Sort results by: Published date | Company name
Showing items 1-25

The True State of Open Source Security [ Source: Sonatype ]

August 2014- The 4th annual Open Source Development Survey has been analyzed, sliced and diced and now incorporated into a compelling infographic. See what 3300+ participants told us about the state of open source development, policies, license management, security processes, breaches and more. Learn 4 easy steps you can take to start securing your open source development practices today.

eDiscovery Digital Investigations Solution [ Source: Symantec ]

August 2014- More Digital Investigations, More Email and Documents, but No More Time? Solve digital investigations 10 times faster! Information technology and security professionals at agencies have realized immediate and significant results using eDiscovery Digital Investigation Solution.

How to Improve Productivity While Minimizing Risk in Open Source Development [ Source: Sonatype ]

August 2014- The last ten years have seen a revolution in the way software is developed and delivered. Organizations have moved away from tedious custom source code programming in favor of quicker component-based approaches. However, most application security technologies are designed for source code not components. This gap leaves most application code vulnerable to security threats, licensing issues and performance defects. Understand how Component Lifecycle Management addresses this problem in refreshing new ways.

Understanding & Addressing OWASP's Newest Top Ten Threat: Using Components with Known Vulnerabilities [ Source: Sonatype ]

August 2014- Many organizations turn to the Open Web Application Security Project (OWASP) to help ensure that their code and applications are secure. Recently OWASP's Top Ten list of application security risks was updated to include "A9: Using components with known vulnerabilities." This means organizations need to expand their security approach to accommodate components - which are reusable blocks of code that are assembled together to create an application. These re-usable components now comprise 90% of an average ...

7 Security Gaps in the Neglected 90% of Your Application [ Source: Sonatype ]

August 2014- Software applications need to be delivered faster and across more platforms than ever. To build high quality software in short order, we've seen a dramatic shift from source code to component-based development, with open source and third party components providing the innovation and efficiency that developers need. Unfortunately, our dependence on components is growing faster than our ability to secure them. Worse yet, components are increasingly the preferred attack surface in today's applications. The combination ...

Email Security For IT: How to keep your Brand Safe [ Source: Dyn ]

August 2014- In a world where we hear about website and email hacks almost daily, implementing security provisions is no longer an option. Not only can phishers hurt your company and customers, but your brand can take a beating too. Find out what you should be implementing to keep your brand safe.

5 DNS Security Risks That Keep You Up At Night [ Source: Dyn ]

August 2014- When it comes to keeping your DNS secure, do you know what you're up against? Here are five of the most pervasive DNS threats that you need to be thinking about, and how to keep them from creating a performance or security nightmare.

5 Ways to Prepare Your Infrastructure for Disaster [ Source: Dyn ]

August 2014- The term "disaster recovery" assumes that you wait until something terrible happens to take action. While it's great to know how to recover when disaster strikes, wouldn't you rather prevent it from happening in the first place? Of course, there are no guarantees when it comes to preventing outages and downtime, but if you follow these key areas of preparation, you can greatly reduce your risk.

10 Tenets of BYOD Wisdom [ Source: Sprint ]

August 2014- BYOD has the potential to be messy and disruptive to your IT department. As a trend that is not going away, stay ahead of the game with our 10 tenets of BYOD wisdom. Read our ebook to see how you can give your employees the flexibility to bring their own devices while still protecting the business.

Rethinking Your Enterprise Security [ Source: HP ]

August 2014- The world is constantly evolving and always connected, and your enterprise must be too. Forward-thinking enterprises realize that they need a sustainable approach to security and risk management - one that addresses the new wave of vulnerabilities that prevail due to increasing trends in IT consumerization, mobility, social media, cloud computing, cybercrime, and nation-state attacks.

HP is the sponsor of this material. By submitting your information you agree to be contacted by HP ...

Critical Network Capabilities for Cloud-Based DDoS Mitigation [ Source: Verisign ]

July 2014- Due to the evolving DDoS threat, companies are turning to cloud based DDoS mitigation providers, who have built out massive amounts of network bandwidth and DDoS mitigation capacity. Just as important as network capacity is the flexibility and diversity of the provider's network. This paper describes how Verisign DDoS Protection Services relies upon a fully redundant network backbone, purpose-built on multiple diverse 10 Gbps optical infrastructures.

DDoS Mitigation And DNS Availability Should Be Key Components Of Your Resiliency Strategy [ Source: Verisign ]

July 2014- DDoS attacks continue to grow in size, frequency and complexity, forcing network-dependent companies to implement a plan for protection. However, the results of a recent research project by Forrester and Verisign show that many companies are experiencing a disconnect between the growing awareness of DDoS attacks and a protection strategy. Additionally, many organizations overlook the connection between DDoS protection and other infrastructure support, such as DNS hosting and management. This report provides an overview of ...

4 Ways DNS Can Accelerate Business Growth [ Source: Neustar ]

July 2014- This DNS ebook describes how DNS has developed over the years to support business growth as new needs have emerged, for example, advanced traffic management and protection from cyber threats.

eBook: An IT Auditor's Guide to Security Controls & Risk Compliance [ Source: Bit9 ]

July 2014- Most organizations must comply with multiple standards covering privacy, corporate financial data, Protected Health Information and credit card data. Fortunately, the overlapping standards agree on a single concept; implementing appropriate security controls to protect information from improper disclosure.

However, GRC requirements do not exist in a vacuum. Organizational objectives must also be supported. Critical functions can be disrupted if business needs are not considered when establishing compliance activities. In addition, providing evidence that ...

