Security Management Research
-
How to Use an Incident Response Policy to Better Collaborate
Sponsored by: Delta RiskIn this e-guide learn how to not only prepare your organization's response to a security incident, but also how to work with outside forces more effectively to detect, analyze, contain, and eradicate – as well as, recover essential data.
-
3 Steps to Secure Cloud Database-as-a-Service
Sponsored by: Oracle Corporation UK LtdDatabase-as-a-Service (DBaaS) may be easy to deploy and easy to manage, but it's not without its own security challenges. Evaluating a provider is an important first step, but where do you go from there? In this e-guide, we explore 3 key steps to ensuring secure cloud database services. Discover how to make your DBaaS migration safe and successful.
-
Why So Many Enterprises Lack Proper Authentication Methods
Sponsored by: RSA SoftcatSingle-factor authentication, while allowing for simplicity and ease, leaves companies unnecessarily vulnerable to intrusion. Learn the benefits of multi-factor authentication and what you can do today to improve your organization's authentication and authorization polices.
-
5 Ways to Prevent a Ransomware Infection through Network Security
Sponsored by: IBMEven though ransomware attacks are becoming more creative, getting back to the basics of network security could be the key to preventing future infections. In this e-guide, we explore 5 key steps for preventing ransomware attacks.
-
How to Mitigate Shadow Cloud Services Security Risks
Sponsored by: IBMShadow cloud services are an unavoidable part of the modern enterprise. The natural reaction is often to block access to all unsanctioned cloud services, but this is an outdated approach. In this e-guide, Rob Shapland discusses how to handle shadow cloud services and provides a few simple steps to identify shadow cloud apps and protect your data.
-
How Global Threat Intelligence Fits into a Security Strategy
Sponsored by: IBMBefore considering global threat intelligence services, there are some critical dangers that you may need to address closer to home. In this e-guide, Rob Shapland shares his advice on how simple tools like staff training and awareness can help prevent breaches from phishing attacks and more.
-
Do You Have the Right Authentication Tools to Keep the Bad Guys Out?
Sponsored by: RSA SoftcatMultifactor authentication (MFA) can be a critical component of an enterprise security strategy, but choosing the right product or service is a challenge. Access this e-guide to learn about 8 of the top MFA products in the market, and determine which is best for your enterprise.
-
How to Protect Data from Ransomware
Sponsored by: Dell SoftwareIt can be difficult to recover data that is encrypted by ransomware malware. In this expert guide, discover how to stop ransomware from breaching your network in the first place and backup all of your data.
-
Importance of Incident Response Collaboration
Sponsored by: Dimension DataThis e-guide helps you create a formal incident response plan that allows for effective and efficient collaboration between groups so you can mitigate threats fast. Ensure smooth containment and recovery whenever a breach occurs.
-
Protect Yourself From Antivirus
Sponsored by: Palo Alto NetworksTraditional antivirus (AV) is no longer the solution to preventing endpoint breaches—it's the problem. Access this resource to learn why traditional AV no longer offers meaningful security value for your organization, and see how to get started protecting your endpoints without AV.
-
The Benefits of Conducting a Network Security Overview
Sponsored by: GigamonBy preventing rogue projects from proliferating, and adopting a holistic approach to security, you can begin to prove the value of the security team. Access this e-guide to learn more about the benefits of conducting security overviews of every enterprise initiative and tightening up your enterprise's cybersecurity practices.
-
Squash Large Business Email Security Challenges
Sponsored by: Intermedia NetIf you're a large enterprise, your security needs are unique. So don't take advice from a small organization, and learn how to accommodate the challenges specific to your size. This exclusive e-guide explores some Exchange security challenges and considerations that large enterprises face on a daily basis.
-
From DevOps to DevSecOps: Integrating Security
Sponsored by: BMCThey key to launching successful DevSecOps initiatives is to help teams spread security activities throughout the development lifecycle, a skillset that experts suggest many developers lack. Discover ways to integrate security into DevOps practices, and how to encourage collaboration within these teams.
-
How Etsy's DevOps Teams Fend off Fraudsters
Sponsored by: BMCIn this e-guide, experts reveal how innovative online businesses like Etsy are implementing next-generation web application firewalls that support DevSecOps initiatives. Learn what insiders are saying about guarding borders vs. securing during the development process, how the latter model could have prevented high-profile breaches, and more.
-
IoT: What it Takes to Run a Wireless, Secure, Mobile Strategy
Sponsored by: Aruba NetworksThe Internet of Things is here and the knowledge of how to run it effectively is vital. Without a plan and without a vision, the IoT can fall apart catastrophically. In this e-guide, learn what it takes to run an IoT wireless network, how BYOD and IoT device onboarding can improve security, and what your mobile security strategy should look like.
-
How to Secure Azure and Recover From the Worst Disasters
Sponsored by: Softchoice CorporationIn this e-guide, expert Rob Shapland breaks down how two new Microsoft Azure features aim to boost cloud security for enterprises. Learn how to keep Azure secure and keep your business going if disaster strikes and the worst is realized.
-
Say Hello, Again, to SIEM
Sponsored by: TechTarget SecurityThis expert handbook provides 3 tips to get the most out of your existing SIEM system. Plus, uncover important SIEM capabilities when evaluating SIEM for real-time analytics use.
-
The Current Landscape of Advanced Persistent Threats
Sponsored by: ProofpointIn this e-guide, discover not only how to talk about Advanced Persistent Threats within your enterprise, but also uncover what the current landscape looks like in regards to these ever-evolving malicious attacks.
-
How to Approach Storage Disaster Recovery
Sponsored by: RubrikIn this e-guide learn how to turn back time on a disaster to recover what was lost; manage "deduped" data, and more. Read on to ensure your enterprise can take a hit and recover quickly, allowing for a low-impact return to normalcy.
-
Time for an IAM Overhaul
Sponsored by: TechTarget SecurityIAM security policies must take into account the latest technology developments, especially cloud and the Internet of Things. Access this three-part technical guide to gain valuable information on IAM strategy in the face of rapidly evolving technology.
-
Conquering the Cloud: Top Security Issues and Keeping Hackers at Bay
Sponsored by: Trend Micro, Inc.In this e-guide, discover two articles that detail the top security issues of the cloud and offer strategies on how to keep malicious hackers at bay.
-
Testing the Cloud: Ensuring Enterprise Data is Secure
Sponsored by: Trend Micro, Inc.In this e-guide, discover how to minimize threats through public cloud security testing. Plus, learn how penetration testing requirements differ for AWS, Google and Azure.
-
Managing Information Security Amid New Threats: A Guide for CIOs
Sponsored by: Cisco UmbrellaIn this e-guide discover the fundamentals of a proactive security policy and the challenges that must be overcome when adopting one.
-
Cloud Access Security Brokers Fill Critical Enterprise Void
Sponsored by: Palerra Inc.In this e-guide, expert Paul Korzeniowski explores the pros and cons of cloud access security brokers, their standing in the security field, and the challenges they face.
-
Cloud Security Automation: Are We Up To The Task?
Sponsored by: Palerra Inc.In this e-guide, learn how to bridge the divide between DevOps and security. Discover how to fix the security problems encountered when leveraging the agility of the cloud.