The hot topic in the information security industry these days is "Advanced Threat Defense" (ATD). There are many definitions, and plenty of marketing hype and spin on the topic, but it is the science - and the art - of defending yourself against sophisticated, persistent adversaries who can get past (or have already gotten past) your security defenses.
We like to define advanced threat defense in terms of the adversary rather than the ...
October 2014- The study focuses on the risk created by employees' use of insecure mobile devices and what the potential financial exposure could be for companies.
October 2014- This powerful guide gives you answers from industry-leading sources who asked organizations the questions you'd like, and need, to know.
October 2014- In a recent cross-industry study, nearly 40 percent of respondents reported having conducted between 26 to more than 500 forensic investigations over the past two years. Fifty-seven percent said they needed to "find and investigate incidents as they are occurring." However, traditional incident response is tedious, time-consuming and imperfect.
October 2014- Most organizations have not proactively prepared for a breach. In fact, a majority of incident responders (52 percent) say they lack the necessary visibility into endpoint vulnerabilities. Without continuous data collection at the endpoint, preparing and responding to a breach is exponentially hampered. Download the SANS Institute's latest industry survey to understand these key findings.
October 2014- Traditional incident response (IR) processes are being overwhelmed. The increased volume of attacks has caused the number of alerts from detection devices to balloon dramatically. Organizations try to apply traditional incident response processes and procedures for each alert, but discover those procedures are insufficient for continuous application at an enterprise scale.
September 2014- While governance, risk management, and compliance (GRC) programs have matured well over time, this maturity has come mostly in response to new and changing regulations, which has resulted in programs that are narrowly focused on protecting employees, investors, consumers, and other stakeholders - not on protecting the business itself. Companies rarely fail because of poor financial controls, but they fail frequently due to their inability to understand and address disruptive technologies, market fluctuations, changing customer ...
September 2014- This report outlines Forrester's take on the endpoint security trends seen from Q2 2013 to Q4 2014, looking at IT spend, and the adoption of Endpoint Security Software-As-A-Service. Forrester provides data for organizations to benchmark their spending patterns against their peers, and strategize their endpoint security adoption decisions.
Info-Tech Champions receive high scores for most evaluation criteria and offer excellent value. They have a strong market presence and are usually the trend setters for the industry.
See how Trend Micro Smart Protection for Endpoints measured up against todays requirements:
- Protection for data on the move
- Interfaces that are highly interactive
- Expanded platform integration
- Backed by a strong vendor
November 2014- Since the rise of the client-server model, IT has steadily moved from a centralized computing model to a highly decentralized one. This shift has dramatically accelerated in the last several years, fueled by mobility, cloud services and service-oriented platforms. This has created immense value for IT and end users, but adapting security controls and tools to a decentralized architecture has proven difficult. As a result, the modern enterprise is burdened with challenges like insecure devices ...
September 2014- Many enterprise organizations have sensitive files stored cross the enterprise using a variety of technologies and security controls. As bad as this is, environments are actually getting worse as today's complex IT architecture is expanded with cloud and mobile computing. Addressing this problem with status quo solutions won't work, so what will? ESG believes it's time for CIOs and CISOs to take a long look at centralized cloud-based content management services. New offerings provide enterprise ...
Every week brings new stories of companies damaged by the breach of sensitive information, a problem that can be prevented by identity-centric best practices. Preventing data loss and protecting sensitive information from unauthorized access should be a top concern of every company. Although implementing strong authentication throughout your organization should be a consideration, starting with those employees who have elevated access is a good start.
Privileged users exist in every organization and they ...
September 2014- Chief information security officers (CISOs) and other key security decision makers should follow a phased approach in developing and maintaining a CSIRT that will identify, contain, escalate, investigate and remediate incidents in a timely and efficient manner. Read Gartner's report on how a phased approach to the creation of the team will ensure optimal effectiveness.
