Sort results by: Published date | Company name
Showing items 1-25

Dealing with Data Breaches and Data Loss Prevention [ Source: Proofpoint ]

April 2015- As data grows and organizations become more vast, the risk of sensitive data being breached increases at an alarming pace. With data breaches making the headlines more than ever, organizations are forced to consider the safety of their data, the policies they have in place to protect it, and the strategies and tools at their disposal for breach mitigation.

Download the latest research report from Osterman Research, Inc., Dealing with Data Breaches and ...

Defending Against Advanced Threats - Addressing the Cyber Kill Chain [ Source: Proofpoint ]

April 2015- As clearly evidenced by the daily headlines about security breaches, traditional defense tools are failing to protect enterprises from advanced targeted attacks. A deeper understanding of these attacks and how cybercriminals approach them is key to ensuring your organization is protected.

Understanding the Cyber Kill Chain model and how attackers use the cycle of compromise, persistence and exfiltration against an organization is simple but creating an architecture and supporting policies to address it ...

Security experts' guide to the cloud [ Source: ControlNow ]

April 2015- Cloud and security are two terms that were rarely uttered in the same sentence: For many sceptics, the two did not go together. That viewpoint has changed considerably over the past couple of years with cloud-based solution providers beefing up security to the extent that it is more reliable than what a small to mid-sized business can ever muster. In this ebook, tech influencers share their views on security and the cloud and give advice ...

The giant's advantage - Why cloud computing levels the playing field for SMBs [ Source: ControlNow ]

April 2015- Decision makers in SMBs often raise concerns about cloud computing. There is a belief that cloud-based solutions cause SMBs to sacrifice security and control of their business-critical data. But, according to recent IBM research, businesses relying on cloud computing have a competitive advantage. And it's generating twice the revenue - and profit - of their slower-to-adapt rivals.

Securing the Cloud Connection [ Source: Comcast ]

March 2015- Many enterprises worry about the security of their information in the cloud. Yet the many different paths employees take to access that data may be anything but secure. This in-depth guide explains the cloud connection security challenges — and what to do about them.

5 Steps for Securing the Data Center: Why Traditional Security May Not Work [ Source: Cisco ]

March 2015- Data center administrators face a significant challenge. They need to secure the data center without compromising the performance and functionality that new data center environments enable. Many are looking to secure the data center using solutions designed for the Internet edge, but these solutions are not enough. The data center has unique requirements around provisioning, performance, virtualization, applications, and traffic that Internet-edge security devices are simply not designed to address. Ready to learn more?

Analysis of Cybercrime Infrastructure [ Source: Proofpoint ]

January 2015- Proofpoint security researchers have published an analysis that exposes the inner workings of a cybercrime operation targeting online banking credentials for banks in the United States and Europe. This Proofpoint research report provides a detailed and rarely seen inside view of the infrastructure, tools and techniques that enabled this cybercrime group to infect over 500,000 PCs.

Key facts from the Proofpoint analysis:
• Qbot (aka Qakbot) botnet of 500,000 infected systems sniffed “conversations&...

The Failure of Cloud Information Governance: A Global Data Security Study [ Source: SafeNet ]

January 2015- As technology evolves, more and more organizations are moving applications and data to the cloud. Although cloud solutions can save money and improve accessibility for remote users, it can also leave your sensitive data vulnerable to new security threats. With the lack of governance policies and security practices for the transition to cloud computing, it is important to consider how this move can affect your organization’s security. Ponemon Institute conducted a survey sponsored ...

The Current State of Encryption and Key Management: Where Security Gaps Persist - Strategies for Addressing Them [ Source: SafeNet ]

January 2015- While encryption has been employed for decades, there has never been a higher need than in today’s market with data breaches consistently littering the headlines. As more organizations adopt encryption strategies many questions are posed.

Where is encryption being employed today and why?

Where do security practitioners see encryption’s usage increasing?

What do current usage trends tell us about existing security gaps, and how should those weaknesses ...

Authentication Best Practices: Put Control Where It Belongs [ Source: SafeNet ]

January 2015- A significant number of high profile security breaches have occurred recently, bringing the organizations affected to the front pages of the business press. These events have had a negative impact on the public image of these companies, and may also have had a negative impact on their business. Due to these incidents, CIOs of many organizations have had to re-evaluate their info-security strategy in general, while also placing specific focus on their user authentication and ...

Secure the Breach Manifesto [ Source: SafeNet ]

January 2015- As hackers continue to successfully conduct large-scale attacks against financial services, retail and entertainment companies, organizations must rethink their security strategy. No longer are network firewalls and other perimeter “breach-prevention” technologies good enough. Many enterprises today rely on these technologies as the foundation for their data security strategy and unfortunately there is no fool-proof way to prevent a breach from occurring. This paper outlines SafeNet’s 3 step approach to help your company accept the ...

Master Mobile By Focusing on Productivity [ Source: Box ]

November 2014- View this infographic and learn how more enterprises are applying mobile to core processes, making customer support, sales operations, and everyday tasks more effective. By mastering mobility, IT teams play a key role in boosting productivity, efficiency, and ROI across the business.

