Security Threats Research
-
Cisco 2015 Annual Security Report
Sponsored by: Cisco Systems, Inc.Access this white paper to read the Cisco 2015 annual report and discover research, insights, and techniques straight from security experts that can protect your business.
-
Why Every CIO Should Consider Vulnerability Assessment a Necessity
Sponsored by: IBMIn this resource, CIOs will learn why vulnerability assessment is so essential to enterprise security, and can discover a leading vulnerability assessment platform that scans targeted systems on a scheduled basis in order to increase your understanding of your organization's overall security posture.
-
The Bot Threat
Sponsored by: Hewlett Packard EnterpriseIn this white paper, get vital information about the malicious bot, also known as botnets when in large forces, and explore 4 key features that will help you build a defense-in-depth security system to prevent these attacks from compromising your networks.
-
Protecting This House: IT's Role in Cloud Security
Sponsored by: TechTarget Cloud ComputingHaving a clear-cut cloud governance strategy helps ease administrative issues for IT and allows organizations to proactively protect their data.
-
Secure VDI Desktops the Same Way you Would Physical Ones
Sponsored by: DellDownload this expert resource now to learn about protecting your virtual desktops and much more.
-
Prevent Fraud and Improve the User Experience with Mobile Access Management
Sponsored by: IBMThis white paper examines the challenges of providing secure access in the mobile world and explores new security models, policies, and controls that can help to protect your critical assets and data.
-
How to Properly Plan Against Attacks with Incident Response and Advanced Malware Protection
Sponsored by: TaaSeraThis expert e-guide explores the dos and don'ts of creating an incident response plan and looks at how advanced malware uses your own network against you.
-
Secure Mobile Email for the Lean IT Department
Sponsored by: Shavlik TechnologiesThis expert whitepaper explores how you can keep you end-users happy and your corporate information safe in the age of mobile email.
-
Cost of a Breach Rising; How to Protect Against It
Sponsored by: TaaSeraThis expert e-guide explores how the Target breach of 2013 has changed the way organizations approach security.
-
How to Use Threat Intelligence with SIEM Products
Sponsored by: LogRhythm, Inc.This expert e-guide will teach you how to use security information and event management to protect your organization from evolving threats.
-
Study on Cybercrime's Cost to Business
Sponsored by: Hewlett Packard EnterpriseThis exclusive whitepaper covers the results of a survey that analyzed the cost of cyber-crime.
-
How to Deal with Increasing DDOS Attacks
Sponsored by: Verisign, Inc.This expert e-guide explores how to protect your organization from distributed denial of service attacks.
-
What to Look for in Web Application Firewall Products
Sponsored by: TechTarget SecurityIn this buyer's guide, experts explain how a WAF works, describe the features that different WAFs possess, and reveal how to weight these factors in selecting the right WAF to protect your enterprise's sensitive data.
-
Endpoint protection: Whitelisting and Beyond
Sponsored by: TechTarget SecurityApplication whitelisting is a valuable security tool but it's riddled with complexity. This handbook takes a look at whitelisting capabilities, with an eye to the NIST cybersecurity framework and suggests best practices for implementing or managing a whitelist in your enterprise.
-
High Alert on Cyber-Risk and Cyber-Security Preparedness
Sponsored by: SurfWatch LabsThis expert e-guide offers an in-depth exploration of cyber intelligence and covers why you need to be on high alert for cyber-risk and cyber-security preparedness.
-
How SSL and TLS Secure Network Transactions
Sponsored by: Symantec & Blue Coat SystemsThis expert e-guide explores how SSL and TLS can be used to defend any type of network traffic.
-
How Threat Intelligence Can Give Enterprise Security the Upper Hand
Sponsored by: SurfWatch LabsThis expert e-guide explores the value of security intelligence in giving you the upper hand on outside threats.
-
Putting Security on Auto-Pilot: What Works, What Doesn't
Sponsored by: TechTarget SecurityThis technical guide examines the pros, cons, and unknowns of automated penetration testing, from how best to use one to the components of your security system that will still require human intervention.
-
6 Ways Hackers Try to Break Secure Sockets Layer-Encrypted Data
Sponsored by: Symantec & Blue Coat SystemsHow do hackers break through secure sockets layer-encrypted data exactly? This expert e-guide has the answer, exploring six common methods these cyber-criminals use.
-
What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware?
Sponsored by: IBMMobile security is about more than the device: It's also about protecting apps on the device. Learn how IBM can help.
-
Beyond Passwords: Protect the mobile enterprise with smarter security solutions
Sponsored by: IBMFind out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
-
IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
Sponsored by: IBMGain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
-
IDC 2014 WW MarketScape Report for Federated Identity Management and SSO
Sponsored by: IBMFind out how vendors fared in IDC's assessment of IAM offerings for federated identity management and single sign-on.
-
Managing User Identities and Access in the Cloud
Sponsored by: IBMLearn how IBM can help design, deploy and manage critical identity and access management controls in cloud environments.
-
Extending Security Intelligence with Big Data
Sponsored by: IBMLearn how IBM Security Intelligence with Big Data can help organizations gain insights into advanced data threats.