Security

Infosec lapses, malware, phishing, and other targeted attacks can ruin your day. Beef up your cybersecurity arsenal with strong authentication, encryption, and real-time monitoring.

  • Achieve Deeper Network Security and Application Control

    Ebooks // Nov 2016 // provided by SonicWALL

    See how next-generation firewalls provide you with a deeper level of network security and enable you to combat emerging threats effectively and without compromise. Read this e-book to discover how you can safeguard your organization against evolving threats while reducing the total cost of ownership.

    Download Now
  • When it Comes to Security, Protection and Performance Matter

    White Papers // Nov 2016 // provided by SonicWALL

    This executive brief shows you how to maximize your network security performance without disrupting productivity, with a next-generation firewall. You’ll see how you can reduce risks, manage complexity, and cut costs with dynamic, automated security measures.

    Download Now
  • Top 5 attack vectors

    White Papers // Nov 2016 // provided by Symantec

    Cryptography forms the basis of trust on the internet. Without it, secure online shopping transactions wouldn't be possible, private messages couldn't be sent and sensitive corporate communications couldn't safely transfer across websites and networks.

    Find out more
  • Not all CAs are created equal

    White Papers // Nov 2016 // provided by Symantec

    There have been a string of successful attacks on certificate authorities (CAs) this year, and the threat to CAs will certainly not abate. On the contrary, hackers have been raising their game steadily and the techniques used to exploit networks grow ever more sophisticated. As one of the world’s leading ...

    Find out more
  • Always on SSL WP

    White Papers // Nov 2016 // provided by Symantec

    Always On SSL is a fundamental, cost-effective security measure for websites that helps protect the entire user experience from start to finish, making it safer to search, share, and shop online. Companies who are serious about protecting their customers and their business reputation will implement Always On SSL ...

    Find out more
  • Code Signing WP (To Increase Downloads, Instill Trust First)

    White Papers // Nov 2016 // provided by Symantec

    Learn how code signing mitigates the risks of transferring code over the Internet or wireless networks, as well as allows end users to take advantage of the ease and convenience of content distribution without worrying about security consequences.

    Find out more
  • M-Trends 2016 – Asia Pacific Edition

    White Papers // Nov 2016 // provided by FireEye

    We don’t hear much about cyber breaches in Asia Pacific (APAC), but that doesn’t mean they aren’t happening every day. In fact, evidence reveals that APAC organizations often have difficulty identifying and responding to breaches. This latest M-Trends report focuses exclusively on APAC organizations and details the ...

    Learn more
  • Breach Readiness Webinar: Next Generation of Incident Preparedness

    Webcasts // Nov 2016 // provided by FireEye

    Are you ready to handle a security breach? Russell Teague, Managing Director, Mandiant, will discuss what companies need to do to be breach-ready, and how being proactive in your incident preparedness is essential and could save you from devastating cost. Incident preparedness is more than ...

    Watch Now
  • ESG Lab Validation Report

    White Papers // Nov 2016 // provided by NEC & Intel Security

    This ESG Lab Validation report documents hands-on testing of the McAfee next generation security information and event management solution. ESG Lab focused on the McAfee Enterprise Security Manager (ESM), the core product of McAfee’s end-to-end solution for addressing comprehensive threat detection and remediation. Testing was designed to explore how the ...

    Read more
  • Securosis SIEM Kung Fu

    White Papers // Nov 2016 // provided by NEC & Intel Security

    Even though security monitoring (and SIEM specifically) has been much maligned, you don’t really have a choice but to use technologies to detect attacks and provide a means for your security team members to find adversaries in your environment. SIEM Kung Fu is about making the most of a product ...

    Read more