Security

Infosec lapses, malware, phishing, and other targeted attacks can ruin your day. Beef up your cybersecurity arsenal with strong authentication, encryption, and real-time monitoring.

  • White Papers // Jan 2014

    The Role of the Network in Cloud Computing

    For a network that better supports your cloud and brings the most value possible to your business, its design has to be considered in the early stages of cloud planning. Read the white paper "Networking for cloud computing" to discover specific networking considerations for public, private and hybrid clouds.

    Sponsored By IBM

  • White Papers // Dec 2013

    Cloud Federation for Identity and Access Security

    The shift to a cloud-based enterprise IT architecture is a foregone conclusion for organizations across a wide range of company sizes and verticals. However, many organizations are still approaching this shift with trepidation because security and compliance concerns can slow or block many enterprise cloud initiatives in terms of both...

    Sponsored By F5

  • White Papers // Dec 2013

    Eliminating Authentication Silos and Password Fatigue with Federated Identity and Access Management

    As enterprises continue to depend on the cloud for delivery of applications and more workers are using multiple types of devices to access those applications, the need to control who has access to what will grow. Too often, users suffer from password fatigue, having to create and remember many log-on...

    Sponsored By F5

  • White Papers // Oct 2013

    Best Practices for Selecting a Vulnerability Management (VM) Solution

    With attackers using increasingly-sophisticated ways to break into systems, manual methods of locating and inspecting devices on your network are no longer enough. The right Vulnerability Management (VM) solution can monitor your environment, enabling you to: discover devices running in your network, determine whether they are vulnerable to attack, find...

    Sponsored By Qualys

  • White Papers // Oct 2013

    Boost IT Visibility and Business Value

    Decision makers at many organizations question the investments made in IT. This is often because they don’t fully understand the value delivered by IT service management (ITSM) or by compliance with recommended best practices such as those defined by the IT Infrastructure Library or ITIL®. Learn how creating a great...

    Sponsored By ServiceNow

  • White Papers // Oct 2013

    Boost IT Visibility and Business Value with Service Catalogue

    Many CIOs are being pressured to demonstrate IT value. A service catalog can help you promote your services in a way the business can easily understand. It will become your service management foundation that can boost IT visibility and constantly demonstrate IT value to the business.

    Sponsored By ServiceNow

  • White Papers // Oct 2013

    How TCO Benefits Make Cloud Computing a No-Brainer for Many SMBs and Mid-Market Enterprises

    Read this white paper to learn how a detailed total cost of ownership (TCO) evaluation shows cloud-based solutions can deliver significant savings compared to on-premises business applications. Cloud computing eliminates the need for individual companies to buy, deploy and maintain IT infrastructure or application software. Cloud computing results in substantial...

    Sponsored By NetSuite

  • White Papers // Aug 2013

    The Promises and Pitfalls of BYOD

    Most companies know that allowing employees to use personal devices improves productivity and job satisfaction. It can also reduce costs and allow for building virtual teams through geographically dispersed talent. But how can you make sure these devices don’t introduce new threats, impact compliance or monopolize bandwidth? Read the White...

    Sponsored By Dell

  • White Papers // Aug 2013

    Effective Security in a BYOD Environment: Arming Your Organization Against the Unknown

    There is good reason for IT to get involved in and maintain “bring your own device” (BYOD) procedures. These devices bring more than employee convenience — they promote agility and efficiency throughout your business. However, it’s on IT’s shoulders to form a pragmatic strategy to secure data from malware, theft...

    Sponsored By Dell

  • White Papers // Aug 2013

    EMC IT - Leading the Transformation

    After enduring several years of global economic uncertainty, organizations large and small are beginning to increase IT spending. The pressures, although by no means gone, have begun to recede. ESG research indicates that for both enterprise and midmarket organizations, just reducing costs hile still important is no longer the top...

    Sponsored By EMC

  • White Papers // Jul 2013

    Beyond the Next Generation: Putting Advanced Network Security To Work

    Driven by demands to unify and extend protection across a broad spectrum of threats, EMA sees in this trend the rise of Converged Network Security (CNS) systems that integrate a wide range of capabilities and break down silos in network defense more than ever before. Scott Crawford, Managing Research Director,...

    Sponsored By IBM

  • White Papers // Jul 2013

    Beyond the Next Generation: Putting Advanced Network Security To Work

    Driven by demands to unify and extend protection across a broad spectrum of threats, EMA sees in this trend the rise of Converged Network Security (CNS) systems that integrate a wide range of capabilities and break down silos in network defense more than ever before. Scott Crawford, Managing Research Director,...

    Sponsored By IBM

  • White Papers // Feb 2013

    Consolidated Security Management for Mainframe Clouds

    IBM Security and IBM Information Management solutions for security work with the IBM System z platform to allow the mainframe to serve as an enterprise security hub, providing comprehensive, centralized security capabilities for organizations with distributed, multiplatform IT environments.

