Risk Management Research
-
Endpoint Protection & Device Management
Sponsored by: SeqriteThe endpoint security market is expected to surge to a $27 billion valuation by 2024, according to Grand View Research Inc. Inside, experts David Geer and Jack Gold dive into endpoint security head-first and reveal the latest protection strategies against exploits on devices.
-
The Security of Software Containers & Sandboxing
Sponsored by: CloudPassageSandboxes became prevalent after security pros realized malware was making its way past antivirus software and infecting networks. Inside, security expert Matthew Pascucci identifies the differences between software containers and sandboxing and dives into the security benefits within the two.
-
Defense-In-Depth Security: Key to Keeping IT Safe
Sponsored by: TechTarget SecurityThe enterprise perimeter's demise is in part due to BYOD. Leverage this expert handbook to uncover an effective approach to constructing your IT security "fortress" and replacing the outdated idea of a security perimeter.
-
How to update, automate your IR processes
Sponsored by: Booz Allen HamiltonIn the era of nonstop security threats, creating a cyber threat intelligence team and leveraging incident response (IR) tools can help with detection and automation of processes. Explore the tools and considerations for updating your IR processes.
-
Buyer's Guide: Cybersecurity
Sponsored by: Palo Alto NetworksKeeping up with new attack techniques, and effectively defending against advanced threats, is perhaps the biggest challenge facing security teams today. This Cybersecurity Buyer's Guide provides an approach for organizations to use when evaluating cybersecurity protection strategies.
-
How Can Privileged Access Accounts Be Managed in Large Companies?
Sponsored by: One IdentityAccording to a Verizon Data Breach Report, 55% of insider misuse incidents involved access abuse. Inside this e-guide, security expert Michael Cobb, dives into the risk of privileged access and reveals best practices for securing privileged access.
-
How can organizations get control over privileged identity management?
Sponsored by: One IdentityRecent research showed 72% of temporary workers and contractors are given administrative privileges on their employers' systems. Explore this expert e-guide to learn how you can improve the security of privileged access by minimizing exposure of sensitive activities and information
-
Explore the latest enterprise mobile security technology
Sponsored by: TechTarget Mobile ComputingAs cyber threats continue to evolve, mobile device management and mobile security tools need to evolve as well. This handbook offers a new approach to mobile security, which offers IT more granular control over data and devices, making it easier to weed out threats.
-
PCI Compliance with Unified Security Management
Sponsored by: AT&T CybersecurityBecause organizations are often racing to get ready for their next fast-approaching PCI audit, IT security teams struggle to meet requirements defined by PCI. Read this white paper to gain insight into PCI compliance and how your company can ensure readiness for PCI DSS 3.2.
-
5 Steps to Implement & Maintain PCI DSS Compliance
Sponsored by: AT&T CybersecurityAchieving and maintaining Payment Card Industry Data Security Standard (PCI DSS) compliance can be difficult. Explore this white paper to uncover 5 steps to take to make the compliance process easy and secure.
-
What You SIEM is What You Get
Sponsored by: AT&T CybersecurityA properly executed SIEM strategy is difficult to achieve. Explore this white paper to gain a deeper understanding of how your company can overcome SIEM challenges and implement a successful platform.
-
Threat Intelligence Evaluator's Guide
Sponsored by: AT&T CybersecurityOne of the most critical weapons that can be used in cyber defense is threat intelligence. This white paper reveals a threat intelligence guide to help you evaluate service providers, so that you can pick which is best for you in preventing, detecting, and responding to emerging threats.
-
Encryption Hiding Malware in Half of Cyber Attacks
Sponsored by: A10 NetworksA Ponemon study has revealed, malware in nearly half of cyberattacks in the past 12 months has been sneaked into organizations under the cover of encryption. Explore in more detail this expert e-guide and uncover statistics regarding encryption attacks.
-
Report: Lack of SSL Traffic Inspection Poses Threat to Enterprises
Sponsored by: A10 NetworksMost companies fall short when it comes to SSL traffic inspection, according to Ponemon Institute. Read this e-guide to reveal an expert report that recognizes how lack of SSL traffic inspection is putting companies at risk.
-
Expert Perspectives on Data Protection and GDPR Compliance
Sponsored by: CyberArkA report from World Economic Forum and McKinsey & Company estimates that cyberattacks could cost the global economy $3 trillion by 2020. Read this e-guide to reveal experts' perspectives on data protection, cybersecurity, and compliance.
-
SWIFT Security Controls to be Mandatory by 2018
Sponsored by: CyberArkTake a look at this e-guide to uncover experts' perspectives about the SWIFT security control mandate with inspections and enforcement beginning January 1, 2018.
-
Privileged Account Security
Sponsored by: CyberArk55% of insider misuse is tracked to privileged account abuse, according to Verizon's Data Breach Investigations Report. Take a look at this expert e-guide to discover how to improve your security by limiting privileged accounts.
-
How Ransomware Attacks have Changed
Sponsored by: CyberArkTake a look at this e-guide to uncover an expert perspective that reveals a different kind of ransomware, how ransomware has changed, and how to prevent destruction of service attacks.
-
Logrythm's Security Analytics Platform: Product Overview
Sponsored by: LogRhythm, Inc.In this e-guide, expert Dan Sullivan examines LogRhythm's Security Analytics Platform, a tool that leverages big data analytics and machine learning to help protect enterprises. Learn how this platform works, as well as insights on its support, cost, and deployment.
-
SIEM Analysis for Security Professionals
Sponsored by: LogRhythm, Inc.This expert e-guide explores why it's important that SIEM systems have an analysis interface for security professionals, as well as how advanced security analytics can safeguard your enterprise.
-
Why Security in DevOps is Essential to Software Development
Sponsored by: TechTarget SecurityWhat is the point of releasing new software that's loaded up with security vulnerabilities? Security is now an essential ingredient in software development. Inside this handbook, experts take a closer look at how IT professionals can fit security into their development process and how they will benefit from doing so.
-
EU GDPR Compliance Puts Focus on Data Tracking, Encryption
Sponsored by: IvantiIn this e-guide, experts explain why data tracking, encryption and other measures are crucial for GDPR compliance.
-
Risk Assessment: The Roles Vendors and Frameworks Play
Sponsored by: BitSightAssessing risk is vital to protecting your organization. Discover how to mitigate the risk that third-party vendors present to your organization with an effective, risk-driven assessment framework.
-
Third-Party Risk Management: How to Avoid the Dangers of Weak Controls
Sponsored by: ModoModoIf you know where the risk points are, you can request additional safeguards to protect the system and data access of trusted business partners. In this guide, security expert Michael Cobb, CISSP-ISSAP, explains how to avoid security risks and implement a third-party risk assessment plan.
-
Methods for Preventing Hospital Ransomware Infections and Cyberattacks
Sponsored by: Cisco UmbrellaThe threat of ransomware attacks on hospitals continues to rise and has become one of the biggest priorities for IT to prepare for and protect against. In this expert e-guide, health IT expert Reda Chouffani shares 6 top-recommended methods for preventing ransomware infections and attacks.