Security

RSS
Find network and information security news, reviews and analysis, covering data protection, privacy, endpoint security, and security management.
  • White Paper

    5 Step Guide to Social Media Security

    Posted April 2, 2014 - 11:16 am

    As businesses embrace social media, related security breaches are on the rise. Corporate Twitter hackings. Rogue employees on the company Facebook account. Executives sharing confidential info on their personal accounts.
  • White Paper

    Endpoint Buyers Guide

    Posted April 1, 2014 - 9:31 am

    We give you independent test results to answer your questions about the top endpoint vendors, including Kaspersky Lab, McAfee, Sophos, Symantec and Trend Micro.
  • White Paper

    Managing BitLocker With SafeGuard Enterprise

    Posted April 1, 2014 - 9:31 am

    This whitepaper explains how Sophos SafeGuard Enterprise secures your data wherever it's stored; and how it allows you to support diverse platforms and encryption products including BitLocker.
  • White Paper

    Mainstay ROI - Does Application Security Pay?

    Posted March 28, 2014 - 11:16 am

    Does Application Security Pay? Actually, it does! Mainstay reviewed the Software Security Assurance solutions of 17 organizations and found financial benefits as high as $2.4M from efficiency and productivity improvements.
  • White Paper

    SANS - Survey on Application Security Programs

    Posted March 28, 2014 - 11:15 am

    How do your peers secure their mobile apps? The SANS Institute surveyed 488 respondents on the state of their application security programs and practices. Download this report to learn more.
  • White Paper

    SANS - Securing Web Applications Made Simple and Scalable

    Posted March 28, 2014 - 11:15 am

    Check out this whitepaper to learn how automated security testing can provide a simple and scalable way to protect your web applications.
  • White Paper

    Know the Big Three

    Posted March 28, 2014 - 11:15 am

    How do you protect your mobile applications? Check out this whitepaper on three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
  • White Paper

    Designing a defense for mobile apps

    Posted March 28, 2014 - 11:15 am

    Mobile apps may be a threat, but they don't have to be. Download this whitepaper to review the various considerations for defending mobile applications.
  • White Paper

    Infographic: HP Global 2000 Mobile Risk Report

    Posted March 28, 2014 - 11:15 am

    Download this info-graphic for an overview of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.
  • White Paper

    HP Global 2000 Mobile Risk Report

    Posted March 28, 2014 - 11:15 am

    Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.
  • White Paper

    Is a SaaS Deployment Right for You?

    Posted March 27, 2014 - 8:00 am

    Find out the answer and as well as the other deployment options.
  • White Paper

    File Security Evolution: From 5 Years Ago to Today (with a Hint at Tomorrow)

    Posted March 26, 2014 - 6:30 pm

    This whitepaper examines the "Bring Your Own Device" (BYOD) movement, from carrying around a floppy disk to today's "cloud" services. This paper explains that employees may not be aware that their file transfer methods can cause a risk to security.
  • White Paper

    Data on the Move = Business on the Move; How Strategic Secure Managed File Transfer Adds Value and Drives Business

    Posted March 26, 2014 - 6:30 pm

    This whitepaper describes the formal and informal file-sharing methods business employees use to perform their daily functions and explains that, from sending small text documents to multi-gigabyte video files.
  • White Paper

    Fast, Secure Apps for Remote Engineers

    Posted March 25, 2014 - 12:45 pm

    Freescale Semiconductor, a global semiconductor manufacturer with 17,000 employees, needed to provide secure, "in the office" application performance for its globally distributed engineers.
  • White Paper

    Not Your Father's IPS: SANS Survey on Network Security Results

    Posted March 18, 2014 - 1:01 pm

    This study details a survey of 439 IT security and network professionals conducted by the SANS Institute. It explores use of IPS within respondents' organizations and their plans for future NGIPS. Read the results to learn more.
  • White Paper

    Why You Need a Next-Generation Firewall

    Posted March 18, 2014 - 1:01 pm

    This white paper explores the reasons for implementing next-generation (NG) firewalls and lays out a path to success for overburdened IT organizations.
  • White Paper

    HP ArcSight ESM Solution Helps Finansbank to Combat Fraud and Increase Customer Satisfaction

    Posted March 18, 2014 - 1:01 pm

    In this report, learn how one organization was able to use HP ArcSight ESM to reduce false positives by 90% and the time to resolve flagged transactions by 80%.
  • White Paper

    Integrating security with HP TippingPoint

    Posted March 17, 2014 - 2:02 pm

    This white paper discusses the components and configuration requirements to implement an Intrusion Prevention System (IPS) for CloudSystem Enterprise.
  • White Paper

    Five Cloud Security Concerns You Must Address

    Posted March 17, 2014 - 2:02 pm

    Security for the cloud era should be information centric, built in, adaptive, and proactive. How can you respond to the new threat landscape and efficiently deal with the new security dynamics?
  • White Paper

    The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting

    Posted March 13, 2014 - 2:45 pm

    This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the new standard.
  • White Paper

    Defense Throughout the Vulnerability Life Cycle

    Posted March 13, 2014 - 2:45 pm

    This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
  • White Paper

    Alert Logic for PCI DSS Compliance

    Posted March 13, 2014 - 2:45 pm

    To achieve PCI DSS compliance, you must identify and remediate all critical vulnerabilities detected during PCI scans. Threat Manager streamlines this process by providing simple, actionable reports that detail vulnerabilities and recommendations.
  • White Paper

    What organizations need to know about securing Big Data

    Posted March 12, 2014 - 10:46 am

    Learn how to protect sensitive data in DevOpstooled dynamic clusters, using cloud friendly encryption and key management. And do it all without getting locked into any one platform or cloud provider.
  • White Paper

    Achieve PCI-DSS compliance by encrypting payment data

    Posted March 12, 2014 - 10:45 am

    Learn the best practices for achieving compliance with PCIDSS. Organizations handling payment card information (PCI) can avoid costly data breaches and even claim Safe Harbor.
  • White Paper

    Achieving data security compliance with HIPAA & HITECH

    Posted March 12, 2014 - 10:45 am

    Learn the best practices for achieving compliance with HIPAA and HITECH regulations.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Join today!

See more content
Ask a Question
randomness