Security

RSS
Find network and information security news, reviews and analysis, covering data protection, privacy, endpoint security, and security management.
  • White Paper

    Secure Your Social Organization

    Posted July 14, 2014 - 2:30 pm

    Teams throughout your enterprise are creating new social media accounts and adopting their own platforms to manage them.
  • White Paper

    5 Step Guide to Social Media Security

    Posted July 14, 2014 - 12:00 pm

    As businesses embrace social media, related security breaches are on the rise. Corporate Twitter hackings. Rogue employees on the company Facebook account. Executives sharing confidential info on their personal accounts.
  • White Paper

    The Importance of Reputation

    Posted July 14, 2014 - 11:45 am

    Proactive enterprise security involves turning data into actionable information--that's where reputation comes in.
  • White Paper

    Security in the Cloud

    Posted July 14, 2014 - 10:31 am

    The main obstacle to enterprise cloud deployment, according to a new survey of more than 350 IT executives by Unisys and IDG Research, is security. What can enterprise IT professionals do to help make their cloud deployments more secure?
  • White Paper

    A user-centric path to mobile security

    Posted July 14, 2014 - 10:31 am

    Mobile technology has revolutionized the way millions of people do their jobs. Employees now have unprecedented levels of flexibility, including the ability to work anytime from anywhere.
  • White Paper

    SBIC: Transforming Information Security

    Posted July 11, 2014 - 4:15 pm

    This report combines perspectives on technologies with experience in strategy to help security teams navigate complex decisions regarding technology deployments while maximizing investments.
  • White Paper

    Not Your Father's IPS: SANS Survey on Network Security Results

    Posted July 10, 2014 - 5:31 pm

    This study details a survey of 439 IT security and network professionals conducted by the SANS Institute. It explores use of IPS within respondents' organizations and their plans for future NGIPS. Read the results to learn more.
  • White Paper

    Why You Need a Next-Generation Firewall

    Posted July 10, 2014 - 5:31 pm

    To stay ahead of the threats, it's time for IT to embrace next-generation firewalls
  • White Paper

    Protecting Your Mid-Size Business from Today's Security Threats

    Posted July 10, 2014 - 5:31 pm

    Think you're too small to get hacked? Think again.
  • White Paper

    CSO QuickPulse IT Security: Midsize Businesses Face Enterprise

    Posted July 10, 2014 - 5:31 pm

    This survey finds that midsize firms lack understanding of vulnerabilities, and need comprehensive security tools.
  • White Paper

    10 Ways to Build a Better Big Data Security Strategy

    Posted July 10, 2014 - 5:31 pm

    This IT Manager's Journal will discuss 10 best practices you can employ in your journey down the path of securing Big Data and show how Big Data can be both a problem and a solution.
  • White Paper

    eBook: Security for a faster world

    Posted July 10, 2014 - 5:31 pm

    Business today is driven by a global economy that generates an unprecedented volume and variety of data with alarming velocity. The information in this dossier can help your security team adapt to a world that's evolving faster than ever before
  • White Paper

    HP ArcSight ESM Solution Helps Finansbank to Combat Fraud and Increase Customer Satisfaction

    Posted July 10, 2014 - 4:46 pm

    In this report, learn how one organization was able to use HP ArcSight ESM to reduce false positives by 90% and the time to resolve flagged transactions by 80%.
  • White Paper

    Fast, Secure Apps for Remote Engineers

    Posted July 10, 2014 - 1:00 pm

    Freescale Semiconductor, a global semiconductor manufacturer with 17,000 employees, needed to provide secure, "in the office" application performance for its globally distributed engineers.
  • White Paper

    The State of Video Conferencing Security

    Posted July 10, 2014 - 11:45 am

    Video conferencing equipment, found in almost every boardroom around the world, may be opening up companies to serious security breaches. This paper explains how government entities can protect themselves.
  • White Paper

    Cybersecurity Imperatives: Reinvent your Network Security

    Posted July 9, 2014 - 4:15 pm

    The Rise of CyberSecurity
  • White Paper

    Cybersecurity for Dummies eBook

    Posted July 9, 2014 - 4:15 pm

    This book provides an in-depth examination of real-world attacks and APTs, the shortcomings of legacy security solutions, the capabilities of next-generation firewalls, and security best practices
  • White Paper

    10 Things Your Next Firewall Must do

    Posted July 9, 2014 - 4:15 pm

    Next-Generation Firewalls Defined
  • White Paper

    Getting Started With a Zero Trust Approach to Network Security

    Posted July 9, 2014 - 4:15 pm

    The Traditional Approach to Network Security is Failing. View Now>>
  • White Paper

    Countering Cyber Threats By Modeling "Normal" Website Behavior

    Posted July 9, 2014 - 11:15 am

    Check out this informative technology dossier to explore the ins and outs of using big data analysis and web-user profiling to protect your company against cyber threats.
  • White Paper

    Fast, Secure Apps for Remote Engineers

    Posted July 8, 2014 - 5:00 pm

    Freescale Semiconductor, a global semiconductor manufacturer with 17,000 employees, needed to provide secure, "in the office" application performance for its globally distributed engineers.
  • White Paper

    Gartner 2013 ALM Magic Quadrant Report

    Posted July 8, 2014 - 3:45 pm

    This Gartner Group report is a must-read to gain a better understanding of the automated software quality assurance market today.
  • White Paper

    Unifying Secuirty Operations

    Posted July 8, 2014 - 3:45 pm

    Agile enterprises know that the way to quickly identify and react to threats to the business is to break down operational siloes by using collaborative processes, relationships, and shared resources.
  • White Paper

    Accellion vs Box: 5 Key Reasons Enterprises Select Accellion

    Posted July 7, 2014 - 5:16 pm

    Read this whitepaper to learn how the Accellion private cloud solution answers the need for a mobile, scalable, flexible file sharing solution that extends and reinforces enterprise security policies and controls.
  • White Paper

    Is Your Credit Card Data Safe from Hacks?

    Posted July 7, 2014 - 5:16 pm

    News of recent credit card hacks has rocked consumer confidence. Even talk of a security breach can bring on a PR firestorm. What can you do to make sure your customers and clients are protected?
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Join today!

See more content
Ask a Question
randomness