Security Threats Research
-
A Manifesto for Cyber Resilience
Sponsored by: Symantec CorporationIn this white paper, find out what it takes to become cyber resilient in this age of escalating threats.
-
Insights and Recommendations for Top Security Concerns; Annual Security Report
Sponsored by: Cisco Systems, Inc.This informative report takes an in-depth look at the state of network security today, examining how your peers are utilizing the latest solutions and what your organization can do to ensure that your business critical data is kept safe.
-
Operationalizing Information Security: Top 10 SIEM Implementer’s Checklist
Sponsored by: AccelOps Inc.This informative whitepaper outlines 10 best practices for successful SIEM implementation.
-
HP TippingPoint Provides Next-Generation Network Security
Sponsored by: Hewlett Packard EnterpriseThis informative paper examines an intrusion prevention system that is simple, reliable, and effective, ensuring that your network is kept safe from unwanted access or attacks.
-
Respect User Privacy While Securing the Cloud and Mobile Devices
Sponsored by: BitGlassThis white paper offers a security solution that improves visibility and analytics capabilities across disparate mobile devices and cloud applications.
-
Voltage Success Story: Envision Pharmaceutical Services
Sponsored by: Voltage Security, Inc.This case study features Envision Pharmaceutical Services' experience with an easy-to-use, low-cost email platform that ensured secure data sharing and helped maintain HIPAA and PCI DSS compliance.
-
Cover Your SaaS!
Sponsored by: BitGlassThis white paper reveals the top 5 cloud security solutions to invest in to best protect your virtualized assets.
-
The Keys to Securing Data in a Collaborative Workplace
Sponsored by: Dropbox for BusinessThis white paper introduces 5 steps you can take to secure file sync and share so that employees can enjoy the benefits of collaboration without fear of data loss.
-
Security Operations Center (SOC) Essentials for the SME
Sponsored by: AT&T CybersecurityWatch this webcast to develop a greater understanding about SOC and the benefits small and medium enterprises can gain from it.
-
Personally Identifiable Information (PII) and Personal Health Information (PHI)
Sponsored by: Voltage Security, Inc.This white paper features an encrypted email solution that eliminates the need for paper-driven information sharing processes, and ensures secure, compliant transfers.
-
Malware Analysts Have the Tools to Defend Against Cyber-Attacks, But Challenges Remain
Sponsored by: Threat Track SecurityThis informative guide explores today's threat landscape, the role of malware and the threat of internal vulnerabilities.
-
AMAG Pharmaceuticals Secures Cloud and Mobile While Respecting User Privacy
Sponsored by: BitGlassIn this case study, learn how AMAG Pharmaceuticals successfully secured cloud and mobile usage with a software as a service (SaaS) firewall.
-
5 Ways Dropbox for Business Keeps Your Data Protected
Sponsored by: Dropbox for BusinessThis white paper presents 5 ways that this cloud service will protect your data, with security as a native core function.
-
Compare Windows 8 and Windows® XP Security Problems
Sponsored by: Lenovo and MicrosoftThis white paper explains the most critical security-related differences between Windows® XP and Windows 8, including each operating system’s ability to provision security patches, integrate with MDM and more.
-
HP TippingPoint Intrusion Prevention System halts threats at the door - Solution increases visibility to potential threats, attacks and policy violations against HP systems
Sponsored by: Hewlett-Packard EnterprisePrevent future cyber attacks from occurring by modifying your company's security infrastructure.
-
A Comprehensive Guide to Encryption Technology Approaches
Sponsored by: VormetricThis resource highlights 11 encryption technologies and offers key questions to help you choose the right solution for your business needs.
-
The Legal Obligations for Encryption of Personal Data in United States, Europe, Asia and Australia
Sponsored by: VormetricThis white paper defines the global legal obligations and financial services laws that require data encryption.
-
Enterprise Security and your Technology
Sponsored by: Hewlett Packard EnterpriseThis informative resource outlines a top-tier security tool and explains how it can help secure your enterprise.
-
Building a Better Network Security Strategy
Sponsored by: Hewlett Packard EnterpriseThis informative resource discusses what features a network security strategy should cover in order to ensure success in today's business world.
-
It's Time Businesses Wake up to Mobile Security Reality
Sponsored by: Threat Track SecurityThis white paper addresses the need for top-notch mobile security. With the rise of personal devices used in the workplace, security is more important than ever before.
-
6 Ways to Enhance Security in AWS
Sponsored by: SafeNet, Inc.In this white paper, learn why Amazon Web Services (AWS) is a leading cloud service, with a strong partnership with a security provider that provides 6 additional security enhancements to better protect data.
-
Lake Health Enhances Patient Experience with HP ArcSight
Sponsored by: Hewlett Packard EnterpriseUncover the SIEM a healthcare provider put in place which helped them take a proactive approach to information security, mitigate anomalies, increase visibility, ensure regulatory compliance, and more!
-
Webinar: 20 Critical Controls for Cyber Defense
Sponsored by: ISACAJoin ISACA for a webinar hosted by internationally recognized speaker, Dr. Vilius Benetis, on Tuesday, June 24, 2014 at 12:00 PM EDT (16:00 UTC), who will discuss the 20 critical controls identified by SANS and the Council on Cybersecurity.
-
A Survey of Zero-day Attacks in 2013 and What They Say About the Traditional Security Model
Sponsored by: FireEyeThis informative survey explores zero-day attacks in 2013 and what they say about the traditional security model.
-
Can a Federated Identity Service Strengthen SSO?
Sponsored by: Radiant Logic, Inc.With the challenge of identity silo, user overlap, and heterogeneous sources, you need a single access point to access identities from across the infrastructure