Empowering Your Mobile Workers - 4 Criteria for Secure Collaboration [ Source: Box ]

November 2014- Download this whitepaper to learn how to build a mature mobile strategy and the top 4 criteria for secure collaboration. Today's most productive employees are not tied to a desk, an office, or a location. These top producers are experts at finding new tools, new apps, and new ways to integrate mobile devices into their daily workflow. Your challenge is to build an IT strategy and architecture that can support this new way of working with ...

Security Without Sacrificing Performance [ Source: SanDisk ]

October 2014- As our ability to work remotely expands, so does the risk that untethered computing equipment and information might inadvertently be lost or fall into the wrong hands. However, countermeasure solutions to secure data and devices, such as encryption software, can either be cumbersome or result in actual performance slowdown. The good news is that companies can benefit from the best of both worlds with self-encrypting solid state technologies.

Make remote vendor access more secure [ Source: ObserveIT ]

July 2014- The threat of user-based attacks has never been higher, with 76% of all breaches coming from accounts with access to sensitive data. With the exploitation of remote vendor access a huge concern, learn how to make working with your contractors more secure with this free e-Book from ObserveIT.

Security incident response plan that actually works [ Source: IBM ]

October 2014- This brief offers a look at the top ten mistakes security organizations make with their Computer Security Incident Response Plans.

Before the breach [ Source: IBM ]

October 2014- Threat intelligence uses the symptoms of an attack to foster an understanding of who the attackers are and what their motives and capabilities may be--offering the insight necessary to develop a proactive stance and thwart attackers.

Gaining the upper hand in today's cyber security battle [ Source: IBM ]

October 2014- Threat intelligence uses the symptoms of an attack to foster an understanding of who the attackers are and what their motives and capabilities may be--offering the insight necessary to develop a proactive stance and thwart attackers.

eGuide to Advanced Threat Hunting [ Source: Bit9 ]

October 2014- With the number of advanced attacks increasing every day—most undiscovered through traditional detection and response solutions—truly hunting for threats within your environment can be a laborious task. To combat this, enterprises must focus on prioritizing endpoint data collection over detection, leveraging comprehensive threat intelligence, and expanding detection beyond the moment of compromise.

To combat this, enterprises must focus on:

2014 Cost of Cyber Crime study: United States [ Source: HP ]

October 2014- For the fifth year running, the United States led the world in number and cost of cyber attacks. The Ponemon Institute surveyed 59 U.S. companies, performing 544 individual interviews to assess their experience with cyber crime. The mean annualized cost for the U.S. companies surveyed was $12.7 million—up 9.3 percent from last year. There is good news, though. A strong security posture and deployment of security intelligence systems drives down the cost for many companies. ...

Extend Compliance And Risk Management To What Really Matters For Your Business [ Source: Absolute Software ]

September 2014- While governance, risk management, and compliance (GRC) programs have matured well over time, this maturity has come mostly in response to new and changing regulations, which has resulted in programs that are narrowly focused on protecting employees, investors, consumers, and other stakeholders - not on protecting the business itself. Companies rarely fail because of poor financial controls, but they fail frequently due to their inability to understand and address disruptive technologies, market fluctuations, changing customer ...

Vendor Landscape: Endpoint Protection [ Source: Trend Micro ]

September 2014- Info-Tech Champions receive high scores for most evaluation criteria and offer excellent value. They have a strong market presence and are usually the trend setters for the industry.
See how Trend Micro Smart Protection for Endpoints measured up against today’s requirements:

- Protection for data on the move
- Interfaces that are highly interactive
- Expanded platform integration
- Backed by a strong vendor

The True State of Open Source Security [ Source: Sonatype ]

August 2014- The 4th annual Open Source Development Survey has been analyzed, sliced and diced and now incorporated into a compelling infographic. See what 3300+ participants told us about the state of open source development, policies, license management, security processes, breaches and more. Learn 4 easy steps you can take to start securing your open source development practices today.

Old Techniques, New Channel: Mobile Malware Adapting PC Threat Techniques [ Source: IBM ]

August 2014- With the rise of mobile usage and increased mobile banking functionality, cybercriminals are targeting the mobile channel with advanced malware, cross channel attacks across online and mobile and social engineering that have typically been seen on the PC.

White Book : Cloud Security - The Definitive Guide to Managing Risk in the New ICT Landscape [ Source: Fujitsu America Inc. ]

June 2014- Cloud computing is demonstrating its potential to transform the way IT-based services are delivered to organizations, the journey to cloud is no longer question of "if" but rather "when", and a large number of enterprises have already travelled some way down this path.

However, there is one overwhelming question that is still causing many CIOs and their colleagues to delay their move to cloud: Is cloud computing secure? As many unwary businesses have ...

Privileged Accounts and Passwords: Risk Management in Civilian Agencies [ Source: Dell Software ]

June 2014- Learn how IT solutions can be used to mitigate risk by reducing requirements and implementing tighter controls on privileged accounts.

Next 25