Security Systems Research
-
Cybersecurity: The Latest Battleground for MSPs
Sponsored by: SkOUTOur experts share their knowledge of the managed security services market in the following guide, so read on to learn how your organization can capitalize on the opportunities therein.
-
Build Identity Verification Processes with the Power of AI
Sponsored by: JumioThis expert e-guide explores recent developments in AI-powered identity verification technology. Get tips on how to outsmart potential fraudsters by finding out how you can improve your identity verification practices by building machine learning and other AI-based technologies into your security strategy.
-
Healthcare Security: How You Can Ward Off Insider Threats
Sponsored by: Cisco UmbrellaOne of the greatest healthcare security threats comes from users within an organization. In this expert handbook, John Nye shares recommendations for technologies that healthcare organizations can use to fight against insider security threats.
-
Integrating IAM into your Digital Workspace
Sponsored by: CitrixLearn how you can integrate identity and access management products into your digital workspace, and explore how security policies can take advantage of user's devices to provide context for determining access on the IT side.
-
Ins and Outs of Setting up a SOC
Sponsored by: Respond SoftwareFind out why a security operations center (SOC) can be a valuable part of your organization's cybersecurity strategy. Learn how to set one up, from the 3 types of SOC employees needed to core principles that organizations should follow when setting up their SOC.
-
Adapt Security for Hybrid Cloud Environments
Sponsored by: CitrixIn this expert e-guide, find out how you can overcome the security challenges of hybrid cloud, and learn about the organizational and cultural changes that accompany this shift in security.
-
What GDPR privacy requirements mean for U.S. businesses
Sponsored by: TechTarget SecurityEnforcement of the EU's new GDPR privacy regulations is imminent, and potential fines send a clear message to companies to protect their customers, or else.
-
Security Analysis Principles and Techniques for IT Pros
Sponsored by: TechTarget SecurityAs a result of the recent developments affecting security analytics, uncover these tips for ensuring you get the most out of your security analytics tool.
-
Exploring Two New Ways of Getting Insight into the Cybersecurity Landscape
Sponsored by: Juniper Networks, Inc.This e-guide sheds some light on 2 technologies changing the insight we have on our IT security infrastructures. First, explore how to evaluate the machine learning offerings in the cybersecurity market. Then find out what boons shared cloud security assessments can have on your organization.
-
Improve Endpoint Security with Advanced Tools and Techniques
Sponsored by: OPSWAT incBetter endpoint security protection is possible with NAC, DLP and other tools and techniques. Access this expert e-guide to learn how they fit together to improve enterprise endpoint protection.
-
Securing DNS: What to Do, and What to be Aware of
Sponsored by: Cisco UmbrellaIn order to understand how DNS attacks work, it is important to understand DNS security weaknesses. In this e-guide, security pros Peter Wenham and Vladimir Jirasek reveal best practices and recommendations for securing DNS and staying ahead of its vulnerabilities.
-
Security Analysis Principles and Techniques for IT Pros
Sponsored by: TechTarget SecurityAs a result of the recent developments affecting security analytics, uncover these tips for ensuring you get the most out of your security analytics tool.
-
Is the Endpoint Security Nightmare Ending?
Sponsored by: TechTarget SecurityIn our Insider Edition of Information Security Magazine, experts Mike Chapple, Michael Heller and David Geer dive into the newest approaches in endpoint security, keys to maturing your mobile security strategy, and more.
-
Six Criteria for Buying Data Loss Prevention Products
Sponsored by: InteliSecureDiscover 6 steps your organization can take when thinking about what data loss prevention means to your security posture and what to look for to shore up your own defenses.
-
Introduction to Data Loss Prevention Tools
Sponsored by: InteliSecureIn this e-guide discover what it means for security for data to be in use, in motion, and at rest; how DLP works in a standalone vs. integrated context; the DLP learning curve; and more.
-
How the Basics of Network Security Have Evolved
Sponsored by: Fortinet, Inc.In this e-guide, networking expert Andrew Froehlich explores some of the fundamental shifts in network security – drilling down into how modern tools work better together, replacing yesterday's isolated, autonomous components. Learn about 4 cutting-edge security tools that every enterprise network should be evaluating in the coming months.
-
Your Guide to Combatting Ransomware's Domination of 2017
Sponsored by: CyberArkLearn how to boost your ransomware security awareness in this expert e-guide. Additionally, discover why ransomware continues to be a major threat and what ransomware prevention tools can help you win the battle.
-
SSL: Get the Best for You and Mitigate Vulnerabilities
Sponsored by: A10 NetworksInside this e-guide industry experts uncover how security professionals can overcome SSL security issues. Access now to discover how to approach SSL security, tactics to choose the best SSL for your business, 7 steps to overcome SSL vulnerabilities and more.
-
Your IIoT Security Plan: Risks in Manufacturing
Sponsored by: Bayshore NetworksIn this e-guide learn how to get smart about industrial IoT security risks in manufacturing, as well as how to map out an industrial IoT plan to create a smooth-running, smart factory.
-
How to Resolve a Web Application Security Vulnerability
Sponsored by: Veracode, Inc.Discover the importance of application security testing and Web application firewalls (WAFs) in the delivery of modern web-based application deployments.
-
Application Development Security Requires Forethought
Sponsored by: Veracode, Inc.Learn how RASP, or runtime application self-protection, could be the answer to prevent vulnerabilities from slipping through the web app review process and block new, unforeseen threats.
-
Resolve Web Security Issues with Industry Experts' Advice
Sponsored by: Veracode, Inc.Learn how to bridge the communication divide between app developers and security pros, as well as foster secure coding practices in your enterprise to mitigate the vulnerabilities in your web applications.
-
How to Effectively Manage the Cloud Logs of Security Events
Sponsored by: SplunkDiscover the security growing pains created by the growth of cloud file sharing and collaboration services and how they are presenting new problems including "shadow cloud" and alert fatigue.
-
Comparing Top Shelf Email Encryption Software Products
Sponsored by: Hewlett Packard EnterpriseAccess this expert e-guide to learn how the top of the line email encryption software measures up to one another. Find out what to look for when it comes to strength of cryptography, file security, mobile device support, and more.
-
Incident Response Tools Can Help Automate Your Security
Sponsored by: ModoModoA major security incident happening isn't a matter of "if", it's simply a matter of "when" for the modern business. This expert e-guide will lead you through the pillars of a solid incident response plan, how to automate your policy with incident response tools, and more.