Sort results by: Published date | Company name
Showing items 1-25

Analysis of Cybercrime Infrastructure [ Source: Proofpoint ]

January 2015- Proofpoint security researchers have published an analysis that exposes the inner workings of a cybercrime operation targeting online banking credentials for banks in the United States and Europe. This Proofpoint research report provides a detailed and rarely seen inside view of the infrastructure, tools and techniques that enabled this cybercrime group to infect over 500,000 PCs.

Key facts from the Proofpoint analysis:
• Qbot (aka Qakbot) botnet of 500,000 infected systems sniffed “conversations&...

Gartner Magic Quadrant for Enterprise Information Archiving [ Source: Proofpoint ]

January 2015- Analyst firm Gartner, Inc. once again positions Proofpoint's cloud-based Enterprise Archiving product in the Leaders Quadrant of the new 2014 Magic Quadrant for Enterprise Information Archiving which provides a detailed overview of the Enterprise Information Archiving market.

Gartner notes that, “Archiving as a service (aka cloud archiving) has rapidly surpassed on-premises archiving as the preferred deployment model for most organizations. Gartner sees 60% to 70% of new or replacement email archiving implementations as being cloud-based.&...

Cloud Paves Way for Big Changes [ Source: VMware ]

January 2015- At the forefront of big changes at federal agencies is cloud computing, helping collaboration and enabling the analysis of big data. Although the benefits of using cloud computing are widely acknowledged, knowing what type of cloud to use is not always so clear cut. This paper examines the main cloud options and the key questions to ask before choosing a provider.

Hybrid Model Eases Path to Cloud Adoption [ Source: VMware ]

January 2015- The federal government has made a strong commitment to cloud computing and the advantages are broadly recognized -- but the process of adopting the technology has proven to be a challenge. Learn how VMware vCloud Government Service provided by Carpathia can help agencies focus on meeting their requirements instead of the underlying infrastructure, giving them peace of mind that their existing apps can run alongside new ones in a secure cloud environment.

Best Practices Guide for IT Governance & Compliance [ Source: Dell Software ]

January 2015- Federal regulations, such as the Sarbanes-Oxley (SOX), the Health Insurance Portability Accountability Act (HIPPA) and the more recent Payment Card Industry (PCI) initiative, require businesses to know exactly what changes are being made to structured and unstructured data in their corporate networks. As a result, IT organizations need to provide more detailed monitoring, analysis, auditing and reporting on the changes being made to protected data. Learn about the best practices for implementing a compliance solution ...

Managing Risk in an Active Directory Integrated Virtualized Environment [ Source: Dell Software ]

January 2015- The ubiquity of Active Directory (AD), the rapid adoption of virtualization, and the tight integration between these technologies has given rise to today's AD infrastructure. However, the security dependencies of AD-integrated virtualization aren't widely understood -- and this can lead to unmitigated risks. Read this insightful white paper to explore the interdependent and combined security issues between AD and virtualization, and find out how to manage them.

Who, What, When, Where and Why: Tracking the 5 Ws of Change in Active Directory, SharePoint, SQL Server, Exchange and VMware [ Source: Dell Software ]

January 2015- Gain a better understanding of the limitations and capabilities of native auditing tools, and see why a third-party solution might be the best approach to protect your organization's systems, data, productivity and bottom line.

The Failure of Cloud Information Governance: A Global Data Security Study [ Source: SafeNet ]

January 2015- As technology evolves, more and more organizations are moving applications and data to the cloud. Although cloud solutions can save money and improve accessibility for remote users, it can also leave your sensitive data vulnerable to new security threats. With the lack of governance policies and security practices for the transition to cloud computing, it is important to consider how this move can affect your organization’s security. Ponemon Institute conducted a survey sponsored ...