    Sponsored By IBM

  • White Papers // Jan 2013

    Webroot SecureAnywhere Business Endpoint Protection vs. Seven Competitors

    PassMark Software® conducted objective performance testing on eight security software products, on Windows 7 Ultimate Edition (64-bit) during January 2013. The aim of this benchmark was to compare the performance impact of Webroot’s SecureAnywhere Business Endpoint Protection product with seven (7) competitor products. This report presents our results and findings...

    Sponsored By Webroot Software

  • White Papers // Oct 2012

    The Hidden Costs of Self-Signed Certificates

    Download this white paper, The Hidden Costs of Self-Signed Certificates, to read about the true total cost of ownership for self-signed SSL, including a side-by-side comparison of a self-signed architecture versus working with a third-party SSL vendor. You'll also learn about risk factors such as how self-signed certificates can increase...

    Sponsored By Symantec

  • White Papers // Oct 2012

    Beginner's Guide to SSL Certificates

    Download Beginners Guide to SSL Certificates: Making the Best Choice when Considering Your Online Security Options to learn how VeriSign SSL Certificates offer SSL protection and more--all in a single solution. Read More..

    Sponsored By Symantec

  • Downloads // Nov 2009

    TechRepublic's Geek Gift Guide 2009

    Regardless of their current economic situation, technology geeks love to give and receive electronic gadgets. And, it is not just any gadget they want, but the best electronic gizmos. TechRepublic once again brings together our unique perspective reviews of some of the best geek gifts on the market, all just...

    Sponsored By TechRepublic

  • White Papers // Aug 2015

    A Comprehensive Human Factor Framework for Information Security in Organizations

    Human factor represent an essential issue in the security of information in organizations, as human factor determine the behavior of the employees toward information security. This paper attempts to integrate related human factors, recognized by previous paper, into a structured comprehensive framework. The framework has four main domains that take...

    Provided By Journal of Theoretical and Applied Information Technology

  • White Papers // Aug 2015

    Delivering mobile workforce productivity at the edge

    HP Connected MX addresses the challenges of managing mobile information within a dispersed corporate environment. Organizations need a solution that delivers business assurance with corporate intelligence, control, security, and information analytics without compromising end-user productivity or conveniences. HP Connected MX enables organizations to confidently deliver information accessibility to their mobile...

    Provided By Hewlett-Packard (HP)

  • Webcasts // Aug 2015

    Advancing Internet Security Research With Big Data and Graph Databases

    The OpenDNS IntelDB is a graph database system that captures and stores all security-related data for the entire organization. In addition to providing valuable data such as whitelisting and threat attribution, this system is the foundation for the next generation of security research at OpenDNS. The webcast will give a...

    Provided By SecurityTube.net

  • Webcasts // Aug 2015

    Analogue Network Security

    Today, it is the inter-infrastructural foundation of civilization. The internet of things is adding so-called intelligence to some 50+ billion endpoints. Where's the security? Or privacy? Massive new projects using next generation, smarter, faster ways of doing the same old stuff all over again is the ultimate deja vu epic...

    Provided By SecurityTube.net

  • Webcasts // Aug 2015

    When Steganography Stops Being Cool

    The art and science of concealing stuff inside other stuff is what they know as steganography. People have used it for ages to keep adversaries from looking at their secret information. In this webcast, the presenters look specifically at malware writers and how they are using steganography to hide malicious...

    Provided By SecurityTube.net

  • Webcasts // Aug 2015

    Intro to Data Science for Security

    The OpenDNS IntelDB is a graph database system that captures and stores all security-related data for the entire organization. In addition to providing valuable data such as whitelisting and threat attribution, this system is the foundation for the next generation of security research at OpenDNS.

    Provided By SecurityTube.net

  • Webcasts // Aug 2015

    Crash the IoT Train Yourself: Intentionally Vulnerable WRT (IV-WRT)

    In this webcast, the presenter will discuss the previously-unreleased firmware distribution called "Intentionally Vulnerable WRT (IV-WRT)". IoT, or more accurately embedded device, security is a train wreck. IV-WRT is an attempt at bringing vulnerabilities to light which exist inside of firmware on embedded systems.

    Provided By SecurityTube.net

  • Webcasts // Aug 2015

    Backdooring MS Office Documents with Secret Master Keys

    Recent MS Office documents are normally encrypted very strongly, making them difficult to brute force. However, there are techniques an attacker can use to secretly backdoor these encrypted documents to make them trivial to decrypt. Cloud environments may be more dangerous than thought as it is not possible for users...

    Provided By SecurityTube.net

  • Webcasts // Aug 2015

    How Portal Can Change Your Security Forever

    When used correctly gamification can be one of the most effective tools for changing behavior on a large scale, but it requires more than just designing a few digital merit badges for taking security training. In this webcast, the presenter will discuss how games like portal and Candy Crush were...

