Sort results by: Published date | Company name
Showing items 1-25

5 Tips to Secure Small Business Backdoors in the Enterprise Supply Chain [ Source: SurfWatch Labs ]

July 2014- Cybersecurity for the enterprise. There is no silver bullet. But as business becomes more connected and as data moves further outside the organizational walls, enterprises need look at weaknesses in the security chain - and a good place to start is in the supply chain.

Small businesses sit on the "front lines" in the round-the-clock cybercrime battle. Think about how many small businesses, suppliers and customers have access to different areas of an ...

Top 10 Things Every Web Application Firewall Should Provide [ Source: Imperva ]

July 2014- Securing Web applications against cybercriminals, hacktivists, and state-sponsored hackers is a never-ending effort. Web application firewalls have become the central platform for protecting applications against all online threats. This white paper explains in detail the 10 features that every Web application firewall should provide.

It's Time for a Serious Talk: 3 Questions to Ask Your DNS Host about Lowering DDoS Risks [ Source: Neustar ]

July 2014- It's no secret that DDoS attacks are worsening by the day. From the largest financial institutions to smaller Internet companies, everyone's a target. Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size. Most of these conversations boil down to three key questions and form the conversation you should be having, too-whether you use Neustar, another provider or your in-house team to ...

White Book : Cloud Security - The Definitive Guide to Managing Risk in the New ICT Landscape [ Source: Fujitsu America Inc. ]

June 2014- Cloud computing is demonstrating its potential to transform the way IT-based services are delivered to organizations, the journey to cloud is no longer question of "if" but rather "when", and a large number of enterprises have already travelled some way down this path.

However, there is one overwhelming question that is still causing many CIOs and their colleagues to delay their move to cloud: Is cloud computing secure? As many unwary businesses have ...

How CIOs Can Guide the Enterprise to Mobile Success [ Source: OpenMarket ]

June 2014- In this paper we look at the new, front-line role of IT and security, specifically within enterprises using mobile messaging technologies, and suggest ways to mitigate risk and avoid costly mistakes and pitfalls.

The Thriving Malware Industry: Cybercrime Made Easy [ Source: IBM ]

June 2014- The malware industry supplies all the components cybercriminals need to easily perpetrate malware-driven financial fraud and data theft. In today's virtual world, the scope of organizations vulnerable to malware-driven cybercrime is quite broad. In addition to banks and credit unions that are subject to online banking fraud, financial fraud can be perpetrated on insurance companies, payment services, large e-commerce companies, airlines and many others.

10 Things Your Next Firewall Must Do [ Source: Palo Alto Networks ]

June 2014- For enterprises looking at Next-Generation Firewall's, the most important consideration is: Will this new technology empower your security teams to securely enable applications to the benefit of the organization? It's not about blocking applications, but safely enabling them.

In this booklet, you'll find practical advice on:

• The how and why of next-generation security

• How to turn security into a business enabler

• 10 critical functions your ...

Security Configuration Management For Dummies [ Source: Tripwire ]

May 2014- Securing your server and network configurations may be the smartest security work you can do. Why? Continually protected and hardened systems keep your data safe, repel exploits and provide measurable confidence. But it's hard to do. How do you get started? What are the capabilities to look for in an effective solution?

Security Configuration Management For Dummies shows you how to:

• Adopt and implement a security hardening policy

&...

Adding Extra Security to Cloud Storage [ Source: Sophos ]

May 2014- Many companies take a restrictive approach to public storage services such as Dropbox by applying web filtering to block access or by applying application controls to prevent cloud storage applications from being installed.

Download this whitepaper and find out how applying data encryption everywhere enables users to manage access to the cloud without placing data or businesses at risk.

Encryption Buyers Guide [ Source: Sophos ]

May 2014- Today your organization faces the dual challenges of keeping data safe without affecting user productivity. Encryption is one of the most effective ways to protect information from attackers — yet many organizations have shied away from comprehensive encryption because the technology was too complicated or onerous for end users. But things are changing.

This guide will help you:
- Examine the capabilities to look for when evaluating endpoint encryption solutions
- ...

Regulations and Standards: Where Encryption Applies [ Source: Sophos ]

May 2014- Organizations of all sizes face a number of industry and regulatory compliance mandates. Whether it's PCI DSS, SOX, HIPAA or FISMA, these regulations are changing to accommodate the ever-growing threat to sensitive data.

This whitepaper describes the different types of data under regulation and offers best practices for implementing appropriate encryption technologies. Download this whitepaper and learn:

• Tips on protecting your data in today’s complex security landscape
• How to ...

Combating Digital Fraud [ Source: RSA ]

May 2014- Combating digital fraud has become a business issue and presents risk for any organization with online operations. Gain perspective from CIOs on what organizations can do to prevent fraud in digital commerce.

Holding the Fort-Securing Your Network with App-Aware Firewall Testing [ Source: Spirent ]

May 2014- The news is littered with stories of enterprises that have suffered costly downtime and damaging lawsuits as a result of security breaches. Even high-profile names such as LinkedIn, Sony, and RSA are not immune. Lack of security is costly, but how much should an organisation spend to address their security issues?

