Security

RSS
Find network and information security news, reviews and analysis, covering data protection, privacy, endpoint security, and security management.
  • White Paper

    Gartner Positions RSA in Leaders Quadrant for Business Continuity Management

    Posted August 29, 2014 - 11:49 am

    RSA, the security division of EMC, was positioned by Gartner in the Leader's quadrant of the 2013 Magic Quadrant for Business Continuity Management Platforms based on completeness of vision and ability to execute.
  • White Paper

    The Architecture of a Solid GRC Program

    Posted August 29, 2014 - 11:49 am

    See a visual representation of the GRC framework needed within an organization to meet today's governance, risk and compliance needs, as well as how an organization should view GRC, its guiding principles and final objectives.
  • White Paper

    Breaking Through the GRC Value Ceiling

    Posted August 29, 2014 - 11:49 am

    This paper discusses the value of operational technologies while acknowledging there is a "value ceiling" for some niche tools, highlighting the opportunity to seek broader value as part of the GRC program maturity process.
  • White Paper

    5 Steps to Application-Aware Data Protection

    Posted August 29, 2014 - 11:47 am

    Application Owners need to know that they'll be able to recover their data at the application level when disaster strikes, and yesterday's solutions are simply not up to this job. It's time for modern, application-aware data protection.
  • Webcast

    Preventing Data Breaches with Data Access Governance

    Posted August 29, 2014 - 11:47 am

    Discover how a real-life data access scenario is solved. Learn how to gain a clear picture of who has access to your data and avoid the risk of a data breach.
  • White Paper

    How Access Governance Makes Data Loss Prevention Successful

    Posted August 29, 2014 - 11:47 am

    Learn how connecting a Data Loss Prevention (DLP) system to an access governance solution can enable organizations to make informed decisions within a proper access governance framework and appropriately evaluate and manage risk.
  • Webcast

    See what Security, Reliability and Efficiency looks like

    Posted August 29, 2014 - 11:47 am

    The new System x servers with Intel ® Xeon ® processors offer innovative technology, offer innovative technology with exclusive new advanced security features to provide enterprise class data protection.
  • Webcast

    The Current State of Identity and Access Management

    Posted August 29, 2014 - 11:47 am

    Organizations have realized that the traditional approach to IAM doesn't work. It's the lines of business that have the intelligence and business context to make decisions about Identity and Access Management.
  • White Paper

    Consumer Web Portals: Platforms At Significant Security Risk

    Posted August 29, 2014 - 11:46 am

    This report discusses the top business risks related to the security of consumer facing portals and the latest identity-related technologies that some organizations are already using or plan to adopt to minimize their risk.
  • White Paper

    Card-Not-Present Fraud in a Post-EMV Environment

    Posted August 29, 2014 - 11:46 am

    This analyst paper discusses the effects of card not present (CNP) fraud and best practices for for financial institutions and merchants for managing fraud risk across multiple channels including the Web, mobile and POS terminals.
  • White Paper

    Gartner Positions RSA in Leaders Quadrant for Enterprise Governance, Risk and Compliance

    Posted August 29, 2014 - 11:46 am

    RSA, the security division of EMC, was positioned by Gartner in the Leader's quadrant of the 2013 Magic Quadrant for Enterprise Governance, Risk and Compliance Platforms based on completeness of vision and ability to execute.
  • White Paper

    RSA Receives Highest Rating by Gartner in MarketScope for IT GRC

    Posted August 29, 2014 - 11:46 am

    RSA, the security division of EMC has received the highest rating of "Strong Positive" in Gartner MarketScope for IT Governance, Risk & Compliance Management (IT GRC) 2013 for the fifth consecutive time.
  • White Paper

    Best Practices to Reduce WAN Costs by up to 40%

    Posted August 29, 2014 - 11:46 am

    Download our whitepaper on best practices to reduce WAN costs while solving today's pressing IT problems.
  • White Paper

    Together at Last: BYOD and Solid Security

    Posted August 29, 2014 - 11:46 am

    Read this whitepaper to learn how you can give employees the freedom to choose their own mobile devices, while still providing rock-solid enterprise security.
  • White Paper

    Managing Exchange in a Post-PC World

    Posted August 29, 2014 - 11:46 am

    A successful mobile deployment using ActiveSync depends on giving users a reliable, stable sync experience. But if any of the many moving parts in the EAS data path fail or degrade, the experience will suffer.
  • White Paper

    10 Tips for Successful BYOD

    Posted August 29, 2014 - 11:46 am

    No longer is BYOD a disconnected project with a handful of users... In fact, it's becoming an industry standard. BYOD can deliver improved user productivity, engagement and satisfaction, not to mention cost savings.
  • White Paper

    Modern Threats Demand a New Breed of User Authentication

    Posted August 29, 2014 - 11:45 am

    Learn more!
  • White Paper

    Security and BYOE - 3 Best Practices You Need to Know

    Posted August 29, 2014 - 11:45 am

    When today's hacker and identity theft threats combine with the new challenges presented by the trend of BYOD, companies must take decisive action to deliver secure, flexible and convenient authentication to employees and their devices alike.
  • White Paper

    Best Practices for Fending off Hackers in the Cloud

    Posted August 29, 2014 - 11:45 am

    Cloud services have become massively popular, as organizations enable remote access to more and more applications stored offsite.
  • White Paper

    Think Your User Authentication is "Good Enough"? Think Again

    Posted August 29, 2014 - 11:45 am

    Recent high-profile hacks have made it clear: user names and passwords do a terrible job of protecting data. Use this step-by-step guide to avoid the common pitfalls when selecting an authentication solution.
  • White Paper

    Secure Mobility Myth Buster

    Posted August 29, 2014 - 11:45 am

    As organizations try to make sense of the Secure Mobility cacophony, they most often encounter a collection of confusing myths instead of useful information. This document reviews the more common myths and misconceptions about secure mobility.
  • White Paper

    Security? Leave it to Me! Samsung KNOX

    Posted August 29, 2014 - 11:45 am

    Learn how Samsung KNOX's multi-layered approach to mobile security protects against malicious apps, prevents attacks from one domain spreading to another domain and more.
  • White Paper

    Is your smartphone secure enough?

    Posted August 29, 2014 - 11:45 am

    Today more than 79% of businesses worldwide have experienced mobile security breaches. Meet the future of secure Android. KNOX delivers the security needed for your enterprise's Samsung devices.
  • CryptoWall held over half-a-million computers hostage, encrypted 5 billion files

    Posted August 29, 2014 - 8:24 am

    A file-encrypting ransomware program called CryptoWall infected over 600,000 computer systems in the past six months and held 5 billion files hostage, earning its creators more than US$1 million, researchers found.
  • Slideshow

    ITworld cartoons 2014: The year in geek humor (so far)

    Posted August 29, 2014 - 7:30 am

    Each week, ITworld's Phil Johnson pokes fun at the tech world's top news and newsmakers
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

SecurityWhite Papers & Webcasts

See more White Papers | Webcasts

Join today!

See more content
Ask a Question
randomness