Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...


Targeting Events That Matter: The Next Generation of SIEM

by SecureAuthSep 04, 2015

Today’s IT security organizations are not only fighting cyber attackers – they are fighting a deluge of information from their own systems. Security logs, threat intelligence feeds, cyber forensics tools – all of these emerging systems are creating such a morass of information that many enterprises – including Target – are missing key data that may indicate a major data breach. The result: the bad guys continue to get through and wreak havoc, unfettered. For many

Measuring Cyber Risk Through Security Data Analysis

by Bay DynamicsSep 03, 2015

No matter what the industry, most CEOs have the same question about cyber security: How safe is our data?? Yet measuring IT security risk remains a difficult and elusive task, because there are so many technologies and variables involved. In this unique webcast, editors at Dark Reading will join top IT security experts to discuss ways that your organization can mine and harvest security data to provide a clearer picture on the cyber risk faced by your organization. You’ll get insight on

“Businesses @ Work” Report Revealed: How Enterprises Use (and Secure) Cloud and Mobile

by OktaSep 02, 2015

Join this webinar and hear about the results of a recent “Business @ Work” study conducted by Okta, the leading identity and mobility management company.? This webinar will discuss how the report was compiled and review the key findings, which include leading enterprise applications, mobile adoption by industry and region, and how organizations are leveraging certain security features. Attend and learn how: Traditional enterprise apps are being ousted by disruptive competition Your

Protecting Your Organization from Insider Threats

by Lockheed MartinSep 01, 2015

When it comes to sensitive data, your employees may be sharing more than you think. Information that falls into the wrong hands - whether unintentional or with malicious intent, can cause significant harm to a company. Implementing and enforcing some proactive measures can dramatically reduce the threat of sensitive data walking out the door.

This white paper discusses: Current risk factors - How sensitive data can fall into the wrong hands What you stand to lose from insider

Improving Cyber Security Through Next-Generation Network Defenses

by LancopeSep 01, 2015

Enterprises continue to struggle with the many options available for endpoint and application security. But for many attackers, the first goal isn’t a device or an app – it’s your corporate network. The network is the entry point that allows a criminal to move laterally through your enterprise – and access any data, regardless of the hardware involved. Attacks on the enterprise network are becoming increasingly sophisticated – and a new generation of tools and

Gartner Magic Quadrant for Secure Email Gateways, 2015

by ProofpointSep 02, 2015

As advanced threats increase in frequency and sophistication, it's never been more important to secure your organization's email, by far the number one threat vector. Named a Leader in the Gartner Magic Quadrant for Secure Email Gateways, Proofpoint uniquely combines a world class email gateway solution with the industry's leading Targeted Attack Protection technology, catching and stopping cyberthreats from malicious links and attachments hours or even days before traditional defenses.

The Cybercrime Economics of Malicious Macros

by ProofpointSep 02, 2015

Attack techniques come and go as technology and user behaviors change and defenses adapt to new threats — and sometimes take their eye off old ones — and the return of malicious macros offers an opportunity to examine and understand the drivers behind these adaptations, an exercise that is equal parts business case and technical analysis.

Our new report, "The Cybercrime Economics of Malicious Macros," examines the technical and business characteristics of malicious macros to

The Human Factor 2015

by ProofpointApr 23, 2015

Most advanced attacks rely as much on exploiting human flaws as on exploiting system flaws. Proofpoint developed this report, The Human Factor, to explore this under-reported aspect of enterprise threats using data gathered from the Proofpoint Targeted Attack Protection product deployed in customer environments, tracking threats in email attachments, social media posts, and URLs.

This paper uses original field research to provide insight on who is clicking, and what they are clicking

Application Security Webinar Series

by Rogue Wave SoftwareAug 28, 2015

In this three-part series you will hear from security experts as they address:

• How to ensure your code is bulletproof
• How to ensure your processes are secure
• Questions from your peers on how to best manage your application security.

Five Threat Intelligence Traps to Avoid

by SymantecAug 24, 2015

Recent high-profile data breaches impacting organizations in all industries including retailers, health care organizations and government agencies have shown just how challenging today's cyberthreat landscape has become. Fortunately, threat intelligence, the act of collecting and interpreting threat information from various data sources to identify adversaries and their tools, tactics, and procedures, is available to help enterprises stay ahead of emerging threats. Learn how to use threat and


Bay Dynamics

Headquarters: San Francisco

Bay Dynamics is the market leader in cyber risk predictive analytics providing actionable visibility into organizations' cybersecurity blind spots, complete with business risks and threats. The company's purpose--built Risk Fabric platform assembles and correlates relevant data from existing tools in a novel patented way to provide actionable cyber risk insights, before it's too late. Bay Dynamics enables some of the world's largest organizations to understand the state of their cybersecurity posture, including contextual awareness of what their insiders and vendors are doing, which is key to effective cyber risk management. For more information, please visit www.baydynamics.com.

Contact Us


Proofpoint Inc. (NASDAQ:PFPT) is a leading security-as-a-service provider that focuses on cloud-based solutions for threat protection, compliance, archiving & governance and secure communications. Organizations around the world depend on Proofpoint's expertise, patented technologies and on-demand delivery system to protect against phishing, malware and spam, safeguard privacy, encrypt sensitive information, and archive and govern messages and critical enterprise information.

Rogue Wave Software

Rogue Wave Software, Inc. is the leading provider of enterprise class C++ components and infrastructure that enable organizations to build and deploy high performance applications. Only Rogue Wave provides the most complete C++ technology stack including C++ components, UI components, run-time infrastructure, and services. Today, thousands of organizations worldwide have chosen Rogue Wave.


SecureAuth Corporation created the SecureAuth Identity Provide™ (IdP) , a groundbreaking solution for the borderless enterprise. SecureAuth IdP turns any enterprise into an identity provider capable of enforcing 2-Factor Access Control in a single, cost-effective solution. Fueled by the cloud and mobile phenomenon and the security requirements these disruptive computing platforms require, SecureAuth has experienced an accelerated rate of growth.


Symantec helps consumers and organizations secure and manage their information-driven world.