UBM: TECH DIGITAL RESOURCE LIBRARY

Government

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:






Hacking Exposed - Web and Database Hacking

by VeracodeApr 20, 2015

Read this classic reference text to get into the cyberattacker's mind and understand the latest attack vectors and web application threats. Download this whitepaper to learn about web application vulnerabilities and hacking techniques; freely-available crawling tools; and countermeasures to protect your web application infrastructure.


Cybercrime 101

by Global KnowledgeJun 18, 2015

Discover the ways in which cybercrime occurs in three realms: individual, business, and governmental. Learn what you can do to protect yourself and your organization.


Special Cyber Risk Report - The State of Point-of-Sale Insecurity

by SurfWatch LabsJun 18, 2015

As payment methods evolve and more consumers adopt new technologies like mobile payments and ewallets, those avenues become relatively new and untested waters for cybercriminals to target. Find out who is at risk, why and how this may affect you with our complimentary Cyber Risk Report.


Nuance Case Study: Driving Understanding with Scalable Storage

by IBMJun 17, 2015

Read about the application of Spectrum Scale at natural language specialist Nuance: using high performance computing to provide simultaneous access to billions of files for over 12,000 employees - in a cost-efficient, scalable framework.


Forrester's Best Practices for Public Cloud Security

by Trend MicroJun 12, 2015

As companies migrate to the cloud for the agility and speed that it can provide, one thing developers often do not account for is the security of that cloud. It is up to cloud managers and IT to ensure that their public cloud deployments are secure and that the data in that cloud is protected. Forrester believes that companies must adopt a Zero Trust security approach to secure their public cloud environments. Find out what a Zero Trust Model is and how to implement it in this third


Implementing a User Activity & Behavior Monitoring Program

by SpectorSoft CorporationJun 04, 2015

Monitoring user activity & behavior has significant benefits:

1. Increased security against insider threats
2. Productivity increases
3. More efficient and effective employee investigations

Security & Risk professionals recognize the value and benefits of analyzing user behavior and monitoring user activity. At times, legal and HR staff have questions that must be addressed prior to implementation.

This document is intended to assist company


Hackers Expose Half of FT 500 Europe

by Recorded FutureJun 02, 2015

The frequency of corporate data breaches is increasing, with many of the attacks beginning when employees inadvertently disclose sensitive information. This method is commonly referred to as spear phishing.

Recorded Future analysis identified recent employee credential exposures for at least 49% of the FT 500 Europe, putting each company at risk for a cyber attack.

Download this threat intelligence report and learn: How Recorded Future identified these exposed


Is Your Datacenter Fit for Big Data?

by StackIQJun 02, 2015

IDC estimates by 2020 the digital universe will reach 44 zettabytes. Today's massive data stream is already challenging enterprise datacenters and their IT staff--new paths must be forged and capacities must be better leveraged. Are you ready?


Week to Weak: The Weaponization of Cyber Vulnerabilities

by Recorded FutureJun 01, 2015

Recorded Future research identified the short time window system administrators have before announced software vulnerabilities become a real threat to their operations.

As you'll learn in this analysis, it takes a little more than a week for an exploit leveraging a new CVE to be detected on the open web.

Download this threat intelligence report and learn: How Recorded Future determined the median number of days it takes a vulnerability to be exploited. Which products


50 Shades of Dark

by Recorded FutureJun 01, 2015

There is a lot of talk about the Dark Web these days, including how cyber criminals use it to spread malware, leak intellectual property, and publish user account credentials.

Using open source intelligence (OSINT), our team explored the Surface, Deep, and Dark parts of the Web and investigated the links between them.

Download this white paper to learn: What the Dark, Deep, and Surface Web really are and why your information security team should care. How stolen


SUBTOPICS:

Global Knowledge

Global Knowledge is the worldwide leader in IT and business training. Our core training is focused on Cisco, Microsoft, Nortel, and Project Management. Our IT courses include networking, programming, operating systems, security, and telephony. Our business courses feature project management, professional skills, and business process curriculum, including ITIL. Our more than 700 courses span foundational and specialized training and certifications.


IBM

IBM is the world's largest information technology company, with 80 years of leadership in helping clients innovate. Drawing on a breadth of capabilities and best practices from across IBM and our extensive partner ecosystem, we offer clients within every industry, a wide range of services, solutions and technologies that can help them improve productivity, respond rapidly to the needs of their business and reduce development and operations costs.


Recorded Future

We arm you with real-time threat intelligence so you can proactively defend your organization against cyber attacks. With billions of indexed facts, and more added every day, our patented Web Intelligence Engine continuously analyzes the open Web to give you unmatched insight into emerging threats. Recorded Future helps protect four of the top five companies in the world.


SpectorSoft Corporation

SpectorSoft creates solutions that protect businesses by identifying data theft, employee fraud, data breaches, and compliance violations in real-time. By monitoring and alerting on employee activity and system events, SpectorSoft solutions uniquely provide you with detailed, timely, and actionable information to lower risk, ensure compliance and increase security.

Over 36,000 global companies, from the small business to the Fortune 50 leverage SpectorSoft's visibility into digital activity. Please visit www.spectorsoft.com for more information.


StackIQ

StackIQ develops and markets a purpose-built, complete server automation platform for clustered, scale-out IT infrastructure. Our warehouse-grade automation solutions are used to build and operate distributed systems (e.g., Hadoop, NoSQL) and private clouds. Build your infrastructure quickly, run IT reliably, and manage IT easily.


SurfWatch Labs

SurfWatch Labs delivers cyber risk intelligence solutions that help organizations understand the potential for cyber-attacks, determine the impact to their business and proactively address threats head on. SurfWatch Labs was formed in 2013 by former US Government intelligence analysts to go beyond the low-level threat intelligence approach that can drown organizations in data. By aggregating and automatically analyzing vast amounts of data from a wide range of structured and unstructured sources, SurfWatch enables organizations to zero in on their unique cyber risk profile and ensure the most effective risk management strategies are identified and implemented. With SurfWatch, organizations can immediately understand and act on their cyber risk. SurfWatch Labs: Cyber In Sight. For more information, visit www.surfwatchlabs.com.


Veracode

Veracode's the only independent provider of cloud-based application intelligence and security verification services. The Veracode platform provides the fastest, most comprehensive solution to improve the security of internally developed, purchased or outsourced software applications and third-party components. By combining patented static, dynamic and manual testing, extensive eLearning capabilities, and advanced application analytics, Veracode enables scalable, policy-driven application risk management programs that help identify and eradicate numerous vulnerabilities by leveraging best-in-class technologies from vulnerability scanning to penetration testing and static code analysis. Veracode delivers unbiased proof of application security to stakeholders across the software supply chain while supporting independent audit and compliance requirements for all applications no matter how they are deployed, via the web, mobile or in the cloud. Veracode works with customers in more than 80 countries worldwide representing Global 2000 brands. For more information, visit www.veracode.com, follow on Twitter