Security Standards Research
-
PCI Council issues mobile application rules for software developers
Sponsored by: TechTarget SecurityThe Payment Card Industry (PCI) Security Standards Council has demanded the development of mobile applications that include comprehensive security controls. This expert resource will help you understand what the new guidelines call for in terms of security controls, the history behind these standards, and further developments.
-
Five Reasons Why Hiring A Third-Party Specialist Makes Sense When Securely Disposing Your IT Assets
Sponsored by: Iron MountainAccess this white paper to unveil the top 5 reasons why organizations should outsource IT asset disposal tasks. Learn how doing so can reduce costs and error, and ensure that economic, legal, and operations mandates are met.
-
How to Solve Security Problems Within Your Organization
Sponsored by: WisegateAccess this e-guide for expert insight on the need for risk management, and why data protection alone isn't enough. Click now to explore how proper education will enable a more robust and knowledgeable IT security team.
-
For Secure Access, Passwords Alone Do Not Work
Sponsored by: VerizonThis informative paper explores an innovative alternative to passwords. Discover how multifactor authentication can provide a higher level of security than a password alone and find out how this solution can comprehensively enhance your data protection strategy. Read on now to learn more.
-
Safeguarding Business in a Time of Expanding and Evolving Cyber Threats
Sponsored by: VerizonThis paper explores how advanced cybersecurity threat management techniques can help companies better prepare for, respond to, and detect advanced cybersecurity threats. It also explores how more advanced cybersecurity threat management capabilities can help organizations detect and respond to threats within days instead of months.
-
MDM for a Secure Mobile Workforce
Sponsored by: BlackBerryThis expert guide from SearchSecurity.com provides an in-depth and highly topical review of current and near-future technologies, and deployment-tested implementation procedures that can help your organization secure your mobile workforce. Read on to learn more.
-
How Secure is Your Platform With the Evolving Threat Landscape?
Sponsored by: IBMThis exclusive paper analyzes the business differentiators among the leading security vendors and examines how safe they can actually keep your data.
-
Clearswift Government Communications 2.0
Sponsored by: ClearswiftIn this resource, explore the evolving trends in the public sector landscape, and what this means for information governance and security. Learn how crucial it is to prevent data leakage for the sake of regulations and citizens' trust.
-
IBM X-Force 2013 Mid-Year Trend and Risk Report
Sponsored by: IBMIn this detailed white paper, explore this year's report on the latest risks and security challenges organizations are facing today, and offers best practices to boost security fundamentals and policies to meet these advanced persistent threats (APTs).
-
Security University: Cloud Security
Sponsored by: TechTarget SecurityLearn strategies for how to positively influence the security of cloud computing projects in your organization.
-
Reducing the Cost of Achieving PCI Compliance with Lumension® Compliance and IT Risk Management
Sponsored by: LumensionIn this white paper, gain critical information about a streamlined compliance and risk management solution that helps identify, assess, remediate, and manage IT environments to demonstrate PCI DSS requirements.
-
Salvation Army Protects the Integrity of Data and Global Brand
Sponsored by: LumensionIn this white paper, uncover device control software that enables authorized devices and applications to access organizations' networks to ensure security policies and requirements are met.
-
Netwrix Auditor Enterprise Edition
Sponsored by: Netwrix CorporationWhen diagnosing the cause of your Active Directory problems, native auditing won't show you the complete picture of exactly what changed before your problems started. Netwrix Auditor does what native auditing can't: Download your free 20-day trial of Netwrix Auditor today.
-
Enterprise Security Checklist
Sponsored by: Code42This 6-item checklist provides key recommendations to help boost security against today's cybercrime.
-
Computer Weekly – 2 April 2013: The benefits of context-aware security
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we look at context-aware security – a next generation technology that promises to improve corporate information security. As banks implement more short-term fixes to cope with new regulations, we assess the IT implications. And we examine the benefits of executive coaching for CIOs. Read the issue now.
-
SSL Certificate Management: Common Mistakes and How to Avoid Them
Sponsored by: Thawte Inc.Explore the common challenges associated with manual SSL certificate management and uncover how you can avoid these costly mistakes.
-
Security visualisation
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Information Security Thesis series shows how to generate a visual representation of a dataset and use visualisation in the evaluation of known security vulnerabilities.
-
Tripwire VIA System State Intelligence executive brief
Sponsored by: Tripwire, Inc.What's missing from today's approach to IT security is real-time security intelligence that immediately shows you when you have a security problem, what caused it and what to do about it. This white paper reveals how you can easily utilize cutting-edge technologies to take the guesswork out of identifying the activity that needs your attention.
-
Security-In-Depth Using Integrated Risk-Conscious Controls
Sponsored by: Tripwire, Inc.This white paper explores how your organization can change the way it protects its critical data, combining preventive, detective and corrective controls to stop breaches from happening, detect threats as they arise, and correct settings that introduce security risk or non-compliance. Read now to learn more.
-
Webroot Endpoint Security eBook
Sponsored by: OpenText Security SolutionsThis resource outlines how a new approach to security may be what your business needs. If constant downloads, installations and updates are slowing down the efficiency of your company; it may be time to make some changes. Read this eBook to find out more about how Webroot can improve your endpoint security.
-
Mobile Security Solutions: Securing & Leveraging Mobile Devices
Sponsored by: Entrust, Inc.This white paper explains how Entrust's software tool-kit can strengthen the security of mobile banking or transaction-based applications. Protect consumers with a multi-layered approach that secures all valuable information.
-
Closing the Back Door on Network Application Vulnerabilities
Sponsored by: SophosThis resource explains how SMBs can benefit from using unified threat management (UTM) to protect their web servers.
-
Compliance Driven Security
Sponsored by: DellEMC and Intel®With the increasing threat to credit card data, the Payment Card Industry Data Security Standard (PCI DSS) was introduced, requiring organizations to implement information security controls. Access this resource to learn more about the existing threats, the key benefits of PCI compliance and how to effectively implement a PCI compliance program.
-
Compliance strategies for greater cyber security policies
Sponsored by: HP Enterprise SecurityAccess this expert e-guide to learn compliance strategies for greater cyber security policies. Find out why the best security strategy is a solid, prevention-focused internal security policy, how crafting your audit kit before compiling compliance procedures leads to more passed audits, and more.
-
May Technical Guide on PCI DSS Guidance
Sponsored by: TechTarget SecurityThis technical guide, brought to you by SearchSecurity.com offers a global perspective on the various technologies available for organizations to meet the stringent requirements of the Payment Card Industry Data Security Standards (PCI DSS). View now to explore PCI DSS guidance for encryption, tokenization and virtualization technologies.