Security News White Papers

Universal Storage for Data Lakes: An ESG Evaluation

Security News White Papers - Thu, 12/07/2017 - 12:00am
This ESG paper challenges the de facto standard of direct-attached storage, and in it you will discover how scale-out NAS mitigates the challenges associated with data lake storage. Read on to see outlined the storage selection criteria for data lakes, which includes in-place analytics, accessibility by multiple app types, and more. Published by: Dell EMC

Encryption Hiding Malware in Half of Cyber Attacks

Security News White Papers - Fri, 09/29/2017 - 12:00am
A Ponemon study has revealed, malware in nearly half of cyberattacks in the past 12 months has been sneaked into organizations under the cover of encryption. Explore in more detail this expert e-guide and uncover statistics regarding encryption attacks. Published by: A10 Networks

Report: Lack of SSL Traffic Inspection Poses Threat to Enterprises

Security News White Papers - Fri, 09/29/2017 - 12:00am
Most companies fall short when it comes to SSL traffic inspection, according to Ponemon Institute. Read this e-guide to reveal an expert report that recognizes how lack of SSL traffic inspection is putting companies at risk. Published by: A10 Networks

How to Address Key SSL Security Issues and Vulnerabilities

Security News White Papers - Fri, 09/29/2017 - 12:00am
Don't compromise your website security. Explore this expert e-guide to reveal the new SSL security landscape and uncover emerging security issues within SSL technology. Published by: A10 Networks

Expert Perspectives on Data Protection and GDPR Compliance

Security News White Papers - Wed, 09/27/2017 - 12:00am
A report from World Economic Forum and McKinsey & Company estimates that cyberattacks could cost the global economy $3 trillion by 2020. Read this e-guide to reveal experts' perspectives on data protection, cybersecurity, and compliance. Published by: CyberArk Software, Inc

How Ransomware Attacks have Changed

Security News White Papers - Wed, 09/27/2017 - 12:00am
Take a look at this e-guide to uncover an expert perspective that reveals a different kind of ransomware, how ransomware has changed, and how to prevent destruction of service attacks. Published by: CyberArk Software, Inc

Managing access to keep privileged users' credentials secure

Security News White Papers - Wed, 09/27/2017 - 12:00am
Privilege creep arises in many ways, which is one reason privileged user management should top the infosec team's to-do list. Published by: SearchSecurity.com

SWIFT Security Controls to be Mandatory by 2018

Security News White Papers - Tue, 09/26/2017 - 12:00am
Take a look at this e-guide to uncover experts' perspectives about the SWIFT security control mandate with inspections and enforcement beginning January 1, 2018. Published by: CyberArk Software, Inc

Privileged Account Security

Security News White Papers - Tue, 09/26/2017 - 12:00am
55% of insider misuse is tracked to privileged account abuse, according to Verizon's Data Breach Investigations Report. Take a look at this expert e-guide to discover how to improve your security by limiting privileged accounts. Published by: CyberArk Software, Inc

Why security in DevOps is essential to software development

Security News White Papers - Tue, 09/26/2017 - 12:00am
This guide explains what DevSecOps is and how to achieve it. Don't lose any more time embedding security into your software development process. Published by: SearchSecurity.com

Guide to Early Application Testing and Understanding Dev and Ops Responsibilities

Security News White Papers - Tue, 09/26/2017 - 12:00am
Explore the importance of early application security testing. Learn from Owen Garrett, Head of Products for NGINX Inc., while he explains the security risks with containers and developing microservices. Published by: IBM

How to Think like a Hacker to Stop Application Security Threats

Security News White Papers - Tue, 09/26/2017 - 12:00am
Find out how applying the hacker mindset when setting application security standards can help uncover flaws that vulnerability scanners might not recognize. Published by: IBM

How to Increase Security for your Login on Mobile Applications

Security News White Papers - Tue, 09/26/2017 - 12:00am
In this expert e-guide, learn techniques to improve security for your mobile login information and messaging applications to help stop unauthorized users from accessing your personal data. Published by: IBM

How to Secure Mobile Applications in a Private Cloud

Security News White Papers - Tue, 09/26/2017 - 12:00am
In this expert e-guide, uncover the benefits and challenges of creating a private app store to control and monitor the delivery of properly secured mobile applications. Published by: IBM

How to Boost Mobile Application Security

Security News White Papers - Tue, 09/26/2017 - 12:00am
In this expert e-guide, discover ways to boost mobile application security by performing regular assessments to help eliminate an enterprise's vulnerability to data breaches and attacks. Published by: IBM

How to Build an Enterprise Application Security Program

Security News White Papers - 21 hours 52 min ago
In this e-guide, learn the key steps to building an enterprise application security program to decrease exposure to potential attackers through statics and dynamic application testing. Published by: IBM

Logrythm's Security Analytics Platform: Product Overview

Security News White Papers - Thu, 09/21/2017 - 12:00am
In this e-guide, expert Dan Sullivan examines LogRhythm's Security Analytics Platform, a tool that leverages big data analytics and machine learning to help protect enterprises. Learn how this platform works, as well as insights on its support, cost, and deployment. Published by: LogRhythm, Inc.

SIEM Analysis for Security Professionals

Security News White Papers - Thu, 09/21/2017 - 12:00am
This expert e-guide explores why it's important that SIEM systems have an analysis interface for security professionals, as well as how advanced security analytics can safeguard your enterprise. Published by: LogRhythm, Inc.

Single sign-on service requires a cloud-era update

Security News White Papers - Wed, 09/20/2017 - 12:00am
The best SSO for enterprise use must tackle the complexities that mobility and cloud services like identity as a service present. Published by: SearchSecurity.com

Safety Meshing: Hybrid trust models in social networks for end-to-end encryption

Security News White Papers - Wed, 09/20/2017 - 12:00am
This article in our Royal Holloway Information Security Thesis series looks at an alternative approach to end-to-end encryption. Published by: ComputerWeekly.com

Pages