Get your company's research in the hands of targeted business professionals.
Security
IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.
White Paper Published By: Mimecast
Published Date: Jan 03, 2017
Mimecast has detected and blocked a dangerous new campaign that uses social engineering and advanced sandbox evasion techniques to deliver stealthy malware.
This Email Security Advisory from Mimecast offers:
- Detailed attack analysis
- Mimecast viewpoint - reduce sandbox reliance
- Weaponized attachments - prevention and recommendations
White Paper Published By: Mimecast
Published Date: Dec 29, 2016
Cybercriminals constantly engage organizations in a game of leapfrog: system defenses improve, so malware searches for new holes. Recently, ransomware, which has been around since 1989, has been gaining momentum.
Download this Mimecast sponsored report to learn about this growing threat, its impact to organizations and the ways to help thwart an attack.
White Paper Published By: Secureworks
Published Date: Dec 09, 2016
The included Framework for Inquiry is a non-prescriptive exercise that can help boards and management craft a replicable reporting template for reviewing risk levels, measuring operational effectiveness, and prioritizing initiatives over time.
The latest analysis of cloud security DDoS and web application attacks observe across the Akamai Intelligent Platform for Q32016. Highlights include analysis of the latest wave of mega attacks, a look at NTP trends and shrinking of NTP reflection capabilities, and a look at how bot activity can create DDoS-like conditions.
White Paper Published By: Entrust Datacard
Published Date: Nov 29, 2016
Extended Validation (EV) certificates were launched in January 2007. EV certificates are an effort to define a standard for a high assurance SSL/TLS certificate and create a new trust foundation. The EV Guidelines are managed by the leading browsers and certification authorities (CAs) through the CA/Browser Forum, and have been since launch.
White Paper Published By: Entrust Datacard
Published Date: Nov 29, 2016
This guide outlines the key elements of a certificate lifecycle management process and how to provide adequate tools and training to implement this process.
White Paper Published By: Globalscape
Published Date: Nov 14, 2016
Regardless of efforts to secure your network from external threats, data breaches usually begin from inside.
In this Globalscape paper, you’ll learn:
- 3 layers most targeted: the network, data & users
- Bad security practices
- Why Managed File Transfer is a critical component to combat bad practices
White Paper Published By: Globalscape
Published Date: Nov 14, 2016
Are you sure that employees are only using IT-sanctioned ways of transferring data? If the answer is “no,” then your sensitive data may be vulnerable.
In this guide from Globalscape, you’ll learn:
• What shadow IT is and the drawbacks
• Signs of a shadow IT problem
• How to reduce shadow IT
White Paper Published By: Secureworks
Published Date: Nov 11, 2016
This paper takes an in-depth look at the true costs — both short and long term — of a data breach, and provides steps and tips that executive teams and security leaders can use to determine and reduce the true cost of a data breach.
White Paper Published By: Secureworks
Published Date: Nov 11, 2016
To ensure that “quasi-insiders” or third parties do not contribute to your enterprise’s attack vector, it’s imperative to develop a third-party governance process to mitigate risk. Read on to find out how.
White Paper Published By: Secureworks
Published Date: Nov 11, 2016
This paper outlines the discrete layers and levels of a world-class security organisation and programme, and how organisations can take advantage of services from SecureWorks to support their progress toward worldclass status.
White Paper Published By: Secureworks
Published Date: Nov 11, 2016
This paper explores why the older “all or nothing” kind of relationship between business organisations and information security services providers (ISSPs) is giving way to a hybrid model that security professionals can leverage to augment their operations and effectiveness.
White Paper Published By: QTS
Published Date: Nov 04, 2016
At the heart of the Data Solved promise are three core attributes - People Powered, Technology Focused and Infrastructure Invested. We leverage our strong, diverse team of more than 700 employees to enable our Powered by People motto and deliver on our promise. With 24 data centers on four continents, we are poised to deliver world-class infrastructure and value added technology services to our more than 1,000 customers in North America, Europe, Asia and Australia.
White Paper Published By: QTS
Published Date: Nov 04, 2016
Healthcare accounts for 21% of all cybersecurity breaches, making it the most affected business sector in the U.S. economy. Ongoing attacks are predicted to cost providers $305 billion in lifetime revenue over the next few years. Download this white paper to learn how to make healthcare cybersecurity stronger.
White Paper Published By: CarbonBlack
Published Date: Nov 01, 2016
This checklist will help you assess the capabilities of your current antivirus solution and will provide the requirements you need to meet in order to shift to a more effective approach.
White Paper Published By: CarbonBlack
Published Date: Nov 01, 2016
A SANS Guide to Evaluating Next-Generation Antivirus
Rather than dying, antivirus is actually growing up. Today, organizations look to spend their antivirus budget on replacing current solutions with next-generation antivirus (NGAV) platforms that can stop modern attacks, not just known malware.
White Paper Published By: Veracode
Published Date: Oct 28, 2016
The Ultimate Guide to Getting Started with Application Security
Application-layer attacks are growing much more rapidly than infrastructure attacks. Yet many organizations remain hesitant to create an application security program, believing it will require excessive time and resources. The reality is that any organization, of any size, can and should develop an applications security program. Download the Ultimate Guide to Getting Started With Application Security now for details!
White Paper Published By: Veracode
Published Date: Oct 28, 2016
Web application attacks are the most frequent pattern in confirmed breaches. But many security budgets don’t line up with this risk. Getting the budget for AppSec won’t be easy, but now is the time to make the case. Download this e-book to find out the reasons why AppSec is the most productive security spend.
White Paper Published By: Veracode
Published Date: Oct 28, 2016
DevOps practices, while relatively new, are spreading rapidly. And there are sound business reasons for executives to embrace these changes. This e-book from Veracode provides background into the evolution of DevOps and proposes five principles that must be addressed for those seeking to integrate AppSec into DevOps.