Security

RSS
Find network and information security news, reviews and analysis, covering data protection, privacy, endpoint security, and security management.
  • White Paper

    Evolving Your Data Center? Evolve Your Data Center Security

    Posted August 1, 2014 - 9:46 am

    Your datacenter is evolving - your datacenter security should be evolving, too. Key security technologies and services are being adapted by leading solution providers to work across a broad range of physical & virtual datacenter deployment scenarios.
  • White Paper

    Agile Masking Transforms Data Security

    Posted August 1, 2014 - 1:00 am

    Most data masking products can create masked data copies but not distribute or update them, resulting in projects that fail to live up to expectations.
  • White Paper

    Preventing Sophisticated Attacks: Anti-Evasion & Advanced Evasion Techniques

    Posted August 1, 2014 - 1:00 am

    McAfee Next Generation Firewall applies sophisticated analysis techniques specifically to detect advanced evasion techniques (AET).
  • White Paper

    The Security Industry's Dirty Little Secret The debate over advanced evasion techniques (AETs)

    Posted August 1, 2014 - 1:00 am

    This report summarizes the findings of a McAfee commissioned research group to determine the level of understanding IT security professionals have about AETs and the defenses they have put in place to stop them.
  • White Paper

    Demand More, Get the Most from the Move to a Next-Generation Firewall

    Posted August 1, 2014 - 1:00 am

    Beyond the basics in a next generation firewall, to protect your investment you should demand other valuable features: intrusion prevention, contextual rules, advanced evasion analytics, secured access control, and high availability.
  • White Paper

    Augmented VPN

    Posted August 1, 2014 - 1:00 am

    Constantly available networks typically rely on several Internet service providers to ensure always-on connectivity and increase bandwidth. Augmented VPN aggregates all Internet Service Provider links to obtain a single high capacity tunnel.
  • White Paper

    Protect Against Advanced Evasion Techniques

    Posted August 1, 2014 - 1:00 am

    Understand the essential design principles to detect and stop advanced evasion techniques. Learn how to use multilayer traffic normalization and data stream-based inspection to prevent AET attacks.
  • White Paper

    Advanced Evasion Techniques for Dummies

    Posted August 1, 2014 - 1:00 am

    Advanced evasions will break the security protection model that most organizations are using today. Given this changing threat landscape we need to rethink traditional security models. Here's advice on how to evade AETs.
  • White Paper

    A Survival Guide for Data in the Wild

    Posted July 31, 2014 - 11:31 am

    All corporate data used to reside in the data center. Safe and sound behind the corporate firewall. But now, employees have multiple devices that they use both inside and outside of the office
  • White Paper

    Transforming Security: Designing a State-of-the-Art Extended Team

    Posted July 31, 2014 - 10:16 am

    The information security mission is no longer about implementing and operating controls.
  • White Paper

    The Big Data Security Analytics Era Is Here

    Posted July 31, 2014 - 10:16 am

    New security risks and old security challenges often overwhelm legacy security controls and analytical tools.
  • White Paper

    Building an Intelligence-Driven Security Operations Center

    Posted July 31, 2014 - 10:16 am

    The openness of today's networks and the growing sophistication of advanced threats make it almost impossible to prevent cyber attacks and intrusions.
  • White Paper

    Taking Charge of Security in a Hyperconnected World

    Posted July 31, 2014 - 10:16 am

    In today's highly interconnected business environment, information security can no longer be an isolated endeavor: it's the responsibility of an entire business ecosystem or value-chain.
  • White Paper

    The Critical Incident Response Maturity Journey

    Posted July 31, 2014 - 10:15 am

    As organizations rebalance their security defenses to combat today's sophisticated threats, they're recognizing that centralized incident response capabilities are key.
  • White Paper

    Advanced Attacks Demand New Defenses

    Posted July 31, 2014 - 9:01 am

    Cyber-criminals wielding APTs have plenty of innovative techniques to evade network and endpoint defenses. It's scary stuff, and ignorance is definitely not bliss. How to fight back? Think security that's distributed, stratified, and adaptive.
  • White Paper

    Securing Mobility, From Device to Network

    Posted July 30, 2014 - 5:46 pm

    At one time, the process of managing and securing mobile devices and applications was fairly straightforward. Most organizations worried about one application (email) on a single platform (often BlackBerry devices). Those days are long gone. ts.
  • White Paper

    Data Protection eGuide

    Posted July 30, 2014 - 11:16 am

    In this eGuide, CSO and sister publications IDG News Service, Computerworld, and CIO pull together news, trend, and how-to articles about the increasingly difficult task of protecting corporate data.
  • White Paper

    Step Out of the Bull's-Eye

    Posted July 29, 2014 - 4:45 pm

    Learn about the evolution of targeted attacks, the latest in security intelligence, and strategic steps to keep your business safe.
  • White Paper

    Where You Mitigate Heartbleed Matters

    Posted July 29, 2014 - 2:16 pm

    Read this article to learn more about why customers must choose the most strategic point in the network at which to deploy their selected mitigation.
  • White Paper

    Do More With Less: How CARFAX Consolidated Their Security Solutions

    Posted July 29, 2014 - 2:16 pm

    Through a consolidated F5 solution, CARFAX cut site downtime to zero, secures its data, and deployed a high-performance infrastructure to support its rapid growth.
  • White Paper

    Fight Malware, Malfeasance and Malingering

    Posted July 29, 2014 - 2:16 pm

    Every year brings more extreme sets of threats than the last. The good news is that there are a range of mitigation options. The question is which solution offers the greatest protection & control without adding complexity or unnecessary costs.
  • White Paper

    F5 Data Center Firewall Aces Performance Test

    Posted July 29, 2014 - 2:16 pm

    F5's BIG-IP 10200v with Advanced Firewall Manager (AFM) can handle traffic at 80-Gbps rates while screening and protecting tens of millions of connections and simultaneously load-balancing server traffic. Learn more in this whitepaper.
  • White Paper

    The DDoS Threat Spectrum

    Posted July 29, 2014 - 2:15 pm

    Bolstered by favorable economics, today's global botnets are using distributed denial-of-service (DDoS) attacks to target firewalls, web services, and applications, often simultaneously.
  • White Paper

    The Opportunities and Challenges of the Cloud

    Posted July 29, 2014 - 2:15 pm

    In this report F5 poses questions to IDC analysts, Sally Hudson and Phil Hochmuth, on behalf of F5's customers to better understand the opportunities and challenges of the cloud.
  • White Paper

    Mitigating Multiple DDoS Attack Vectors

    Posted July 29, 2014 - 2:15 pm

    It's time to rethink and refine the enterprise security architecture, so organizations can remain agile and resilient against future threats. Download this infographic to learn more.

Join today!

See more content
Ask a Question
randomness