September 2014- To be secure against targeted attacks, organizations need complete visibility into the SSL traffic coming across the WAN. Discover the risks posed by the use of SSL encryption, and the products that can help you defend your business.
September 2014- This white paper describes the growing role SSL/TLS decryption plays in security, options for deploying decryption, and best practices for sharing the information generated by SSL/TLS decryption with other security monitoring systems.
According to Gartner, 50% of ALL network attacks will hide in SSL by 2017.
SSL Encrypted traffic is pervasive and can improve security of data but it also bypasses most policy enforcement points. This is creating a significant data security, privacy and compliance risk for businesses. Get up to speed with Blue Coat's Interactive E-guide to Encrypted Traffic Management.
What you will learn:
• How Encrypted traffic is growing exponentially and how it ...
September 2014- Wasn't encryption supposed to improve network security? All too often SSL is a carrier of new and successful attacks. Discover how to transform the increased risk into an effective strategy for encrypted traffic management.
September 2014- This report discusses the top business risks related to the security of consumer facing portals and the latest identity-related technologies that some organizations are already using or plan to adopt to minimize their risk.
September 2014- This analyst paper discusses the effects of card not present (CNP) fraud and best practices for financial institutions and merchants for managing fraud risk across multiple channels including the Web, mobile and POS terminals.
September 2014- This paper details why organizations needs to shift more security resources from preventing intrusion toward rapid threat detection and remediation, and the intelligence-driven security approach that is required to do so.
September 2014- To develop the visibility, agility and speed to deal with advanced threats, security information and event management (SIEM) systems need to evolve into a central nervous system for large-scale security analytics.
September 2014- Big data security analytics is no longer a visionary idea -- leading enterprises recognize that their immediate security requirements demand this type of solution. Read this paper for key trends and conclusions in the big data security era.
September 2014- Developers of complex C++ code for memory-intensive software applications need greater insight into their code during debug. The situation intensifies when it's a customer-critical bug and the data needed can't leave the customer's site. This case study describes how Cadence Design Systems, a leading company in the electronic design automation (EDA) segment, utilized UndoDB for internal debug of complex Linux applications and collaborated to utilize UndoDB for onsite customer-critical bugs.
August 2014- The Intelligrated IT Department was concerned about potential laptop theft, and needed a solution that would allow them to track and secure laptops in the field. After researching available options, they chose Absolute Computrace.
The cost of cyber crime across the globe has already grown to $100 billion
annually, not counting the intangible damage to enterprise and government
security. In addition to the data loss and security breach, there is immeasurable,
and sometimes irrevocable, damage to the brand.
Analyzing machine data from firewalls and perimeter devices in real time to thwart - and predict - threats is the only defense for most institutions. However, the amount of data ...
View All Categories
Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Data Quality, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Performance Management
Hardware : Blades, Data centers, Desktops/PCs, Grid/Cluster Computing, Handhelds/PDAs, Macintosh, Peripherals, Processors, Supercomputers, Unix/Linux servers, Utility/On-demand Computing, Virtualization Hardware, Windows Servers
Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services
Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Internet Policy, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Web Development, Social Business
Management : Career Development, Executive Insights/Interviews, H-1B, Legal, Outsourcing, Personnel Management, Recruiting, Regulation/Compliance, ROI/TCO, Salary/Compensation, Small-Medium Business, Training, Workplace Trends
Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Global Positioning Systems, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Virtual worlds
Security : Antivirus, Application Security, Attacks/Breaches, Cyberterror, Encryption, End user/Client Security, Intrusion Prevention, NAC, Perimeter Security, Privacy, Security Administration, Storage Security, Vulnerabilities and Threats
Services : Business Process Outsourcing, Business Services, Disaster Recovery, Hosted Applications, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Systems Integration, Telecom/Voice Services
Software : Integration, Application Optimization, Business Systems Management, CRM, Database Applications, Databases, Development Tools, ERP, Hosted Software/Applications, Linux, Open Source, Operating Systems, Productivity Applications, Server Virtualization, Service Oriented Architecture, Web Services