TechTarget SecurityThis runtime application self-protection handbook covers the basics and offers advice on RASP implementation for IT security professionals.
-
Put Endpoint Security in Capable Hands
Sponsored by: TechTarget SecurityEndpoint security threat prevention is a critical enterprise IT concern. Learn the latest on keeping endpoints secure.
-
Explore the Evolving DDoS Threat Landscape
Sponsored by: RadwareDelve into the evolution of DDoS threats: learn how to deliver clean network traffic to your customers and mitigate the threat DDoS presents. Additionally, discover how to formulate a DDoS-resistant cloud by taking advantage of content delivery networks, reducing publicly exposed environments, and more.
-
Healthcare Ransomware Attacks: The Critical Role of Backup and 5 Steps for Response
Sponsored by: XeroxIn early 2016 alone, healthcare organizations saw a 300% increase in daily ransomware attacks from 2015. That's why Harun Rashid, CIO of Children's Hospital of Pittsburgh, has provided 6 pointers for the prevention of a ransomware attack. And in the event that attacks still get through, read through Reda Chouffani's 5 steps for effective response.
-
How to Segment Cloud Workloads for Better Security
Sponsored by: IBMEnterprise cloud workloads can be better secured by using microsegmentation. In this e-guide, Ed Moyle explains the best ways to execute a segmentation strategy.
-
DDoS Prevention For Attacks That Bypass DNS Rerouting
Sponsored by: RadwareIn this e-guide, you'll uncover ways organizations can stay protected when using cloud-based DDoS prevention services. Read on to learn expert strategies from emerging business and technology director Ed Moyle.
-
Using DNS Monitoring to Detect Network Breaches
Sponsored by: DynNumerous DNS monitoring methods exist, but 3 stand above the rest. Access this e-guide for our IT security expert's take on DNS monitoring to detect network breaches.
-
When Your IAM Policy Encounters the Internet of Things
Sponsored by: UnisysLearn how to manage the interactions of identity and access management technology, cloud and virtual environments, and the IoT in your company.
-
DDoS Attacks Are On The Rise – And Fatal to Most Businesses
Sponsored by: Arbor NetworksThis e-guide arms you with the information you need to prepare your defenses for distributed denial of service (DDoS) attacks. Learn how DDoS attacks target your security weak spots, how responses to attacks are improving, and the central challenges surrounding attack prevention.
-
IoT Security Testing: Cover All Your Bases
Sponsored by: SynopsysWithout the proper IoT security testing, your organization could end up in hot water. In this e-guide industry experts dive into the important of IoT security testing. Get help securing IoT devices and the networks and services they connect to.
-
Five Ways to Secure Mobile Data with EMM
Sponsored by: vmware airwatchIn this expert guide, discover five ways to improve your enterprise mobility management (EMM) policies and secure sensitive data on unsecure devices. Learn how to restrict mobile data movement and neutralize mobile data threats to improve business continuity.
-
The Anatomy of DDoS Attacks And Best Practices for Preventing Them
Sponsored by: Arbor NetworksThis expert e-guide explores how a DDoS attack functions, from discovering targets to infiltrating your servers - costing you time, money, and possibly even your public image. Next discover how the 3 major types of DDoS attacks differ, and what you can do to prevent them from gaining access to your information.
-
Application Development Security Requires Forethought
Sponsored by: SynopsysIn this e-guide learn not only how to stay ahead of the competition with a quick development cycle, but also how to ensure the final product stays safe and sound.
-
Building an Application Security Program: Why Education is Key
Sponsored by: SynopsysThis expert guide takes a look at the development process of application security as well as two types of testing that can be beneficial when analyzing security failures.
-
The Connection between IoT and DDoS Attacks
Sponsored by: Arbor NetworksIn this e-guide learn of recent DDoS attacks on organizations, how botnets are getting bigger and stronger, and the true cost of being targeted by one of these attacks.
-
How To Build An Enterprise Application Security Program
Sponsored by: Symantec + Blue CoatBuilding an effective application security program can seem daunting – but it doesn't have to be. In this e-guide, experts detail the first steps enterprises should take, and why education and training are key to the success of these programs.
-
How to Fend Off Hackers with Frequent App Security Testing
Sponsored by: SynopsysIn this expert guide, learn about the realities of the threat hackers pose to your business, as well as several ways that constant app security testing can help close up the gaps in which hackers could sneak in. Then, learn some of the challenges that implementing security testing could pose.