Prepare For the Post-AV Era Part 1: Five Alternatives To Endpoint Antivirus [ Source: Bit9 ]

July 2014- As malware increases in sophistication and the number of new variants rises, antivirus (AV) technologies have steadily become less effective at stopping advanced threats to employee endpoints and servers, and security and risk (S&R) professionals have begun to realize this, as evidenced by survey results showing decreased adoption and interest in AV among small and medium-size businesses and enterprises alike.

A growing number of S&R pros are considering replacing their third-party ...

eBook: Endpoint Threat Detection, Response and Prevention for Dummies [ Source: Bit9 ]

July 2014- Traditional signature-based endpoint protection solutions struggle to protect against today's advanced threats and zero-day attacks. Enterprises need to detect and respond based on real-time monitoring and a continuous recorded history to reduce the attack surface with leading default-deny prevention solutions. Download the eBook to understand:

• How every enterprise is a target
• Why traditional endpoint security solutions can't protect your environment from advanced threats
• How endpoint threat detection, response, ...

White Paper: Rapidly Respond to Advanced Attacks in Motion with Bit9 + Carbon Black [ Source: Bit9 ]

July 2014- Traditional incident response (IR) processes are being overwhelmed. The increased volume of attacks has caused the number of alerts from detection devices to balloon dramatically. Enterprises now realize it is no longer a matter of if they will get breached, but rather a matter of when.

Download this whitepaper to understand:

• Typical Response Scenario
• Evolving Enemies
• Kill Chain
• Incident Response Lifecycle
• Security ...

5 Tips to Secure Small Business Backdoors in the Enterprise Supply Chain [ Source: SurfWatch Labs ]

July 2014- Cybersecurity for the enterprise. There is no silver bullet. But as business becomes more connected and as data moves further outside the organizational walls, enterprises need look at weaknesses in the security chain - and a good place to start is in the supply chain.

Small businesses sit on the "front lines" in the round-the-clock cybercrime battle. Think about how many small businesses, suppliers and customers have access to different areas of an ...

Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk [ Source: SurfWatch Labs ]

July 2014- The market for cyber liability insurance has been around for over a decade, but only recently has it experienced a spike in demand. The variety of recent high-profile data breaches have cast light on the importance of having coverage should a cyber-attack strike a business. No business is immune to a cyber-attack, which can wreak havoc not only on the IT environment, but also on the bottom line.

Despite all of this, cyber ...

Big Data, Big Mess: Sound Risk Intelligence Through Complete Context [ Source: SurfWatch Labs ]

July 2014- When it comes to cybersecurity, perhaps nothing has been as highly touted as the answer to every executive's prayers as big data. Cybercrime, being inherently technical, can provide vast droves of data to be analyzed.

The real challenge is translating complex, technical cyber data into practical information that can be easily understood by the business as well as security pros. Many variables come into play when it comes to understanding cyber risk: your ...

Intelligent Compliance - Establishing Trust in the Datacenter [ Source: BMC Software ]

July 2014- With the average cost of a data breach reaching $3.5 million, the pressure is intense to maintain the security and compliance of your data center. It only takes one breach and the cost to your organization can spiral out of control.

In this whitepaper, you will discover how your organization may be at risk and how you can protect your data center from costly and highly visible breaches. Through the Intelligent Compliance process, you ...

The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report [ Source: Neustar ]

July 2014- DDoS attacks against high-tech firms have started to take a dangerous turn. It's called DDoS smokescreening - attackers using DDoS as a distraction while they insert malware or viruses to pilfer money, data and intellectual property. This is just one insight in Neustar's 2014 Annual DDoS Attacks and Impact Survey. The resulting report compares DDoS findings from 2013 to 2012, based on a survey of 440 North American companies, including 139 businesses delivering technology products and/or services such as ...

Network Transformation: A Guide to Planning Your Journey to All-IP [ Source: Neustar ]

July 2014- Historically, communication service providers (CSPs) have viewed network transformation through the narrow lens of technology, as though it were a simple matter of upgrading equipment. But in reality, the solution is much more complex. To ensure a smooth transition to an all-IP network, it's essential for each area of the business (IT, marketing and operations) to work together and consistently communicate throughout the journey.

It's Time for a Serious Talk: 3 Questions to Ask Your DNS Host about Lowering DDoS Risks [ Source: Neustar ]

July 2014- It's no secret that DDoS attacks are worsening by the day. From the largest financial institutions to smaller Internet companies, everyone's a target. Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size. Most of these conversations boil down to three key questions and form the conversation you should be having, too-whether you use Neustar, another provider or your in-house team to ...

Forensic Domain Mapping: How to Reverse Engineer Domain Ownership in a Cyber Investigation [ Source: DomainTools ]

July 2014- For investigators tasked with identifying the perpetrator of online fraud, it's often the little things that can make the difference. Cyber investigators must work diligently to ferret out the smallest details in order to snare their quarry. Investigating a digital crime is not so dissimilar as investigating a crime in the 'real world'. While popular TV shows might have you believe that a single fiber found at the scene of a crime will lead directly ...

Domain Attribution: Piercing the Veil of Masked Domain Owners [ Source: DomainTools ]

July 2014- As the Internet has evolved to become a primary channel of trade and commerce, so has the sophistication of criminal organizations and other perpetrators of fraudulent schemes who take advantage of domain privacy features as a means by which to mask their true identity. Domain privacy, a controversial topic since its introduction in 2003, provides domain owners with the option to substitute the registrar's contract information for their own. While there are a variety of legitimate ...

Next 25