Sort results by: Published date | Company name
Showing items 1-25

Seven Steps to Creating an Effective Computer Security Incident Response Team [ Source: Absolute Software ]

September 2014- Chief information security officers (CISOs) and other key security decision makers should follow a phased approach in developing and maintaining a CSIRT that will identify, contain, escalate, investigate and remediate incidents in a timely and efficient manner. Read Gartner's report on how a phased approach to the creation of the team will ensure optimal effectiveness.

Blue Coat SSL Visibility [ Source: Blue Coat ]

September 2014- To be secure against targeted attacks, organizations need complete visibility into the SSL traffic coming across the WAN. Discover the risks posed by the use of SSL encryption, and the products that can help you defend your business.

SANS Analyst White paper: Finding Hidden Threats by Decrypting SSL [ Source: Blue Coat ]

September 2014- This white paper describes the growing role SSL/TLS decryption plays in security, options for deploying decryption, and best practices for sharing the information generated by SSL/TLS decryption with other security monitoring systems.

Stop Attacks Hiding Under the Cover of SSL Encryption [ Source: Blue Coat ]

September 2014- Wasn't encryption supposed to improve network security? All too often SSL is a carrier of new and successful attacks. Discover how to transform the increased risk into an effective strategy for encrypted traffic management.

Consumer Web Portals at Risk [ Source: RSA ]

September 2014- This report discusses the top business risks related to the security of consumer facing portals and the latest identity-related technologies that some organizations are already using or plan to adopt to minimize their risk.

Card-Not-Present Fraud in a Post-EMV Environment [ Source: RSA ]

September 2014- This analyst paper discusses the effects of card not present (CNP) fraud and best practices for financial institutions and merchants for managing fraud risk across multiple channels including the Web, mobile and POS terminals.

Building an Intelligence-Driven Security Operations Center [ Source: RSA ]

September 2014- This paper details why organizations needs to shift more security resources from preventing intrusion toward rapid threat detection and remediation, and the intelligence-driven security approach that is required to do so.

Transform Traditional Security Strategies into an Early Warning System for Advanced Threats [ Source: RSA ]

September 2014- To develop the visibility, agility and speed to deal with advanced threats, security information and event management (SIEM) systems need to evolve into a central nervous system for large-scale security analytics.

Enterprise Strategy Group Report: The Big Data Security Analytics Era is Here [ Source: RSA ]

September 2014- Big data security analytics is no longer a visionary idea -- leading enterprises recognize that their immediate security requirements demand this type of solution. Read this paper for key trends and conclusions in the big data security era.

Case Study: Cadence Design Systems Finds Customer-Critical Bugs with UndoDB for Linux [ Source: Undo Software ]

September 2014- Developers of complex C++ code for memory-intensive software applications need greater insight into their code during debug. The situation intensifies when it's a customer-critical bug and the data needed can't leave the customer's site. This case study describes how Cadence Design Systems, a leading company in the electronic design automation (EDA) segment, utilized UndoDB for internal debug of complex Linux applications and collaborated to utilize UndoDB for onsite customer-critical bugs.

Hands-On Teams: Computrace Protects the Laptops of the Intelligrated Mobile Workforce [ Source: Absolute Software ]

August 2014- The Intelligrated IT Department was concerned about potential laptop theft, and needed a solution that would allow them to track and secure laptops in the field. After researching available options, they chose Absolute Computrace.

Fight Cyber Crime with Splunk, Cisco, and Red Hat [ Source: Red Hat ]

August 2014- The cost of cyber crime across the globe has already grown to $100 billion annually, not counting the intangible damage to enterprise and government security. In addition to the data loss and security breach, there is immeasurable, and sometimes irrevocable, damage to the brand.

Analyzing machine data from firewalls and perimeter devices in real time to thwart - and predict - threats is the only defense for most institutions. However, the amount of data ...

5 Steps to Application-Aware Data Protection [ Source: CommVault ]

August 2014- Many IT organizations have had the same data protection tools and practices for years, even decades, and see no need for that to change. But Application Owners need to know that they'll be able to recover their data at the application level when disaster strikes, and yesterday's solutions are simply not up to this job. It's time for modern, application-aware data protection - and here's how to get there. Learn more about how to create ...

CommVault Is A Leader Among Enterprise Backup And Recovery Software Providers [ Source: CommVault ]

August 2014- CommVault's primary strategy centers on providing a single platform for backup, recovery, continuity, archive, and other data management and protection strategies. Areas of strength for CommVault include its deduplication capabilities, cloud-target integrations, hypervisor and application capabilities. Through innovative offerings and the implementation of advanced strategies, CommVault has quickly become an industry leader in a myriad of fields. Download this Forrester Research Report today to find out more about CommVault's current offering, strategy, and market presence.

