Sort results by: Published date | Company name
Showing items 1-25

Beyond Whois: How Extended Domain Profiles Can Yield Unexpected Insights [ Source: DomainTools ]

November 2014- Every investigation has a starting point. A basic Whois query takes just a few seconds but can quickly provide the foundation for a successful investigation However, it's often the data that does NOT reside in a Whois record that can be truly illuminating. Like a CarFax report that goes beyond the vehicle title, there is a wealth of knowledge captured in other public data that can be invaluable to an investigator when leveraged appropriately. This ...

Email security in small and medium-sized businesses [ Source: ControlNow ]

April 2015- Nowadays, organizations can't afford to operate without an email security strategy. The threat landscape is constantly changing with new threats appearing every day. This white paper looks at email security in small and medium businesses (SMBs), the solutions available and what features SMBs cannot do without.

How to Mitigate the Risks of Insider Threats [ Source: Digital Guardian ]

November 2014- Insider threats with potential to steal valuable intellectual property (IP) and data can cause significant damage to any organization. Dan Geer elaborates on how you can mitigate the security risk.

SecureAuth IdP Device Fingerprinting [ Source: SecureAuth ]

March 2015- Laptops, and now the plethora of mobile devices -- has left enterprises scrambling to properly control access to their resources. SecureAuth IdP's device fingerprinting delivers the flexibility, security, and convenience required to increase layers of authentication without creating high friction for users. Read on to learn more.

Top-Down Security and the Security Life Cycle [ Source: Solutionary ]

December 2014- Security is a necessary component in the corporate digital infrastructure. Unfortunately, rallying support behind security initiatives is often easier said than done. By improving mutual understanding of management and analyst perspectives, IT security professionals and non-technical managers can define a smoother process to develop and improve the organization's security infrastructure.

IDC - Dynamic User Authentication: Smarter Security to Protect User Authentication [ Source: SecureAuth ]

January 2015- Pete Lindstrom, Research Director, Security Products at IDC explores the emerging trends in technology, authentication and the threat landscape that are driving a need for stronger user access control. He then takes a look at the recently released SecureAuth IdP v8.0 and how it solves these emerging authentication challenges.

Securing the Mobile App Market [ Source: Symantec ]

January 2015- The explosive growth of the mobile apps market presents a tremendous opportunity for software developers and cybercriminals alike. Infected apps are not only a threat to mobile device users, but also to network and platform providers, device manufacturers, and the reputation of the industry as a whole. Fortunately, developers can protect their code - and their customers - with a straightforward and easy-to-manage technology: code signing certificates. This white paper details the rise of mobile ...

Protect Your Brand Against Today's Malware Threats with Code Signing [ Source: Symantec ]

January 2015- The malware threat and resulting lack of confidence on the part of online users puts software developers and other companies that rely on software downloads at risk. Code signing is an industry-recommended and widely-used defense against tampering, corruption, or malware infection in software code, armed with a powerful method to both identify code and assure the identity of the code signer. This white paper discusses the malware threat, the potential impact on your business, and ...

Group Encryption Whitepaper [ Source: Certes ]

December 2014- Protecting data in motion has become a high priority for a growing number of companies. As more companies face the real and growing threat of data theft, along with increased regulatory pressure to protect their data, encryption of data in motion has gone from a "nice to have" technology to a critical budgeted project. However, companies that have deployed IPsec VPNs across their network have discovered that while encryption is a great mode of data ...

The CryptoFlow Manifesto [ Source: Certes ]

December 2014- Over half a billion data records have been stolen from enterprises and governments around the world in the last 12 months. And those are just the data breaches we know about.

In every one of the high-profile documented data breaches, the hackers took advantage of poorly protected networked applications to steal sensitive information.

They bypassed firewalls. They hopped network segmentation controls. They implanted malware that sent data to unauthorized locations. They exploited ...

Signature-less Malware Detection: Finding an Evil in the Haystack [ Source: RSA, The Security Division of EMC ]

November 2014- Learn about the tools, technologies and techniques required for comprehensive detection and remediation of advanced malware threats and why traditional signature-based approaches fall short of protecting your organization.

Single Sign-On: with Passwords, Less is More [ Source: NetIQ ]

September 2014- Your workforce is using more applications from a wider variety of sources than ever. This causes security issues as users forget passwords, share them or write them down. Single sign-on (SSO) is a quick way to solve this problem. Now is the perfect time to implement SSO. This paper will explain SSO options and questions you should ask to determine the right solution for you. Security and productivity are both at stake: put SSO to ...

