Security

RSS
Find network and information security news, reviews and analysis, covering data protection, privacy, endpoint security, and security management.
  • White Paper

    Magic Quadrant for Intrusion Prevention Systems

    Posted September 12, 2014 - 7:31 pm

    The 2013 Gartner Magic Quadrant for Next-Generation Intrusion Prevention System (NGIPS) has been published and HP TippingPoint is in the Leaders Quadrant for the ninth consecutive year.
  • White Paper

    2013 Cyber Risk Report

    Posted September 12, 2014 - 7:31 pm

    The "Cyber risk report 2013 Executive summary" presents the major findings of HP Security Research's comprehensive dive into today's cyber vulnerability and threat landscape.
  • White Paper

    The Bot Threat

    Posted September 12, 2014 - 7:31 pm

    Download this whitepaper and learn how bots work and how, by adopting the right strategy, you can use a defense-in-depth strategy to effectively prevent direct attacks against your critical systems.
  • White Paper

    Why You Need a Next-Generation Firewall

    Posted September 12, 2014 - 7:31 pm

    To stay ahead of the threats, it's time for IT to embrace next-generation firewalls
  • White Paper

    Gartner: A New Approach to Malware Defense

    Posted September 12, 2014 - 7:30 pm

    Rather than relying on endpoint security alone, Gartner recommends businesses balance their investment across all four phases of the Gartner adaptive security architecture: predict, prevent, detect, and respond.
  • White Paper

    Defining Next-Generation Network Intrusion Reprint

    Posted September 12, 2014 - 7:30 pm

    New research from Gartner says evolving threats mandate a new approach to intrusion prevention. That's why Gartner has placed HP TippingPoint in the leaders quadrant of their Magic Quadrant for IPS nine years in a row.
  • White Paper

    Security Considerations When Undergoing a Network Refresh

    Posted September 12, 2014 - 7:30 pm

    This SlashGuide looks at the most important factors IT should keep top of mind as they plan their move to 802.11ac, higher bandwidth wired infrastructure or upgrading to switches and routers with enhanced capabilities.
  • White Paper

    A Cybercriminal's Guide to Exploiting DNS for Fun and Profit

    Posted September 12, 2014 - 10:46 am

    Stories about devastating cyberattacks are plaguing the news. Why? The DNS protocol is easy to exploit. See your network the way hackers do--as an easy target. Learn how you can effectively secure your DNS infrastructure today.
  • White Paper

    Protecting DNS Infrastructure--Inside and Out

    Posted September 12, 2014 - 10:46 am

    DNS is a key part of enterprise networks but increasingly targeted by hackers. Traditional security measures such as next-generation firewalls or secure web gateways won't shield your infrastructure from attacks. Learn how to protect your DNS today.
  • White Paper

    Creating the Best-of-Breed DDI Solution in a Microsoft Environment

    Posted September 12, 2014 - 10:46 am

    Active Directory can manage Microsoft tools; but core network services require best-in-class DNS and DHCP management utilities. Learn how Infoblox enhances Microsoft environments by improving visibility and management of DNS, DHCP and IPAM processes.
  • White Paper

    Designing a Secure DNS Architecture

    Posted September 12, 2014 - 10:45 am

    An integrated DNS architecture is needed in today's networking landscape. Designing a secure DNS architecture requires more than increased bandwidth and QPS. Learn how to build a secure and scalable DNS solution to ensure network availability.
  • White Paper

    Secunia Vulnerability Review 2014

    Posted September 12, 2014 - 9:15 am

    Learn how the primary attack vectors are shifting, why there's an increase of vulnerabilities in Windows 7, and how to be on the watch for risks in PDF readers, browsers and the top 50 software applications.
  • White Paper

    Incident Response: Six Steps for Managing Cyber Breaches

    Posted September 12, 2014 - 9:15 am

    You have been breached....now what? Here are the six essential steps to effective incident response in order to greatly increase your success in managing cyber breaches.
  • White Paper

    How 3 Cyber Threats Transform the Role of Incident Response

    Posted September 12, 2014 - 9:15 am

    Today's threats are bigger and bolder than ever before. Learn how the security and IR teams can minimize the damage of a multistage attack - or advanced persistent threat (APTs) - with cyberforensics.
  • White Paper

    SANS 2014 Survey of Endpoint Intelligence

    Posted September 12, 2014 - 9:15 am

    What's Your Endpoint IQ? SANS and Guidance Software conducted a landmark survey of nearly 1,000 security pros. We asked how they monitor, assess, protect and investigate their endpoints. Would you have answered differently?
  • White Paper

    The Total Economic Impact Of EnCase Cybersecurity For Incident Response

    Posted September 12, 2014 - 9:15 am

    A global automobile manufacturer (GAM) opened its doors, books, and data to research firm Forrester Consulting to conduct a detailed study and analysis of the net benefit the manufacturer realized from the use of EnCase Cybersecurity
  • White Paper

    Study on Big Security Data reveals business unable to harness its power to protect against threats.

    Posted September 11, 2014 - 8:03 pm

    Organizations failing to identify security breaches as they happen.
  • White Paper

    Get Proactive About Managing Security and Risk

    Posted September 11, 2014 - 8:02 pm

    Dig through Big Security Data.
  • White Paper

    Card-Not-Present Fraud in a Post-EMV Environment

    Posted September 11, 2014 - 8:02 pm

    This analyst paper discusses the effects of card not present (CNP) fraud and best practices for for financial institutions and merchants for managing fraud risk across multiple channels including the Web, mobile and POS terminals.
  • White Paper

    Consumer Web Portals: Platforms At Significant Security Risk

    Posted September 11, 2014 - 8:02 pm

    This report discusses the top business risks related to the security of consumer facing portals and the latest identity-related technologies that some organizations are already using or plan to adopt to minimize their risk.
  • White Paper

    Security Brief: Transforming Traditional Security

    Posted September 11, 2014 - 8:02 pm

    Security operations centers need advanced analytical tools that can quickly collect and shift through security data. This brief looks at the latest options and processes to speed up detection of advanced threats.
  • White Paper

    The Big Data Security Analytics Era Is Here

    Posted September 11, 2014 - 8:02 pm

    Security management must be based upon continuous monitoring and data analysis for situational awareness and data-driven security decisions. Organizations have entered the era of big data security analytics.
  • White Paper

    Transforming Information Security: Future-Proofing Processes

    Posted September 11, 2014 - 8:02 pm

    This report provides a valuable set of recommendations from 19 of the world'd leading security officers to help organizations build security strategies for today's escalating threat landscape.
  • White Paper

    How Access Governance Makes Data Loss Prevention Successful

    Posted September 11, 2014 - 8:01 pm

    Learn how connecting a Data Loss Prevention (DLP) system to an access governance solution can enable organizations to make informed decisions within a proper access governance framework and appropriately evaluate and manage risk.
  • White Paper

    The Architecture of a Solid GRC Program

    Posted September 11, 2014 - 8:01 pm

    See a visual representation of the GRC framework needed within an organization to meet today's governance, risk and compliance needs, as well as how an organization should view GRC, its guiding principles and final objectives.
Spotlight on ...
Online Training

    Upgrade your skills and earn higher pay

    Readers to share their best tips for maximizing training dollars and getting the most out self-directed learning. Here’s what they said.

     

    Learn more

SecurityWhite Papers & Webcasts

See more White Papers | Webcasts

Join today!

See more content
Ask a Question