Security

Infosec lapses, malware, phishing, and other targeted attacks can ruin your day. Beef up your cybersecurity arsenal with strong authentication, encryption, and real-time monitoring.

  • Top 5 attack vectors

    White Papers // Nov 2016 // provided by Symantec

    Cryptography forms the basis of trust on the internet. Without it, secure online shopping transactions wouldn't be possible, private messages couldn't be sent and sensitive corporate communications couldn't safely transfer across websites and networks.

    Find out more
  • Not all CAs are created equal

    White Papers // Nov 2016 // provided by Symantec

    There have been a string of successful attacks on certificate authorities (CAs) this year, and the threat to CAs will certainly not abate. On the contrary, hackers have been raising their game steadily and the techniques used to exploit networks grow ever more sophisticated. As one of the world’s leading ...

    Find out more
  • Always on SSL WP

    White Papers // Nov 2016 // provided by Symantec

    Always On SSL is a fundamental, cost-effective security measure for websites that helps protect the entire user experience from start to finish, making it safer to search, share, and shop online. Companies who are serious about protecting their customers and their business reputation will implement Always On SSL ...

    Find out more
  • Code Signing WP (To Increase Downloads, Instill Trust First)

    White Papers // Nov 2016 // provided by Symantec

    Learn how code signing mitigates the risks of transferring code over the Internet or wireless networks, as well as allows end users to take advantage of the ease and convenience of content distribution without worrying about security consequences.

    Find out more
  • M-Trends 2016 – Asia Pacific Edition

    White Papers // Nov 2016 // provided by FireEye

    We don’t hear much about cyber breaches in Asia Pacific (APAC), but that doesn’t mean they aren’t happening every day. In fact, evidence reveals that APAC organizations often have difficulty identifying and responding to breaches. This latest M-Trends report focuses exclusively on APAC organizations and details the ...

    Learn more
  • Breach Readiness Webinar: Next Generation of Incident Preparedness

    Webcasts // Nov 2016 // provided by FireEye

    Are you ready to handle a security breach? Russell Teague, Managing Director, Mandiant, will discuss what companies need to do to be breach-ready, and how being proactive in your incident preparedness is essential and could save you from devastating cost. Incident preparedness is more than ...

    Watch Now
  • ESG Lab Validation Report

    White Papers // Nov 2016 // provided by NEC & Intel Security

    This ESG Lab Validation report documents hands-on testing of the McAfee next generation security information and event management solution. ESG Lab focused on the McAfee Enterprise Security Manager (ESM), the core product of McAfee’s end-to-end solution for addressing comprehensive threat detection and remediation. Testing was designed to explore how the ...

    Read more
  • Securosis SIEM Kung Fu

    White Papers // Nov 2016 // provided by NEC & Intel Security

    Even though security monitoring (and SIEM specifically) has been much maligned, you don’t really have a choice but to use technologies to detect attacks and provide a means for your security team members to find adversaries in your environment. SIEM Kung Fu is about making the most of a product ...

    Read more
  • Gartner report: The Five Characteristics of an Intelligence Driven Security Operations Center

    White Papers // Nov 2016 // provided by NEC & Intel Security

    In this report, Gartner documents enterprises are overly dependent on blocking and prevention mechanisms. Going forward, improved prevention, detection, response and prediction capabilities are all needed to deal with all types of attacks. The shift from traditional to intelligence driven SOC is rooted in continuous detection and response, adapting to ...

    Read more
  • CyberEdge Group 2016 Cyberthreat Defense Report

    White Papers // Nov 2016 // provided by LogRhythm

    This report analyzes the current state of cyber security, including the perceptions and concerns of cyber security professionals. The findings of this report are divided into four sections, as follows: Section 1: Current Security Posture Section 2: Perceptions and Concerns Section 3: Attack Surface Reduction Section 4: Future Plans

    Download Now