When it comes to security, you spend money to lower risk - much like spending money on the legal department to reduce ...

Running on Faith-The Risk of Inadequate Network Testing [ Source: Spirent ]

May 2014- In many organisations, network infrastructure testing is neglected or overlooked. Yet Gartner estimates low-end computer network downtime costs $42,000 per hour. For a large company, the cost could be over ten times that.

In 2011, Sony Playstation's network was compromised – exposing the personal information of 77 million users. This created a 24-day outage and cost Sony over $24 billion. The same year an outage left Blackberry users without services for four days - crippling RIM's competitive position.<...

BYOD: The Hidden Threat [ Source: Spirent ]

May 2014- Gone are the days when corporate network security could rely on a WAN gateway firewall and control of physical access. The increasing use of bring-your-own-device (BYOD) means threats can enter via your employees' personal devices.

A 2013 Ovum employee study shows that over sixty percent of employees bring their own devices to work and access corporate resources with them. Whilst BYOD brings numerous advantages, the Cisco 2014 Annual Security Report calculates the average cost of ...

20 Critical Questions Your Security Programs Must Answer [ Source: Tripwire ]

March 2014- This booklet/poster takes you step-by-step through the 20 Critical Security Controls, with an additional section that focuses on the first four fundamental controls. A convenient scorecard lets you rank your specific needs against NSA rankings.

Bridging the Data Security Gap [ Source: IBM ]

May 2014- Today's IT environment is complex. Multiple environments with multiple access paths and permission levels have resulted in a broad array of data security threats and vulnerabilities. Given the certainty that data will continue to grow and the data structures become more complex, a unified and integrated approach will minimize risks, vulnerabilities and exposures. Read this e-book and learn how you can protect sensitive data and implement an effective data security and privacy solution designed to ...

Six Steps to Achieving Data Governance [ Source: Dell Software ]

May 2014- In this white paper, learn six easy steps to achieve data governance - quickly, easily and without the headaches. See how to control security threats and limit data access - across all your diverse platforms - while satisfying compliance requirements.

Anti-Evasion: Why It's a Critical Component of Intrusion Prevention Systems [ Source: Dell Software ]

April 2014- Learn why anti-evasion is a critical component for your intrusion prevention system. Sophisticated exploits that utilize advanced evasion techniques are all too common.

Intrusion prevention systems (IPS) are designed to prevent known attack traffic patterns from penetrating systems on the network. But there’s an inherent problem with the technology, since it can block only the attacks it sees and is already familiar with. If malicious code is cleverly disguised, it can slip ...

Guarding The Castle: The Strategies and Tools of Cybercriminals and How To Defeat Them [ Source: Dell Software ]

April 2014- Discover the top four strategies and tools that cybercriminals use to infiltrate your network, and how you can stop them. You need to understand your enemies before you can defeat them. This e-book will teach you why it is important that you know how you can secure your network every minute of the day against all types of malware, with a high performance firewall that protects against the latest global threats.

Find out ...

Infographic: ATP Checklist [ Source: Blue Coat ]

April 2014- Our Advanced Threat Protection interactive checklist provides the top ten questions to consider when designing your adaptive security architecture and key areas you must address at each phase of an effective threat lifecycle defense

Automated Malware Analysis [ Source: Blue Coat ]

April 2014- Learn the four key reasons why traditional manual and fragmented malware analysis processes are actually increasing overall business risk today, and why previous malware analysis options are inadequate given the realities of today's advanced threat landscape.

Security Insight Brief: Top 5 Critical Capability For Your Malware Sandboxing [ Source: Blue Coat ]

April 2014- Malware authors are clever and persistent. More than 200,000 new malware samples are uncovered every day.1 And new malware attacks are often successful: 90% of companies reported a security breach in the last 24 months, according to the 2013 Ponemon Report. Layered defenses can block the "known bad," but malware continues to slip through. Today, you must also analyze and defend against "unknown" files and URLs with dynamic sandboxing. It's the only way to methodically unmask zero-day exploits, advanced ...

What can you do differently to guard against threats from rapidly evolving mobile malware? [ Source: IBM ]

April 2014- Mobile security is more than protecting the device. It is protecting applications on the device and preventing data leakage in the enterprise. IBM Security AppScan helps determine vulnerabilities early in the application development cycle to eliminate vulnerabilities malware can exploit.

Managing security risks and vulnerabilities [ Source: IBM ]

April 2014- With integrated security intelligence solutions from IBM, organizations can use labor-saving automation to proactively identify security weaknesses, prioritize remediation tasks and take quick corrective action to minimize potential risks across a dynamic infrastructure.

Hidden Lynx - Professional Hackers for Hire [ Source: Symantec ]

December 2013- Take an in-depth look at the Hidden Lynx group, their targets, motivations, capabilities and attack strategies.

Next 25