Security

Infosec lapses, malware, phishing, and other targeted attacks can ruin your day. Beef up your cybersecurity arsenal with strong authentication, encryption, and real-time monitoring.

  • How Trustworthy Is Your Certificate Authority?

    White Papers // May 2016 // provided by Symantec

    The choices available for picking out a certificate authority to issue SSL certificates can seem dizzying for the typical web operations team. Examine this checklist that provides a complete overview of what to look for in ‘Certificate Authorities’, so you can effectively implement a strategy you trust.

    Read more
  • A Business Case for Funding Your Insider Threat Program

    White Papers // May 2016 // provided by Forcepoint

    The autonomous modern employee could be the biggest threat to your organization’s data. Many are empowered to connect remotely and are on and off networks accessing servers (where your most sensitive data lives). Add to this scenario the influx of contractors, partners, and other non-staff users to this scenario and ...

    Download Now
  • The Security Threat Landscape

    White Papers // May 2016 // provided by Heat Software

    Today’s security threat landscape is ever evolving, multifaceted and increasingly complex. However, 99% of your risks can still be eliminated by regularly and consistently applying simple security precautions. Specific strategies can then be deployed to detect, respond and mitigate against the impact of more sophisticated attacks. It’s ...

    Download Now
  • Security Land Escape FAQ

    White Papers // May 2016 // provided by Heat Software

    There are millions of cyber-attacks taking place every day with a total cost to the global economy of up to $575 billion a year.Data breaches will carry on, however, given the effectiveness of malicious programmes like ransomware and recent events such as the Ashley Madison hack ...

    Download Now
  • An Introduction to More Effective and Efficient Endpoint Security

    White Papers // May 2016 // provided by Heat Software

    Any smart organization should strive for a defense-in-depth approach that controls application deployment in conjunction with malware cleanup and automated patch management. This ensures that machines are configured securely and that whitelists are properly and constantly updated. In the end, this blended trust-centric approach is ...

    Download Now
  • Red Team Operations

    White Papers // May 2016 // provided by FireEye

    Learn in this data sheet how Mandiant’s Red Team Operations proactively identify and mitigate complex security vulnerabilities that can lead to critical data loss. Learn how to know whether your critical data is at risk and how easily it may be obtained by a malicious actor, and test your security ...

    Read more
  • The Rise of Red Team Operations

    Webcasts // May 2016 // provided by FireEye

    How strong is your cyber security? Join Chris Truncer, Senior Consultant at Mandiant, a FireEye company, as he provides an introduction to Mandiant Red Team Operations. Learn how Mandiant can achieve a realistic assessment of the effectiveness of your cyber security by emulating the attacker tools, tactics and practices used ...

    Watch Now
  • Micro-Segmentation Builds Security Into Your K-12 Data Center’s DNA

    White Papers // May 2016 // provided by VMware

    Most education IT professionals agree that securing the network only at the perimeter is inadequate for the demands put on today’s district and school data centers. Once malware has managed to make its way behind the perimeter firewall by latching onto an authorized user (or other means), it can move ...

    Download Now
  • Best Practices for Multi-factor Authentication

    White Papers // May 2016 // provided by Centrify

    With so many stolen passwords and breaches involving stolen passwords, only a small number of security professionals believe that passwords are an adequate form of protection. Many organizations have turned to multi-factor authentication (MFA) or two-factor authentication (2FA) to reduce the risk of stolen passwords. This paper provides best practices ...

    Download Now
  • White Paper: IDC Market Spotlight - Minimizing Cybersecurity Risk with Vigilant SSH Key Management

    White Papers // May 2016 // provided by CyberArk

    This IDC Market Spotlight highlights the challenges and risks associated with a lax approach to SSH key management and offers guidance on how organizations can mitigate this risk and improve their security postures. In this report, IDC acknowledges that “the privileged and often full root access provided by an SSH ...

    Find out more

Submit Your Content

Get your content listed in our directory for free!

Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?