Security Standards Research
-
How to Approach Storage Disaster Recovery
Sponsored by: RubrikIn this e-guide learn how to turn back time on a disaster to recover what was lost; manage "deduped" data, and more. Read on to ensure your enterprise can take a hit and recover quickly, allowing for a low-impact return to normalcy.
-
Conquering the Cloud: Top Security Issues and Keeping Hackers at Bay
Sponsored by: Trend Micro, Inc.In this e-guide, discover two articles that detail the top security issues of the cloud and offer strategies on how to keep malicious hackers at bay.
-
Testing the Cloud: Ensuring Enterprise Data is Secure
Sponsored by: Trend Micro, Inc.In this e-guide, discover how to minimize threats through public cloud security testing. Plus, learn how penetration testing requirements differ for AWS, Google and Azure.
-
Managing Information Security Amid New Threats: A Guide for CIOs
Sponsored by: Cisco UmbrellaIn this e-guide discover the fundamentals of a proactive security policy and the challenges that must be overcome when adopting one.
-
Cloud Security Automation: Are We Up To The Task?
Sponsored by: Palerra Inc.In this e-guide, learn how to bridge the divide between DevOps and security. Discover how to fix the security problems encountered when leveraging the agility of the cloud.
-
Guide to Common Cloud Computing Questions
Sponsored by: Hewlett Packard EnterpriseThis eGuide helps you address your organization's security needs and bust the most common cloud computing myths wide open by gaining an understanding of what cloud computing actually is and what it can deliver for your organization.
-
Firewalls Revamping Your Policy and Dynamics
Sponsored by: Barracuda NetworksIn this e-guide, discover not only how to add the capabilities of next-gen firewalls to your security portfolio, but also the options an enterprise needs for their management. Uncover 3 management considerations to build out your firewall strategy.
-
BYOD: Keeping the Benefits While Staying Secure
Sponsored by: IBMIn this e-guide, learn not only to maximize the benefits of BYOD for your enterprise, but also discover the how to mitigate the downsides and secure the traffic coming out of all these devices connecting to your network.
-
Buyer's Essentials: What to Look for in Single Sign-On Technology
Sponsored by: TechTarget Health ITAre you on the hunt for single sign-on (SSO) technology? Discover the differences between the numerous approaches to SSO, their benefits, and what works for various types of healthcare organizations. In this guide, health IT expert Rick Krohn shares his advice on choosing the right SSO tech for your practice.
-
The Evolution of Network Security Hardware
Sponsored by: Aruba NetworksThis e-guide examines in detail how the basics of network security have changed since its inception. Learn about the 4 cutting-edge security tools that every enterprise network should be evaluating in the coming months, and also how to make sure your Wi-Fi deployment is secure.
-
A Case for IT Security: The Future of New EU Data Protection
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, as the UK prepares new laws on surveillance and data collection, we hear from security experts on the challenges of balancing privacy and security. Read on to identify implications of new EU data protection rules, as well as examine the growing threat of ransomware and how to tackle it.
-
How to Properly Plan Against Attacks with Incident Response and Advanced Malware Protection
Sponsored by: TaaSeraThis expert e-guide explores the dos and don'ts of creating an incident response plan and looks at how advanced malware uses your own network against you.
-
How to Use Threat Intelligence with SIEM Products
Sponsored by: LogRhythm, Inc.This expert e-guide will teach you how to use security information and event management to protect your organization from evolving threats.
-
Study on Cybercrime's Cost to Business
Sponsored by: Hewlett Packard EnterpriseThis exclusive whitepaper covers the results of a survey that analyzed the cost of cyber-crime.
-
How to Deal with Increasing DDOS Attacks
Sponsored by: Verisign, Inc.This expert e-guide explores how to protect your organization from distributed denial of service attacks.
-
Five Critical Steps to Achieving an Effective Application Security Program
Sponsored by: IBMDiscover steps you can incorporate into every phase of the development process to improve your application security, and get an overview of application threats and the types of risks to prioritize and remediate.
-
Enterprise Information Security in Transition
Sponsored by: IBMThis white paper boils the reasons behind current issues in the information security field down into four major causes, and also lays out a list of specific, detailed changes that need to be made to the enterprise security model for these core issues to be resolved.
-
The Legal Obligations for Encryption of Personal Data in United States, Europe, Asia and Australia
Sponsored by: VormetricThis white paper defines the global legal obligations and financial services laws that require data encryption.
-
Cloud Security Designed for Amazon Web Services (AWS)
Sponsored by: Trend MicroThis white paper offers a brief overview of an Amazon Web Services security solution that relies on security pros to customize its offered features to efficiently and effectively defend your assets in the cloud.
-
The Key to Seamless SSO: Building a Federated Identity Service
Sponsored by: Radiant Logic, Inc.This white paper explains why it's so difficult to deliver single sign-on that covers your entire portal, and also introduces a federated identity service that offers access to all sources of identity within your organization.
-
How to Extend your Identity Management Systems to use OAuth
Sponsored by: Forum SystemsRead this resource to learn how to extend your authentication and authorization model to outsourced services. Click through for details on the deployment process, including the benefits of using an API gateway to help with integration.
-
PCI 101: A Beginner’s Guide to PCI DSS Compliance
Sponsored by: FireHost Inc.This webcast covers everything you need to know about the payment card industry data security standard.
-
The Payment Island Deconstructed
Sponsored by: FireHost Inc.This webcast covers a solution that will help payment IT protect customer data while meeting compliance and performance demands.
-
How to Align your Security Needs with Business Objectives
Sponsored by: Hewlett-Packard EnterpriseThis whitepaper covers the emphasis on security that is growing in IT and offers a solution that can provide data protection that is in line with your business goals.
-
Continuous Cyber Situational Awareness
Sponsored by: Lumeta CorporationThis informative paper takes an in-depth look at continuous monitoring, describing how you can successfully deploy the technology and how it can increase visibility and streamline your security management.