Vulnerability Management Research
-
Practitioners Guide to Establishing a SOC Webinar
Sponsored by: AT&T CybersecurityThis AlienVault Unified Security Management (USM) webinar is intended for a technical audience and will provide the core information necessary to evaluate the security controls essential to establishing an efficient Security Operation Center (SOC).
-
Expect More From Your SIEM
Sponsored by: AT&T CybersecurityUnlike security cameras, going from installation to insight with a traditional SIEM is far from straightforward. During this session, we'll cover a few common problems with SIEM technologies, and how you can avoid them. You'll walk away with a new perspective on an old problem – reducing the cost of security visibility.
-
Practitioner's Guide to Establishing an SOC
Sponsored by: AT&T CybersecurityThis white paper provides an overview of how to evaluate the security controls needed to establish a Security Operation Center (SOC), along with what data a SOC needs to quickly detect and respond to a breach.
-
Next-Generation Vulnerability Management
Sponsored by: SAINT CorporationThis crucial paper takes an in-depth look at how proper vulnerability management can protect business operations, mitigate risks, and improve overall IT management. Discover the latest solutions and strategies for ensuring your data is secure from attacks.
-
Security University: Data Loss Prevention
Sponsored by: TechTarget SecurityThe difference between suite and point product approaches; assessing what you'll focus on within your own organization, and pitfalls in DLP implementation. In this security school we'll examine real-world tactics to ensure a successful DLP deployment.
-
Managing Web Security in an Increasing Challenging Threat Landscape
Sponsored by: TechTarget SecurityThis resource offers guidance to help your organization manage web security in an increasingly dangerous threat landscape. Learn how cybercriminals are targeting web-based vulnerabilities and see what you can do to stay safe by reading on now.
-
Phishing 2.0 - Why Phishing is back as the No.1 threat, and how Web Security can protect your company
Sponsored by: OpenText Security SolutionsThis resource takes an inside look at the new dangers posed by phishing 2.0 attacks. Read on to find an overview of the structure of these threats, learn about web security and anti-phishing capabilities your organization needs, and much more.
-
Webroot SecureAnywhere Business Endpoint Protection vs. Seven Competitors
Sponsored by: OpenText Security SolutionsThis performance benchmark report reveals the results of an objective performance test conducted on eight endpoint security software products. Inside, learn which solutions are leading the pack for endpoint protection.
-
Solitarie Interglobal: Tracked, Hacked and Attacked
Sponsored by: IBM.Access this resource for a deep dive analysis of the business differentiators among x86, UNIX, and System z virtualization technologies to help you determine the right path for your data center.
-
Targeted attacks: Preparation and Mitigation
Sponsored by: TechTarget SecurityThis expert e-guide explains how you can make an effective business case for targeted attack defense. Also inside, discover what you need to know in order to change user behaviors as part of your risk mitigation strategy.
-
Securing SharePoint: SharePoint Security Best Practices
Sponsored by: Thawte Inc.This expert e-guide reveals must-see best practices for effectively securing your Microsoft SharePoint environment. Inside, learn how you can navigate tricky SharePoint security issues, including access control, security testing, policy and training, and more.
-
Report: Cyber Security Attack and Incident Data
Sponsored by: IBMUncover analysis of security attack and incident data from IBM Security Services' plethora of data collected from their tens of billions of events monitored daily for their 3,700+ clients.
-
Identity and Access Management Security Live Chat Transcript
Sponsored by: SailPoint TechnologiesIn this presentation transcript, industry expert Peter H. Gregory answers your top questions about identity and access management (IAM) in a quick, easy to follow Q&A format.
-
Responding to—and recovering from—sophisticated security attacks
Sponsored by: IBMIn this resource, find four things you can do now to keep your organization safe. Learn what you need to know to effectively respond to and recover from sophisticated security attacks by reading on now.
-
Sophos Virus Removal Tool: Free virus detection and removal
Sponsored by: SophosDownload your complimentary copy of Sophos Virus Removal Tool, a free antivirus solution that will identify and remove viruses from your computers quickly and easily.
-
How a DNS Firewall Helps in the Battle Against Advanced Persistent Threat and Similar Malware
Sponsored by: InfobloxUncover the role a DNS firewall can play in your security strategy for reducing loss of data due to stealthy advanced persistent threats (APTs) and other malware attacks.
-
The Custom Defense - Your Answer to APTs
Sponsored by: Trend MicroExplore an innovative new technology available to help your organization combat potentially disastrous advanced persistent threats (APTs).
-
Email Security Technical Guide
Sponsored by: TechTarget SecurityCheck out this expert guide to learn about how to handle the onslaught of e-mail attacks that plague organizations today. Discover best practices, techniques and system options that can help you stay secure.
-
Information Security Magazine - April 2013
Sponsored by: TechTarget SecurityThis month's issue takes a comprehensive look at existing identity and access management (IAM) solutions and explores how establishing a centralized IAM system not only combats the challenges SaaS and mobile devices, but provides better overall operational consistency across your entire infrastructure.
-
Considerations and Best Practices for Updating a Corporate BYOD Program
Sponsored by: TechTarget SecurityIn this timely E-Guide from SearchConsumerization.com we detail the best practices and considerations to keep in mind when creating, implementing, and updating a corporate BYOD policy.
-
Types of DNS Attacks Reveal DNS Defense Tactics
Sponsored by: TechTarget SecurityThis E-Guide from SearchSecurity.com details different types of common domain name system (DNS) attacks, the unusual behaviors they invoke, and which defense tactics work best in the given scenario. View now to learn more!
-
Data Protection Technical Guide
Sponsored by: TechTarget SecurityThis whitepaper examines some of the challenges associated with deploying DLP, identifies common pitfalls, and explains how DLP can be used effectively. Learn from CSOs and other experts as they share what you need to know when it comes to DLP technologies.
-
Intrusion Prevention for Networks, Servers, Endpoints, and Applications
Sponsored by: IBMIn this white paper, you'll discover how to protect your network from attacks before they occur.
-
Cloud Endpoint Security: Considerations for Cloud Security Services
Sponsored by: Symantec CorporationThis E-Guide from SearchSecurity.com explains the benefits of cloud endpoint security services and unveils a number of considerations to keep in mind before adoption. View now to learn more!
-
APT Defense Mechanisms and Best Practices
Sponsored by: InfobloxUncover the devastating affects advanced persistent threats (APTs) can have on your systems and learn a number of best practices that can help you defend against them.