Zen and the Art of Identity Federation [ Source: Radiant Logic ]

August 2014- Has your identity infrastructure hit choppy waters? Set Sail for stronger authentication, richer authorization, and smarter security for all your identity initiatives. RadiantOne delivers a global view of identity on top of your previous identity investments, for faster deployments, lower integration costs, and all the flexibility you need to navigate changing business requirements

Don't Drink Sour Milk: Avoidable Risks in the New World of Application Security [ Source: Sonatype ]

August 2014- There has never been a more interesting, important and challenging time to be a software security professional than right now. Applications are the new vector of attack, development is going faster than security can keep up and most source code has been replaced by open source components. Read this rant to understand more about the new landscape of modern application development. Find out what's really happening in the world of 'assembled' development and learn how ...

5 Strategies for Modern Data Protection [ Source: CommVault ]

August 2014- It's no secret that today's unprecedented data growth, datacenter consolidation and server virtualization are wreaking havoc with conventional approaches to backup and recovery. Read the five strategies for modern data protection that will not only help solve your current data management challenges but also ensure that you're poised to meet future demands.

The True State of Open Source Security [ Source: Sonatype ]

August 2014- The 4th annual Open Source Development Survey has been analyzed, sliced and diced and now incorporated into a compelling infographic. See what 3300+ participants told us about the state of open source development, policies, license management, security processes, breaches and more. Learn 4 easy steps you can take to start securing your open source development practices today.

eDiscovery Digital Investigations Solution [ Source: Symantec ]

August 2014- More Digital Investigations, More Email and Documents, but No More Time? Solve digital investigations 10 times faster! Information technology and security professionals at agencies have realized immediate and significant results using eDiscovery Digital Investigation Solution.

How to Improve Productivity While Minimizing Risk in Open Source Development [ Source: Sonatype ]

August 2014- The last ten years have seen a revolution in the way software is developed and delivered. Organizations have moved away from tedious custom source code programming in favor of quicker component-based approaches. However, most application security technologies are designed for source code not components. This gap leaves most application code vulnerable to security threats, licensing issues and performance defects. Understand how Component Lifecycle Management addresses this problem in refreshing new ways.

Understanding & Addressing OWASP's Newest Top Ten Threat: Using Components with Known Vulnerabilities [ Source: Sonatype ]

August 2014- Many organizations turn to the Open Web Application Security Project (OWASP) to help ensure that their code and applications are secure. Recently OWASP's Top Ten list of application security risks was updated to include "A9: Using components with known vulnerabilities." This means organizations need to expand their security approach to accommodate components - which are reusable blocks of code that are assembled together to create an application. These re-usable components now comprise 90% of an average ...

7 Security Gaps in the Neglected 90% of Your Application [ Source: Sonatype ]

August 2014- Software applications need to be delivered faster and across more platforms than ever. To build high quality software in short order, we've seen a dramatic shift from source code to component-based development, with open source and third party components providing the innovation and efficiency that developers need. Unfortunately, our dependence on components is growing faster than our ability to secure them. Worse yet, components are increasingly the preferred attack surface in today's applications. The combination ...

Email Security For IT: How to keep your Brand Safe [ Source: Dyn ]

August 2014- In a world where we hear about website and email hacks almost daily, implementing security provisions is no longer an option. Not only can phishers hurt your company and customers, but your brand can take a beating too. Find out what you should be implementing to keep your brand safe.

5 DNS Security Risks That Keep You Up At Night [ Source: Dyn ]

August 2014- When it comes to keeping your DNS secure, do you know what you're up against? Here are five of the most pervasive DNS threats that you need to be thinking about, and how to keep them from creating a performance or security nightmare.

5 Ways to Prepare Your Infrastructure for Disaster [ Source: Dyn ]

August 2014- The term "disaster recovery" assumes that you wait until something terrible happens to take action. While it's great to know how to recover when disaster strikes, wouldn't you rather prevent it from happening in the first place? Of course, there are no guarantees when it comes to preventing outages and downtime, but if you follow these key areas of preparation, you can greatly reduce your risk.

10 Tenets of BYOD Wisdom [ Source: Sprint ]

August 2014- BYOD has the potential to be messy and disruptive to your IT department. As a trend that is not going away, stay ahead of the game with our 10 tenets of BYOD wisdom. Read our ebook to see how you can give your employees the flexibility to bring their own devices while still protecting the business.

Next 25