Mobile and Remote Access: Balancing Productivity and Security in a BYOD World [ Source: NetIQ ]

September 2014- In today's BYOD world, securing access and maintaining productivity is challenging; users want access from their own devices, and the applications, data and services they're accessing aren't inside the perimeter. But even in this environment, you can secure access. Read this paper to learn how you can implement access controls that keep up with the modern world. Get advice on how to take stock of your environment, leverage your current investments and keep your access ...

Is Your Identity and Access Governance Program Vulnerable to Risk? [ Source: NetIQ ]

September 2014- Many organizations implement identity and access governance (IAG) as a quick-fix to appease auditors and avoid fines. Such an ad-hoc approach can lead to poorly managed access, which in turn can create big security issues. Instead, a proactive IAG program that answers the question: "Who has access to what, and is it appropriate?" not only appeases auditors, it pleases the CIO by helping to prevent risk from insider attacks. Read this white paper to learn ...

Managing the Consumerization of IT [ Source: NetIQ ]

May 2014-

Users seem determined to embrace BYOD even if the IT department doesn't. Yet IT admins know that with mobile devices comes a host of security complications. Some of the most common solutions are very unpopular with users, who aren't willing to give IT control of their personal devices.


It doesn't have to be this way. There are solutions that will let IT have more of the security you need while giving ...

Contractor Access: Mitigating Security and Risk Issues [ Source: NetIQ ]

May 2014- Contractors are becoming a much larger part of modern business. But most organizations struggle to grant them the right access, and failing to do so can lead to serious security breaches. It's time to find something that will work with your environment--even when contractors are a part of it. This paper explains how you can rethink your identity and access provisioning for better security across the organization. You don't have to live with the risk ...

Managing Risk in an AD Integrated Virtualized Environment [ Source: Dell Software ]

November 2014- The ubiquity of Active Directory (AD), the rapid adoption of virtualization and the tight integration between these technologies has given rise to today's modern AD virtualized infrastructure. Read this helpful report to explore the interdependent and combined security issues between AD and virtualization. Plus, learn how to identify and manage these risks.

Security Evolves and Criminals Follow [ Source: Authentify ]

May 2014- This paper discusses the role of out-of-band authentication in battling e-crime.

Innovative Authentication Workflows for Protecting Online Accounts [ Source: Authentify ]

June 2014- Strengthening online services and protecting funds requires stronger techniques to thwart the wrong user armed with all the right information. Read this paper to learn more.

Rapidly Respond to Advanced Attacks in Motion eGuide [ Source: Bit9 ]

October 2014- Traditional incident response (IR) processes are being overwhelmed. The increased volume of attacks has caused the number of alerts from detection devices to balloon dramatically. Organizations try to apply traditional incident response processes and procedures for each alert, but discover those procedures are insufficient for continuous application at an enterprise scale.

2014 Cost of Cyber Crime study: Global [ Source: HP ]

October 2014- Ponemon Institute has completed its fifth year studying the cost of cyber crime to businesses around the world. The 2014 Cost of Cyber Crime study taps the collective experience of 257 organizations in seven countries. It shows that cyber crime and its associated cost to businesses continue to rise. But there is good news, too. Security defenses and a strong security posture help drive down the losses.

Separate reports exist for each country, and this ...

eBook: Securing Business Information in the Cloud [ Source: Box ]

September 2014- For security and IT pros concerned with protecting sensitive information across multiple endpoints and applications. Explore how cloud can enable us to go back to basics of security to address the challenges of distributed computing and make our organizations more secure.

Endpoint Security Trends [ Source: Absolute Software ]

September 2014- This report outlines Forrester's take on the endpoint security trends seen from Q2 2013 to Q4 2014, looking at IT spend, and the adoption of Endpoint Security Software-As-A-Service. Forrester provides data for organizations to benchmark their spending patterns against their peers, and strategize their endpoint security adoption decisions.

Guide to Data Security [ Source: DLT / Symantec ]

September 2014- Protecting the government's data is an all-consuming, top priority. As the federal government's data growth continues to spiral, and as the types of data threats and leakage change, data and storage managers have no choice but to be on the front lines of protecting their agencies' data. That means first building a solid data storage and management foundation – one that ensures that all data is accounted for at all times and that it's continually backed ...

Seven Steps to Creating an Effective Computer Security Incident Response Team [ Source: Absolute Software ]

September 2014- Chief information security officers (CISOs) and other key security decision makers should follow a phased approach in developing and maintaining a CSIRT that will identify, contain, escalate, investigate and remediate incidents in a timely and efficient manner. Read Gartner's report on how a phased approach to the creation of the team will ensure optimal effectiveness.

Next 25