Sleeping Through the Alarm: What Breaches Should be Telling Us, and Why the Message is Missed [ Source: SafeNet ]

January 2015- Security professionals are living in a time of rapid and fundamental change. Computing and delivery models, user platforms and devices, and security threats have changed radically in recent years. However, in many ways, the security technologies and approaches employed by many organizations have remained relatively static, sometimes leading to disastrous results. To gain a picture of how organizations are contending with the changing technology and security landscape, SafeNet undertook an extensive survey.

This ...

The Current State of Encryption and Key Management: Where Security Gaps Persist - Strategies for Addressing Them [ Source: SafeNet ]

January 2015- While encryption has been employed for decades, there has never been a higher need than in today’s market with data breaches consistently littering the headlines. As more organizations adopt encryption strategies many questions are posed.

Where is encryption being employed today and why?

Where do security practitioners see encryption’s usage increasing?

What do current usage trends tell us about existing security gaps, and how should those weaknesses ...

Authentication Best Practices: Put Control Where It Belongs [ Source: SafeNet ]

January 2015- A significant number of high profile security breaches have occurred recently, bringing the organizations affected to the front pages of the business press. These events have had a negative impact on the public image of these companies, and may also have had a negative impact on their business. Due to these incidents, CIOs of many organizations have had to re-evaluate their info-security strategy in general, while also placing specific focus on their user authentication and ...

Secure the Breach Manifesto [ Source: SafeNet ]

January 2015- As hackers continue to successfully conduct large-scale attacks against financial services, retail and entertainment companies, organizations must rethink their security strategy. No longer are network firewalls and other perimeter “breach-prevention” technologies good enough. Many enterprises today rely on these technologies as the foundation for their data security strategy and unfortunately there is no fool-proof way to prevent a breach from occurring. This paper outlines SafeNet’s 3 step approach to help your company accept the ...

Threat Intelligence Defined [ Source: Solutionary ]

January 2015- The entire security industry has focused in on the newest buzzwords: Threat Intelligence. The term is so broadly used the definition of "intelligence" is sometimes lost. Some services are simply offering access to minimally analyzed (or even raw) data. Learn how to tell what "intelligence" really means and how to differentiate the offerings in this Solutionary white paper.

Top-Down Security and the Security Life Cycle [ Source: Solutionary ]

December 2014- Security is a necessary component in the corporate digital infrastructure. Unfortunately, rallying support behind security initiatives is often easier said than done. By improving mutual understanding of management and analyst perspectives, IT security professionals and non-technical managers can define a smoother process to develop and improve the organization's security infrastructure.

Malware Detection with Network Monitoring: Not Quite Enough [ Source: Solutionary ]

September 2014- When IT professionals think about information security, they often think about network intrusion detection systems (IDS) and intrusion protection systems (IPS) early in the process. Network IDS/IPS has long been a mainstay for detecting malicious activity and continues to be a very important piece of the security puzzle. Unfortunately for security professionals, that puzzle continues to evolve and becomes increasingly large and complex.

IDC - Dynamic User Authentication: Smarter Security to Protect User Authentication [ Source: SecureAuth ]

January 2015- Pete Lindstrom, Research Director, Security Products at IDC explores the emerging trends in technology, authentication and the threat landscape that are driving a need for stronger user access control. He then takes a look at the recently released SecureAuth IdP v8.0 and how it solves these emerging authentication challenges.

Device Fingerprinting - Low-Friction, BYOD Authentication [ Source: SecureAuth ]

January 2015- The explosion of user devices has left enterprises scrambling to secure access control to their resources while meeting the user expectations for a clean experience. Resolving the conundrum of adding layers of authentication without compromising ease-of-use has proven to be an elusive task for enterprises... until now. This paper will examine SecureAuth IdP's Device Fingerprinting and its numerous benefits, including more secure authentication without user friction.

Office 365 - Strong Authentication and SSO for the Cloud-based suite [ Source: SecureAuth ]

January 2015- To ensure secure access control for Office 365 organizations need to rely on more than just a username and password. In this whitepaper we discuss the requirements for achieving secure access control for Office 365. We'll explore how SecureAuth IdP can solve these many challenges with one solution that provides both two-factor authentication and single-sign on capabilities that easily integrate with your existing infrastructure and Office 365.

