- Empowering the Workforce in a Rich Media World
- Implementing Software-Defined Security with CloudPassage Halo
- Consolidation: The Foundation for IT and Business Transformation
- Selecting a Next-Generation Firewall: Top 10 Considerations
- Five New Laws of Anti-malware Protection: Keep Up with Evolving Threats
Every week brings new stories of companies damaged by the breach of sensitive information, a problem that can be prevented by identity-centric best practices. Preventing data loss and protecting sensitive information from unauthorized access should be a top concern of every company. Although implementing strong authentication throughout your organization should be a consideration, starting with those employees who have elevated access is a good start.
Privileged users exist in every organization and they ...
September 2014- Chief information security officers (CISOs) and other key security decision makers should follow a phased approach in developing and maintaining a CSIRT that will identify, contain, escalate, investigate and remediate incidents in a timely and efficient manner. Read Gartner's report on how a phased approach to the creation of the team will ensure optimal effectiveness.
September 2014- To be secure against targeted attacks, organizations need complete visibility into the SSL traffic coming across the WAN. Discover the risks posed by the use of SSL encryption, and the products that can help you defend your business.
September 2014- This white paper describes the growing role SSL/TLS decryption plays in security, options for deploying decryption, and best practices for sharing the information generated by SSL/TLS decryption with other security monitoring systems.
According to Gartner, 50% of ALL network attacks will hide in SSL by 2017.
SSL Encrypted traffic is pervasive and can improve security of data but it also bypasses most policy enforcement points. This is creating a significant data security, privacy and compliance risk for businesses. Get up to speed with Blue Coat's Interactive E-guide to Encrypted Traffic Management.
What you will learn:
• How Encrypted traffic is growing exponentially and how it ...
September 2014- Wasn't encryption supposed to improve network security? All too often SSL is a carrier of new and successful attacks. Discover how to transform the increased risk into an effective strategy for encrypted traffic management.
September 2014- This report discusses the top business risks related to the security of consumer facing portals and the latest identity-related technologies that some organizations are already using or plan to adopt to minimize their risk.
September 2014- This analyst paper discusses the effects of card not present (CNP) fraud and best practices for financial institutions and merchants for managing fraud risk across multiple channels including the Web, mobile and POS terminals.
September 2014- This paper details why organizations needs to shift more security resources from preventing intrusion toward rapid threat detection and remediation, and the intelligence-driven security approach that is required to do so.
September 2014- To develop the visibility, agility and speed to deal with advanced threats, security information and event management (SIEM) systems need to evolve into a central nervous system for large-scale security analytics.
September 2014- Big data security analytics is no longer a visionary idea -- leading enterprises recognize that their immediate security requirements demand this type of solution. Read this paper for key trends and conclusions in the big data security era.
September 2014- Developers of complex C++ code for memory-intensive software applications need greater insight into their code during debug. The situation intensifies when it's a customer-critical bug and the data needed can't leave the customer's site. This case study describes how Cadence Design Systems, a leading company in the electronic design automation (EDA) segment, utilized UndoDB for internal debug of complex Linux applications and collaborated to utilize UndoDB for onsite customer-critical bugs.
August 2014- The Intelligrated IT Department was concerned about potential laptop theft, and needed a solution that would allow them to track and secure laptops in the field. After researching available options, they chose Absolute Computrace.
The cost of cyber crime across the globe has already grown to $100 billion
annually, not counting the intangible damage to enterprise and government
security. In addition to the data loss and security breach, there is immeasurable,
and sometimes irrevocable, damage to the brand.
Analyzing machine data from firewalls and perimeter devices in real time to thwart - and predict - threats is the only defense for most institutions. However, the amount of data ...
August 2014- Many IT organizations have had the same data protection tools and practices for years, even decades, and see no need for that to change. But Application Owners need to know that they'll be able to recover their data at the application level when disaster strikes, and yesterday's solutions are simply not up to this job. It's time for modern, application-aware data protection - and here's how to get there. Learn more about how to create ...
