Security Management Research
-
Healthcare Cybersecurity Best Practices
Sponsored by: ServiceNowIn this expert e-guide, find out what CIOs attending HIMSS 2016 had to say on how to best identify and protect against healthcare cybersecurity vulnerabilities. Plus, learn why one CIO believes network monitoring is the key to cybersecurity in healthcare.
-
Security Challenges in Healthcare Social Media Usage
Sponsored by: ActianceIn this e-guide, Jeani Park, senior director at an Internet and mobile device monitoring company, answers questions about security challenges that healthcare organizations face when it comes to social media. Discover best practices for governing use of social media in a hospital or practice so that you can ensure patient information stays secure.
-
Buyer's Essentials: What to Look for in Single Sign-On Technology
Sponsored by: TechTarget Health ITAre you on the hunt for single sign-on (SSO) technology? Discover the differences between the numerous approaches to SSO, their benefits, and what works for various types of healthcare organizations. In this guide, health IT expert Rick Krohn shares his advice on choosing the right SSO tech for your practice.
-
Recognize Your Security Shortcomings and Address Them with Confidence
Sponsored by: Dell, Inc. and Intel®This white paper shows you the current state of data security among businesses of all sizes. Learn about the concerns adopting a cloud-based infrastructure raises and how to confidently secure your IT environment overall.
-
An Introduction to Microsoft Office 365 and Email Security Tools
Sponsored by: Solarwinds MSPIn this e-guide, expert Dave Shackleford discusses the security pros and cons of Microsoft Office 365's cloud-based productivity suite. You'll also find a section on email security, including helpful information about choosing between on-premise email security tools, or embracing the cloud.
-
What to Look for in Multifactor Authentication Tools
Sponsored by: TechTarget SecurityIn our threat-laden environment, multifactor authentication tools are a critical defense. Access this resource and learn the latest about MFA technology, how to compare MFA tools and select the right product for your organization.
-
It's time to tackle IoT security
Sponsored by: RUCKUS NetworksThe forecasts for IoT are huge. Some suggest that there will be 50 billion devices connected by 2020. Whether or not that prediction is accurate, it's clear that IoT is gaining meaningful market momentum, buoyed by an endless array of applications. Unfortunately, they are creating a multitude of security vulnerabilities and attack surfaces.
-
Protecting Patient Data in the Mobile Era
Sponsored by: TechTarget Health ITThe rapid adoption of EHRs, coupled with the widespread use of mobile devices among providers, has increased the endpoint security threat – and there are more risks ahead. Access this issue of Pulse to find out how providers are locking down access points to protect against data breaches and HIPAA violations.
-
Dispelling the Shadows Cast Over IT Security
Sponsored by: Cisco UmbrellaThis guide discusses two shadows that are being cast over IT security. Domain shadowing, and shadow IT. By learning about these two threats, you'll be better equipped to ensure that you won't face crippling attack down the line.
-
Security: Communicating to the Board of Directors and Evaluating Vendors' Promises
Sponsored by: BitSightThis informative e-guide provides expert advice on how to plan security assessment reports to effectively communicate key security elements to the board of directors. Inside, also discover how a vendor security checklist can help you weigh your security needs against vendors' claims.
-
The Business Benefits of Managing Cyber Risk and Minimizing Unnecessary Data
Sponsored by: UnitedLexCyber risk management is becoming an increasingly important area of concern as company directors' realize the limitations of insurance. How can you address this risk and instill confidence in your customer engagement? Find out how to enhance your cyber risk management using 4 key strategies.
-
Advanced Persistent Threat Detection: Can It Find Custom Malware?
Sponsored by: UnitedLexA recent test showed that some well-known threat detection products were unable to detect custom-written malware samples thrown at them. Access this resource and find out if APT detection is an effective way to find custom malware, and why signature-based antimalware tools can't keep up with today's evolving security risks.
