Security News White Papers

Universal Storage for Data Lakes: An ESG Evaluation

Security News White Papers - Thu, 12/07/2017 - 12:00am
This ESG paper challenges the de facto standard of direct-attached storage, and in it you will discover how scale-out NAS mitigates the challenges associated with data lake storage. Read on to see outlined the storage selection criteria for data lakes, which includes in-place analytics, accessibility by multiple app types, and more. Published by: Dell EMC

Ransomware: 4 Ways to Protect Data Now

Security News White Papers - Fri, 07/28/2017 - 12:00am
Ransomware is a very real threat, seemingly in the news everyday with attacks like WannaCry. Learn how to deploy a multilayered approach designed to reduce exposure to ransomware attacks, as well as to recover encrypted data more quickly and effectively. Published by: Citrix

Achieve GDPR Readiness with Secure App and Data Delivery

Security News White Papers - Fri, 07/28/2017 - 12:00am
Non-compliance to the GDPR can be a business-breaking failure with its crippling fines. Ensure your company isn't among those failing to comply. Discover how to achieve GDPR readiness and compliance by enabling IT to create a software-defined perimeter. Published by: Citrix

5 Things to Keep in Mind when Choosing Single Sign-On

Security News White Papers - Thu, 07/27/2017 - 12:00am
Many traditional single sign-on (SSO) or identity as a service (IDaaS) vendors do not have ways to provide access to network resources. Discover 5 things you should prioritize in your SSO journey. Published by: Citrix

Getting Started with Cloud IAM Services

Security News White Papers - Wed, 07/26/2017 - 12:00am
In this e-guide learn how to get started with IAM services in the cloud, as well as what you need to know about cloud IAM before implementation. Published by: OneLogin

The Top Cyber Security Trends in ANZ in 2017

Security News White Papers - Wed, 07/26/2017 - 12:00am
In this e-guide, read about Australia's plan for getting technology suppliers and service providers to decrypt encrypted messages, why threat intelligence is more than just ingesting data feeds into a security system and the risks that shadow IT can bring to organisations in Australia and New Zealand. Published by:

Privacy pros in the know aren't waiting for Brexit – they're preparing for GDPR

Security News White Papers - 18 hours 35 min ago
Privacy professionals in the UK are not standing idle while they wait for the government to clarify data protection law after Brexit, this study from the International Association of Privacy Professionals reveals. Published by:

The best endpoint security practices are evolving and essential

Security News White Papers - Mon, 07/24/2017 - 12:00am
The best endpoint security practices, like the tools and techniques to employ them, are evolving. Make sure your security arsenal is the best it can be Published by:

Focus: Disaster recovery planning and virtualisation

Security News White Papers - Mon, 07/24/2017 - 12:00am
We take a good look at how features and functionality built into popular virtualisation environments can help with disaster recovery planning, testing and execution. Published by:

Computer Weekly – 18 July 2017: Airbus secures critical infrastructure

Security News White Papers - Mon, 07/24/2017 - 12:00am
This week, Computer Weekly explores how to secure industrial control systems, which have often lagged behind the leading edge of IT security and pose serious risks to critical national infrastructure. Airbus believes that despite the vulnerabilities of individual components, industrial control systems as a whole are quite resilient. Published by:

The Top Cyber Security Trends in ASEAN in 2017

Security News White Papers - Mon, 07/24/2017 - 12:00am
For a few years now, the Association of Southeast Asian Nations (ASEAN) have called for closer collaboration among countries in the region on cyber security, given the transactional nature of cyber threats. Read more about these issues and how threat intelligence can help detect clandestine cyber activity before they turn into full-blown attacks. Published by:

CW ASEAN July 2017

Security News White Papers - Thu, 07/20/2017 - 12:00am
With cyber threats intensifying in recent years, the role of threat intelligence in anticipating and mitigating threats has become more important than ever. In this month's CW ASEAN, we explore how to make the most out of threat data feeds in an intelligence driven security strategy. Published by:

CW ANZ July 2017

Security News White Papers - Thu, 07/20/2017 - 12:00am
Australia's Cyber Security Strategy has made significant headway over the past year, but the jury is still out on its long-term impact. In this month's CW ANZ, we take a look at the progress of Australia's national cyber security blueprint and what else needs to be done to better protect Australia's interests in the global cyber security landscape. Published by:

Password Guidelines to Lower Risk

Security News White Papers - Thu, 07/20/2017 - 12:00am
Our newly-launched guide, Reduce the Risk of Password Breaches, explores what technologies and strategies can make secure password usage easier for end users and improve account protection. Inside this guide, find password guidelines to lower risk, NIST password recommendations, plus additional security methods. Published by: TechTarget

How to Create an Endpoint Protection Plan

Security News White Papers - Thu, 07/20/2017 - 12:00am
A recent TechTarget survey shows that IT and security pros are concerned about undetected threats, false alerts, and data breaches with their current endpoint protection. Explore endpoint security methods and technology options through our Endpoint Protection Planning Guide to create a protection plan that works for you. Published by: TechTarget

Beyond your company boundaries

Security News White Papers - Wed, 07/19/2017 - 12:00am
Ludo Houdenaert distils a lifetime of experience on managing performance in the IT department into this collection of interactive presentations, written especially for Computer Weekly. Published by:

European Perceptions, Preparedness and Strategies for IoT Security

Security News White Papers - Wed, 07/19/2017 - 12:00am
Research from analyst group Quocirca conducted in the UK and German-speaking regions exposes the challenges organisations face in managing and securing internet of things devices. Published by:

Mobile Security Risk Mitigation and Tips for Success

Security News White Papers - Tue, 07/18/2017 - 12:00am
Mobile is the new norm, putting mobile app security into the spotlight. In this e-guide discover a different method of approaching mobile security by focusing on data over device, as well as 12 specific tips to conquer mobile security and common problems. Published by: Blue Cedar

5 Post-Hot Patch App Ban Risks and the Value of Security Assessments

Security News White Papers - Tue, 07/18/2017 - 12:00am
Discover the value of application assessments when determining security risk, and 5 areas that need to be considered for enterprise app security in the face of Apple's decision to ban hot patches. Published by: Blue Cedar

Mobile Apps Risk: Protect without Hindering Productivity

Security News White Papers - Mon, 07/17/2017 - 12:00am
Mobile apps having a reputation for being notoriously unsecure. Discover the threat that mobile apps pose to your business, and some immediate security priorities for your enterprise to tackle when dealing with mobile apps. Published by: Blue Cedar