Sort results by: Published date | Company name
Showing items 1-25

Seven Steps to Creating an Effective Computer Security Incident Response Team [ Source: Absolute Software ]

September 2014- Chief information security officers (CISOs) and other key security decision makers should follow a phased approach in developing and maintaining a CSIRT that will identify, contain, escalate, investigate and remediate incidents in a timely and efficient manner. Read Gartner's report on how a phased approach to the creation of the team will ensure optimal effectiveness.

Blue Coat SSL Visibility [ Source: Blue Coat ]

September 2014- To be secure against targeted attacks, organizations need complete visibility into the SSL traffic coming across the WAN. Discover the risks posed by the use of SSL encryption, and the products that can help you defend your business.

SANS Analyst White paper: Finding Hidden Threats by Decrypting SSL [ Source: Blue Coat ]

September 2014- This white paper describes the growing role SSL/TLS decryption plays in security, options for deploying decryption, and best practices for sharing the information generated by SSL/TLS decryption with other security monitoring systems.

Blue Coat's Encrypted Traffic Management Interactive E-Guide [ Source: Blue Coat ]

September 2014- According to Gartner, 50% of ALL network attacks will hide in SSL by 2017. SSL Encrypted traffic is pervasive and can improve security of data but it also bypasses most policy enforcement points. This is creating a significant data security, privacy and compliance risk for businesses. Get up to speed with Blue Coat's Interactive E-guide to Encrypted Traffic Management.

What you will learn:

• How Encrypted traffic is growing exponentially and how it ...

Stop Attacks Hiding Under the Cover of SSL Encryption [ Source: Blue Coat ]

September 2014- Wasn't encryption supposed to improve network security? All too often SSL is a carrier of new and successful attacks. Discover how to transform the increased risk into an effective strategy for encrypted traffic management.

Consumer Web Portals at Risk [ Source: RSA ]

September 2014- This report discusses the top business risks related to the security of consumer facing portals and the latest identity-related technologies that some organizations are already using or plan to adopt to minimize their risk.

Card-Not-Present Fraud in a Post-EMV Environment [ Source: RSA ]

September 2014- This analyst paper discusses the effects of card not present (CNP) fraud and best practices for financial institutions and merchants for managing fraud risk across multiple channels including the Web, mobile and POS terminals.

The State of Advanced Persistent Threats [ Source: IBM ]

September 2014- Enterprises are unprepared to deal with APT attacks. According to a new Ponemon Institute study, APTs are changing the threat landscape, rendering current security controls ineffective.

In Advanced Persistent Threats (APTs) and targeted attacks, attackers use a myriad of tools and techniques to breach into an organizations' network, steal sensitive information and compromise its operations. Many APTs are launched with a specific purpose such as to gather information, including financial data, PII, or ...

Building an Intelligence-Driven Security Operations Center [ Source: RSA ]

September 2014- This paper details why organizations needs to shift more security resources from preventing intrusion toward rapid threat detection and remediation, and the intelligence-driven security approach that is required to do so.

Transform Traditional Security Strategies into an Early Warning System for Advanced Threats [ Source: RSA ]

September 2014- To develop the visibility, agility and speed to deal with advanced threats, security information and event management (SIEM) systems need to evolve into a central nervous system for large-scale security analytics.

Enterprise Strategy Group Report: The Big Data Security Analytics Era is Here [ Source: RSA ]

September 2014- Big data security analytics is no longer a visionary idea -- leading enterprises recognize that their immediate security requirements demand this type of solution. Read this paper for key trends and conclusions in the big data security era.

The Seven Stages of Advance Threats [ Source: WEBSENSE, INC. ]

October 2013- Today's advanced threats occur in "kill chains" of up to seven stages. These attacks easily evade traditional filtering and anti-virus defenses to steal your organization’s valuable data.

Advanced threats can be stopped at any stage - if you deploy the proper cybersecurity solutions.

We've prepared a report to help you understand this advanced threat kill chain. You'll learn about each stage and how cybercriminals use them in their attacks. And ...

Case Study: Cadence Design Systems Finds Customer-Critical Bugs with UndoDB for Linux [ Source: Undo Software ]

September 2014- Developers of complex C++ code for memory-intensive software applications need greater insight into their code during debug. The situation intensifies when it's a customer-critical bug and the data needed can't leave the customer's site. This case study describes how Cadence Design Systems, a leading company in the electronic design automation (EDA) segment, utilized UndoDB for internal debug of complex Linux applications and collaborated to utilize UndoDB for onsite customer-critical bugs.

Hands-On Teams: Computrace Protects the Laptops of the Intelligrated Mobile Workforce [ Source: Absolute Software ]

August 2014- The Intelligrated IT Department was concerned about potential laptop theft, and needed a solution that would allow them to track and secure laptops in the field. After researching available options, they chose Absolute Computrace.