    Provided By SecurityTube.net

  • Webcasts // Aug 2015

    Barely Legal: The Hacker's Guide to Cybersecurity Legislation

    Cybersecurity is a hot topic in DC, and everyone is building an agenda on it. That's only going to increase as more high profile breaches and vulnerabilities hit the headlines and technology becomes more pervasive in people's lives.

    Provided By SecurityTube.net

  • White Papers // Aug 2015

    Effective and Key Sensitive Security Algorithm for an Image Processing Using Robust Rubik Encryption & Decryption Process

    Encryption and decryption are the essential processes in multimedia processing. Especially, in digital image processing, the importance of these two is high. Digital image processing facing several problems in recent times, those are protection of owner rights and designing of perfect encryption algorithm against hacker attacks. In recent years, different...

    Provided By IRD India

  • Webcasts // Aug 2015

    Security Consulting, an Introductory Guide

    Security consulting an introductory guide within IT security, the key consultancy specialization areas are risk management, design and build of security solutions, and penetration testing. Being a consultant is about being trusted and providing expert advice in the user's domain of expertise.

    Provided By SecurityTube.net

  • Webcasts // Aug 2015

    Secure Software Development

    Developing software is hard, and there are lots of different facets to consider. In this webcast, the presenter will explain about how to think about security during the software development lifecycle, hopefully making software more secure.

    Provided By SecurityTube.net

  • White Papers // Aug 2015

    Malware Analysis Using System Call Monitoring

    As use of Smartphone increases, threat of malware in Smartphone also increases. In Smartphone industry, Android is becoming more popular because of its open nature. This makes android a target of most of the attackers. The authors can use system call monitoring technique to detect malicious activity. In this paper,...

    Provided By IRD India

  • White Papers // Aug 2015

    Cryptography: The Science of Secure Communication

    Day-by-day, network and internet applications are becoming very popular. Sensitive information requires security and safety measures. Security is the most challenging aspect in the internet and network applications. Encryption algorithm provides the necessary protection against the data intruders' attacks by converting information from its normal form into an unreadable form....

    Provided By IRD India

  • Webcasts // Aug 2015

    Entity Authentication and Session Management

    In this webcast, the presenters will discuss the security considerations to consider when building an AuthenticatioN (AuthN) layer of a web application. They will review a series of historical authentication threats. They will also discuss a variety of authentication design patterns and defensive controls necessary to build a low-risk high-security...

    Provided By SecurityTube.net

  • Webcasts // Aug 2015

    Approaching Secure Code

    In the past, security professionals thought firewalls, Secure Sockets Layer (SSL), patching and privacy policies were enough. Today, however, these methods are outdated and ineffective, as attacks on prominent, well-protected software are occurring every day. Developers must learn to code in a secure fashion to have any chance of providing...

    Provided By SecurityTube.net

  • Webcasts // Aug 2015

    The Web's Security Model

    While the Web has undergone a dramatic transformation since the first static HTML documents, the underlying security model has been largely unchanged. However, due to the vastly expanded client-side capabilities in modern web applications, the security model is now more important than ever. Understanding this security model is key to...

    Provided By SecurityTube.net

  • Webcasts // Aug 2015

    Anonymity Systems Requirements and Architecture

    Anonymity systems are one of the most challenging classes of security technologies to build and deploy. This webcast will describe the types of systems which are available and difficulties encountered in realizing these goals. As a study, the webcast will use the largest deployed anonymity network, Tor.

    Provided By SecurityTube.net

  • Webcasts // Aug 2015

    Authorization With Oauth 2.0

    OAuth 2.0 is an open standard for authorization and is becoming the de facto standard to integrate with social media like Facebook and Twitter. It allows users to share private resources between sites without having to hand out their credentials. In this webcast, the presenters will describe how OAuth works...

    Provided By SecurityTube.net

  • Webcasts // Aug 2015

    JavaScript Security

    As one of the key technologies underlying advanced web applications, JavaScript is becoming ever more important. As a developer, the users need to understand what features of the language they can embrace fully, and which ones to stay away from. Doing so will help them write more securable code (i.e....

    Provided By SecurityTube.net

  • Webcasts // Aug 2015

    The Irresistible Rise of Online Crypto Currencies

    In this webcast, the presenter will explain what crypto currencies are, their advantages and their failings. It draws on economics as well as cryptography. The webcast examines the nature of money and examines some historical as well as current attempts to construct a monetary system with cyber-currencies.

    Provided By SecurityTube.net

  • Webcasts // Aug 2015

    Low-Level Software Security: Attacks and Countermeasures

    In this webcast, the presenter will introduce common low-level security problems and solutions by example. Focusing on the C language, the presenters will discuss four common attack techniques that attackers can use to gain control over the execution of software: return address clobbering, where an attacker gains control by overwriting...

    Provided By SecurityTube.net