August 2014- CommVault's primary strategy centers on providing a single platform for backup, recovery, continuity, archive, and other data management and protection strategies. Areas of strength for CommVault include its deduplication capabilities, cloud-target integrations, hypervisor and application capabilities. Through innovative offerings and the implementation of advanced strategies, CommVault has quickly become an industry leader in a myriad of fields. Download this Forrester Research Report today to find out more about CommVault's current offering, strategy, and market presence.
March 2015- Has your identity infrastructure hit choppy waters? Set Sail for stronger authentication, richer authorization, and smarter security for all your identity initiatives. RadiantOne delivers a global view of identity on top of your previous identity investments, for faster deployments, lower integration costs, and all the flexibility you need to navigate changing business requirements
August 2014- There has never been a more interesting, important and challenging time to be a software security professional than right now. Applications are the new vector of attack, development is going faster than security can keep up and most source code has been replaced by open source components. Read this rant to understand more about the new landscape of modern application development. Find out what's really happening in the world of 'assembled' development and learn how ...
August 2014- It's no secret that today's unprecedented data growth, datacenter consolidation and server virtualization are wreaking havoc with conventional approaches to backup and recovery. Read the five strategies for modern data protection that will not only help solve your current data management challenges but also ensure that you're poised to meet future demands.
August 2014- The 4th annual Open Source Development Survey has been analyzed, sliced and diced and now incorporated into a compelling infographic. See what 3300+ participants told us about the state of open source development, policies, license management, security processes, breaches and more. Learn 4 easy steps you can take to start securing your open source development practices today.
August 2014- More Digital Investigations, More Email and Documents, but No More Time? Solve digital investigations 10 times faster! Information technology and security professionals at agencies have realized immediate and significant results using eDiscovery Digital Investigation Solution.
August 2014- The last ten years have seen a revolution in the way software is developed and delivered. Organizations have moved away from tedious custom source code programming in favor of quicker component-based approaches. However, most application security technologies are designed for source code not components. This gap leaves most application code vulnerable to security threats, licensing issues and performance defects. Understand how Component Lifecycle Management addresses this problem in refreshing new ways.
August 2014- Many organizations turn to the Open Web Application Security Project (OWASP) to help ensure that their code and applications are secure. Recently OWASP's Top Ten list of application security risks was updated to include "A9: Using components with known vulnerabilities." This means organizations need to expand their security approach to accommodate components - which are reusable blocks of code that are assembled together to create an application. These re-usable components now comprise 90% of an average ...
August 2014- Software applications need to be delivered faster and across more platforms than ever. To build high quality software in short order, we've seen a dramatic shift from source code to component-based development, with open source and third party components providing the innovation and efficiency that developers need. Unfortunately, our dependence on components is growing faster than our ability to secure them. Worse yet, components are increasingly the preferred attack surface in today's applications. The combination ...
August 2014- In a world where we hear about website and email hacks almost daily, implementing security provisions is no longer an option. Not only can phishers hurt your company and customers, but your brand can take a beating too. Find out what you should be implementing to keep your brand safe.
View All Categories
Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Data Quality, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Performance Management
Hardware : Blades, Data centers, Desktops/PCs, Grid/Cluster Computing, Handhelds/PDAs, Macintosh, Peripherals, Processors, Supercomputers, Unix/Linux servers, Utility/On-demand Computing, Virtualization Hardware, Windows Servers
Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services
Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Internet Policy, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Web Development, Social Business
Management : Career Development, Executive Insights/Interviews, H-1B, Legal, Outsourcing, Personnel Management, Recruiting, Regulation/Compliance, ROI/TCO, Salary/Compensation, Small-Medium Business, Training, Workplace Trends
Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Global Positioning Systems, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Virtual worlds
Security : Antivirus, Application Security, Attacks/Breaches, Cyberterror, Encryption, End user/Client Security, Intrusion Prevention, NAC, Perimeter Security, Privacy, Security Administration, Storage Security, Vulnerabilities and Threats
Services : Business Process Outsourcing, Business Services, Disaster Recovery, Hosted Applications, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Systems Integration, Telecom/Voice Services
Software : Integration, Application Optimization, Business Systems Management, CRM, Database Applications, Databases, Development Tools, ERP, Hosted Software/Applications, Linux, Open Source, Operating Systems, Productivity Applications, Server Virtualization, Service Oriented Architecture, Web Services