What is an Identity Provider (IdP) and Why Do I Need one? [ Source: SecureAuth ]

January 2015- To address today's security risks and to embrace new technology trends such as cloud, mobility and SaaS, enterprises must rethink how they handle their employees' identities. IT organizations should leverage these standards to improve their security posture by becoming an Identity Provider (IdP). This paper will discuss the reasons enterprises should become an IdP, what it involves and how automation of the IdP process can bring big benefits.

Preventing Attackers from Getting What They Want: A Case for Context-Based Authentication [ Source: SecureAuth ]

January 2015- This whitepaper explores the anatomy of an attack - how attackers gain a foothold and move laterally inside your organization to achieve their goal of stealing valuable information. Then we'll look inside the belief that preventative measures inevitably fail and how you can prepare. Next we'll look at how two-factor authentication can help - and why traditional two-factor alone may be insufficient. We'll explore a powerful strategy that can supplement two-factor authentication: context-based authentication.

Enterprise Security & the Mainframe: A Holistic Approach [ Source: CA Technologies ]

January 2015- Ten years ago security breaches were mostly widespread nuisances perpetrated by young script kiddies out for notoriety. Today, they are targeted, sophisticated, and highly damaging. Most are perpetrated by well-funded elements of organized crime, foreign governments, and terrorist groups out for money and a competitive edge. Newer advanced persistent threats (APT's) can penetrate a single victim's network and secretly remain there for months or years, stealing large volumes of valuable proprietary or private customer information.

Can Your Organization Brave the New World of Advanced Cyber Attacks? [ Source: WEBSENSE, INC. ]

January 2015- Protect your critical data from criminal intent outside your organization, as well as from insiders that may put your information assets at risk. Many security solutions are overly dependent on 'technology' alone. A critical weak link has always been the end user. Whether by accident or malicious intent, companies need to protect themselves from employees who will inevitably make profound errors of judgment. They need a solution that provides real-time feedback to educate and motivate ...

Why Your Next Generation Firewall Protection Isn't Enough [ Source: Webroot ]

November 2014- Enterprise security organizations face a daily onslaught of external attacks. According to a recent survey by IBM X-Force and Verizon's 2014 Data Breach Report, 92% of attacks being perpetrated are by outsiders. Because of this, organizations have to focus on how these attacks successfully penetrate their network perimeter security defenses. Many organizations have invested in next generation firewalls (NGFWs) to protect them from network-based attacks.

Detect and Investigate Malicious IP Activities in SIEM with Predictive Threat Intelligence [ Source: Webroot ]

October 2014- Malicious IPs are a new and growing problem for enterprises. To effectively defend against these malicious IPs, enterprises need to augment their SIEM solutions with real-time predictive threat Intelligence so they can detect attacks from unknown IPs as early as possible and respond to them before they lead to more severe incidents and costly breaches.

A Smarter Solution to Malware Prevention [ Source: Webroot ]

November 2014- Traditional endpoint security has failed to keep up with today's threats and is exposing organizations to unacceptable levels of risk. It's time for smarter, next-generation malware prevention to replace or supplement traditional defenses. New approaches to malware can wrest back control and give security administrators greater visibility and control over their endpoints at a lower cost than traditional solutions. This paper looks at the endpoint threats organizations are facing, the means to combat those threats, ...

Open Source Software -Security Risks and Best Practices [ Source: Rogue Wave Software ]

January 2015- Third-party applications, including open source software (OSS), make up an increasing proportion of enterprise applications. By some estimates, up to 80 percent of the source code in many new commercial applications is open source. It is easy to understand why. OSS allows developers to build applications faster, adding functionality without writing source code from scratch. Open source communities provide new features, shortening time to market and helping organizations gain competitive advantage.

Open source can ...

Next 25