Security Standards Research
-
Application Development Security Requires Forethought
Sponsored by: tCellLearn how to define security requirements at the beginning, and what can be learned from the RASP approach in closing the gap left by application security testing.
-
How to Start Building an Enterprise Application Security Program
Sponsored by: tCellIn this expert e-guide, get a handle on where to start with application security so that you never give attackers a chance.
-
How To Limit Privileged Accounts And Boost Security
Sponsored by: DevolutionsToo many privileged accounts can result in access abuse in enterprises.This expert e-guide details which account privileges should be limited to reduce security incidents, how pervasive the risk is, and the challenges associated with privileged accounts.
-
The Current State of Blockchain Compliance
Sponsored by: BAE Systems Applied IntelligenceIn this expert e-guide, we examine blockchains and how they're affecting digital enterprise assets and cybersecurity. Discover how these distributed ledgers relate to Bitcoin and data security. Plus, learn how blockchain innovation and apps like smart contracts are affecting compliance.
-
SWIFT Banking System Boosts Security Following Cyberattacks
Sponsored by: BAE Systems Applied IntelligenceFollowing a number of attacks on the SWIFT banking system that led to the theft of millions of dollars, SWIFT promised new rules to improve security for bank transfers. In this e-guide, we examine these targeted malware attacks and explore SWIFT's response to them. Find out if their 5-part strategic program was enough to bolster security.
-
Risk Assessment: The Roles Vendors and Frameworks Play
Sponsored by: BitSightAssessing risk is vital to protecting your organization. Discover how to mitigate the risk that third-party vendors present to your organization with an effective, risk-driven assessment framework.
-
Security Rating Scores for Third-Party Vendors Catching On
Sponsored by: BitSightIn this e-guide discover why implementing security rating scores for third-party vendors is catching on, and if their impact is showing to be an overall positive one for the industry.
-
How IAM has Evolved on the Cloud: The Good and the Bad
Sponsored by: IBMLearn how IAM has evolved on the cloud, what has worked well and what IAM procedures need to be strengthened to meet future threats in various virtual environments.
-
Risk Management: Best and Worst Practices
Sponsored by: BitSightDiscover the downsides to digitization, how to manage the risk to your organization's data, and 5 top IT risk management mistakes.
-
Five Ways to Secure Mobile Data with EMM
Sponsored by: AppthorityThis expert e-guide details 5 ways to secure mobile data using enterprise mobility management (EMM) to keep your organization on the cutting edge.
-
APT-Style Attacks: How Cybercriminals are Using Them
Sponsored by: WatchGuard Technologies, Inc.New research shows cybercriminals are using more advanced attack techniques. In this e-guide, security expert Nick Lewis explains what enterprises need to know about the APT-style attacks.
-
Optimize Your SIEM Operations
Sponsored by: McAfee, Inc.Access articles detailing everything from common mistakes made in SIEM application to maturing and specializing your enterprise's approach to breach mitigation and recovery.
-
Go Beyond Just Securing Your Cloud, Make it Better
Sponsored by: McAfee, Inc.Uncover a number of articles and videos giving advice to those looking to expand to the cloud and secure it in the most effective and efficient way possible.
-
Enhance Your Endpoint Security Protection
Sponsored by: Trend Micro, Inc.Learn how to improve your enterprise's endpoint security by addressing network access control (NAC), data loss prevention (DLP), and other tools and techniques.
-
New Data Classifications Vital to Information Governance and Security
Sponsored by: STEALTHbitsIn this e-guide, learn how 3 new data classifications are becoming vital to information governance and security.
-
Is Managed Security Monitoring Right for Your Organization?
Sponsored by: IBMThe effort it takes to keep a security monitoring platform up and running can often make the whole endeavor seem more of a hassle than it is worth. Access this white paper now to learn whether managed security monitoring is right for your organization, and how to find the best partner for you.
-
User Provisioning Best Practices: Access Recertification
Sponsored by: STEALTHbitsUser access recertification is the process of continually auditing users' permissions to make sure they have access only to what they need. Implementing recertification, however, can be challenging. Get best practices on creating a recertification process in this e-guide from IAM expert Randall Gamby.
-
When Your IAM Policy Encounters the Internet of Things
Sponsored by: UnisysLearn how to manage the interactions of identity and access management technology, cloud and virtual environments, and the IoT in your company.
-
IoT Security Testing: Cover All Your Bases
Sponsored by: SynopsysWithout the proper IoT security testing, your organization could end up in hot water. In this e-guide industry experts dive into the important of IoT security testing. Get help securing IoT devices and the networks and services they connect to.
-
How to Use an Incident Response Policy to Better Collaborate
Sponsored by: Delta RiskIn this e-guide learn how to not only prepare your organization's response to a security incident, but also how to work with outside forces more effectively to detect, analyze, contain, and eradicate – as well as, recover essential data.
-
Why So Many Enterprises Lack Proper Authentication Methods
Sponsored by: RSA SoftcatSingle-factor authentication, while allowing for simplicity and ease, leaves companies unnecessarily vulnerable to intrusion. Learn the benefits of multi-factor authentication and what you can do today to improve your organization's authentication and authorization polices.
-
Do You Have the Right Authentication Tools to Keep the Bad Guys Out?
Sponsored by: RSA SoftcatMultifactor authentication (MFA) can be a critical component of an enterprise security strategy, but choosing the right product or service is a challenge. Access this e-guide to learn about 8 of the top MFA products in the market, and determine which is best for your enterprise.
-
IoT: What it Takes to Run a Wireless, Secure, Mobile Strategy
Sponsored by: Aruba NetworksThe Internet of Things is here and the knowledge of how to run it effectively is vital. Without a plan and without a vision, the IoT can fall apart catastrophically. In this e-guide, learn what it takes to run an IoT wireless network, how BYOD and IoT device onboarding can improve security, and what your mobile security strategy should look like.
-
The Current Landscape of Advanced Persistent Threats
Sponsored by: ProofpointIn this e-guide, discover not only how to talk about Advanced Persistent Threats within your enterprise, but also uncover what the current landscape looks like in regards to these ever-evolving malicious attacks.
-
How to Approach Storage Disaster Recovery
Sponsored by: RubrikIn this e-guide learn how to turn back time on a disaster to recover what was lost; manage "deduped" data, and more. Read on to ensure your enterprise can take a hit and recover quickly, allowing for a low-impact return to normalcy.