-
How Global Threat Intelligence Fits into a Security Strategy
Sponsored by: UnitedLexWhile global threat intelligence services can be a powerful business security tool, it's not the first one you should consider when setting strategy for better business security. Read on to evaluate the role of global threat intelligence in today's enterprise and assess other tactics to bolster this strategy.
-
The Need-to-Know of Today's Cloud Security
Sponsored by: TechTarget Cloud ComputingIn this handbook, you will examine several common cloud security conundrums, emphasizing the importance of identity and access management (IAM) in the cloud and scrutinizing the role of data encryption. If your organization is serious about securing workloads in the cloud, read on now to learn the specific vulnerabilities cloud APIs introduce.
-
Open Source Strategies Spark Security and Integration Concerns
Sponsored by: Black Duck SoftwareIn this e-guide, experts discuss the importance of moving past security concerns with open source strategies. Find out how your enterprise can keep your infrastructure secure with open source strategies so that you can meet your high-performance needs.
-
How to Evaluate UCaaS Providers' Security Measures
Sponsored by: Carousel IndustriesThis e-guide discusses ways you can address the security concerns of UCaaS, including multi-tenancy and encryption. It goes on to provide ways you can evaluate the security measures that potential UCaaS vendors are building into their services.
-
The Making of a Cloud Security Culture
Sponsored by: Trend Micro, Inc.This e-guide emphasizes the importance of cultivating a cloud security culture and discusses the key benefits and differences between public and hybrid cloud. Access now to learn how your organization can achieve a secure cloud environment.
-
Keep Your Data Secure in the Wake of the Heartbleed OpenSSL Vulnerability
Sponsored by: Symantec Website SecurityIn this e-guide, learn about the web security implications of Heartbleed, the security defect found in several OpenSSL versions. View now to find out whether your enterprise should be concerned and how to protect your data from this bug.
-
SSL Certificate Management: How to Avoid Common Mistakes
Sponsored by: Symantec Website SecurityThis expert e-guide describes the most common SSL certificate management mistakes and provides advice on how to avoid them. Discover how to choose the best certificates for your enterprise's needs, manage renewal of certificates, and more.
-
Encryption's Risks, Benefits, and Roles in SSL Attacks
Sponsored by: Symantec Website SecurityIn this e-guide, expert Nick Lewis details ways to defend against SSL attacks. First, you'll uncover how to detect SSL attacks by inspecting network connections for anomalies. Next, you'll learn the importance of decoding SSL connections to further enable their detection and, ultimately, their mitigation.
-
How One Airborne Wi-Fi Provider Issued Fake Google SSL Certificates, and Faced the Consequences
Sponsored by: Symantec Website SecurityThis e-guide features a case study on how Gogo LLC issued fake Google SSL certificates. Learn how this incident caused ripples in the security industry, and uncover ways some vendors are increasingly observing encrypted traffic.
-
Do Your Employees Have the Freedom to Roam? CW Mobility E-Zine: January 2016
Sponsored by: TechTarget ComputerWeekly.comIn this issue of CW Europe, you will take an in-depth look at the major mobile roaming charge concern that is set to impact people across 28 European Union member states. Read on to see if the end of roaming charges will lead to more enterprises adopting video conferencing services.
-
Breaking the Cyber Attack Lifecycle
Sponsored by: Palo Alto NetworksThis white paper discusses the modern landscape of cybersecurity, and how enterprises can detect and prevent attacks at every stage of the attack lifecycle, and remain agile in the face of advanced attacks.
-
Endpoint Security Management: Beyond Antivirus
Sponsored by: TechTarget SecurityAccess this e-book for expert tips from security experts on endpoint security that moves beyond outdated signature-based tools.
-
Protecting Data on the Go
Sponsored by: TechTarget SecurityThis guide informs InfoSec pros on the risks to business data carried on or accessed by employees' mobile devices and the best available protections for this business data on the go.