Fight Cyber Crime with Splunk, Cisco, and Red Hat [ Source: Red Hat ]

August 2014- The cost of cyber crime across the globe has already grown to $100 billion annually, not counting the intangible damage to enterprise and government security. In addition to the data loss and security breach, there is immeasurable, and sometimes irrevocable, damage to the brand.

Analyzing machine data from firewalls and perimeter devices in real time to thwart - and predict - threats is the only defense for most institutions. However, the amount of data ...

5 Steps to Application-Aware Data Protection [ Source: CommVault ]

August 2014- Many IT organizations have had the same data protection tools and practices for years, even decades, and see no need for that to change. But Application Owners need to know that they'll be able to recover their data at the application level when disaster strikes, and yesterday's solutions are simply not up to this job. It's time for modern, application-aware data protection - and here's how to get there. Learn more about how to create ...

Zen and the Art of Identity Federation [ Source: Radiant Logic ]

August 2014- Has your identity infrastructure hit choppy waters? Set Sail for stronger authentication, richer authorization, and smarter security for all your identity initiatives. RadiantOne delivers a global view of identity on top of your previous identity investments, for faster deployments, lower integration costs, and all the flexibility you need to navigate changing business requirements

Don't Drink Sour Milk: Avoidable Risks in the New World of Application Security [ Source: Sonatype ]

August 2014- There has never been a more interesting, important and challenging time to be a software security professional than right now. Applications are the new vector of attack, development is going faster than security can keep up and most source code has been replaced by open source components. Read this rant to understand more about the new landscape of modern application development. Find out what's really happening in the world of 'assembled' development and learn how ...

Enhancing Application Protection and Recovery with a Modern Approach to Snapshot Management [ Source: CommVault ]

August 2014- Massive data growth and shrinking application recovery windows are creating a huge challenge for IT administrators. Legacy backup models can't cope with multi-terabyte applications. However, by leveraging a modern approach to data protection that uses your current disk array snapshot technology, you can leave your recovery problems behind. This CommVault Business Value and Technology White Paper explains how Simpana IntelliSnap Recovery Manager can make your application recovery fast and reliable.

5 Strategies for Modern Data Protection [ Source: CommVault ]

August 2014- It's no secret that today's unprecedented data growth, datacenter consolidation and server virtualization are wreaking havoc with conventional approaches to backup and recovery. Read the five strategies for modern data protection that will not only help solve your current data management challenges but also ensure that you're poised to meet future demands.

The Human Factor: How Attacks Exploit People as the Weakest Link in Security [ Source: Proofpoint ]

August 2014- Get Insight into the ways attackers exploit end-users' psychology. Learn how attackers exploit end-users have significant security implications for enterprise preparedness and defensive strategies

Predictive Defense and Real-Time Insight: The Next Step in Advanced Threat Protection [ Source: Proofpoint ]

August 2014- As clearly evidenced by the daily headlines about security breaches, traditional defense tools are failing to protect enterprises from advanced targeted attacks and new sophisticated forms of malware. Organizations can't rely solely on traditional blocking gateways, but must invest in prevention, detection, response and predictive capabilities for complete protection.

The True State of Open Source Security [ Source: Sonatype ]

August 2014- The 4th annual Open Source Development Survey has been analyzed, sliced and diced and now incorporated into a compelling infographic. See what 3300+ participants told us about the state of open source development, policies, license management, security processes, breaches and more. Learn 4 easy steps you can take to start securing your open source development practices today.

eDiscovery Digital Investigations Solution [ Source: Symantec ]

August 2014- More Digital Investigations, More Email and Documents, but No More Time? Solve digital investigations 10 times faster! Information technology and security professionals at agencies have realized immediate and significant results using eDiscovery Digital Investigation Solution.

Why Threat Intelligence is Critical for Next-Generation Firewalls [ Source: Dell Software ]

August 2014- Few organizations evaluating a next-generation firewall take the time to look at the threat intelligence network behind it. Yet this security resource analyzes and distributes intelligence that is essential to blocking advanced malware, zero-day attacks, targeted attacks and other advanced threats.

A top-tier threat intelligence network makes a major difference between a really effective next-generation firewall (NGFW) and a mediocre one, and some vendors invest far more in this area than others. This ...

Next-Gen Security [ Source: Dell Software ]

August 2014- SSL decryption and inspection keeps attackers away from your data and out of your network. Today between 25 and 35 percent of enterprise traffic is secured using the secure sockets layer (SSL) protocol, according to NSS Labs. In some vertical industries SSL traffic comprises as much as 70 percent of network traffic. This is expected, since SSL is commonly used for everything from e-commerce to online banking. More recently, however, cybercriminals have started using SSL to hide their ...

Next 25