Security


 

[do_widget id=twitter-tracker-2]

White Papers

  • 6 Things You Need to Know About Ransomware in 2024 - If you don’t think ransomware is one of the most serious criminal threats to your organization in 2024, you haven’t been paying attention. Ransomware was a $1.1 billion industry in 2023, and successful attacks inflicted brand, financial, and operational damage to nearly every type of organization, large, small, and middling. Just ask MGM Resorts, which […]
  • Tech Spending: Will We See a Rise in 2024? - After a few years of “growth at all costs” and the purchase of systems and services to accommodate such growth, the tech sector saw a slowdown in 2022 and 2023. That’s not news to anyone who makes a living building, buying, or selling technology—in other words, pretty much everyone. Recent numbers from Forrester, however, foretell […]
  • It’s Time to Get Proactive About Security - It’s a new year, which means many of us have made our New Year’s resolutions. And while our intentions are worthy—lose weight, stop smoking, eat less junk food—many times we unintentionally fall back into our familiar patterns, giving up on our resolutions because they’re too difficult, uncomfortable, or otherwise don’t fit into our lifestyle. Changing […]
  • Security Threats Continue to Weigh Heavy on Tech Buyers’ Minds - Despite best efforts, security remains a tough nut to crack for many organizations. Security spending is at an all-time high, estimated to top $76 billion worldwide in 2023, according to Statista. And yet, the bad guys continue to infiltrate networks, steal data, and hold information hostage or worse. No industry, company size, or location is […]
  • Cybersecurity and AI: Better Together? - These days, it seems as though everyone is talking about AI and its various flavors (think: ChatGPT). The number of headlines about the technology has renewed the conversations regarding its impact on everything from planning vacations to designing next-generation IT infrastructures. There’s still a lot of speculation, as AI is just now coming into its […]
  • Top 6 Dangers of not inspecting SSL Traffic - By 2016, it's estimated that 67 percent of Internet traffic will be encrypted, according to the Sandvine Global Internet Phenomena Spotlight: Encrypted Internet Traffic report, May 2015. Although encryption can be used for good—improving message confidentiality and integrity—it can also be used as a means to conceal hackers' activities.
  • SSL Encryptions: 5 Key Features to Consider - Encrypted traffic accounts for a large and growing percentage of all network traffic. While the adoption of SSL should be cause for celebration – as encryption improves confidentiality and message integrity – it also puts organizations at risk.
  • A Better Presentation Experience with Intel® Pro WIDI - Principled Technologies compared the experience of connecting a Dell Latitude™ Ultrabook system featuring the new 5th Generation Intel Core processor to an HD display with both HDMI cables and wirelessly via Intel® Pro WiDi. Read this report to find the results of the test and learn how pairing Intel® Pro WiDi with a Dell notebook on your next client refresh will foster greater security and privacy advantages over other ways of connecting.
  • Enterprises Need a Tightly Integrated and Centrally Managed Defense-in-depth Architecture - According to ESG research, 67% of cybersecurity professionals working at enterprise organizations (i.e., more than 1,000 employees) believe that the overall threat landscape is worse today than it was two years ago. 
  • Build a program identity and access management of new generation - In today's organizations that rely on data security initiatives are demanding as much scrutiny as identity and access management. Discover the four key now to move towards a more mature solution steps.
  • Protect your data and information by focusing on conten - Executives are naturally concerned that confidential and important information is leaving the business, creating potential legal, competitive and compliance issues. To regain control and prevent data loss, you must identify your sensitive data and information to stop the unfettered flow of these valuable assets.
  • Evolving to Hunt: Changing Organization Models and Metrics for Effective Incident Response - This paper examines the four stages of evolution as security organizations move from reactively responding to incidents to proactively identifying and hunting for threats. It provides a snapshot of each stage, including the size and structure of the security team, approaches to incident response (IR), team skill sets and necessary metrics.
  • DDoS Prevention Appliances Biannual Worldwide and Regional Market Share and Forecasts - DDoS prevention appliances are the first line of defense for most service providers and large enterprises around the globe looking to protect themselves from brute-force attacks on network or resource availability, and with the unprecedented number, size, and coverage of DDoS attacks since the floodgates opens in 2008, vendors who build DDoS prevention solutions have seen and continue to see a significant increase in demand.
  • The Hunted Becomes the Hunter - The ground has shifted under most enterprise IT security staff. Breaches are now capturing prime-time air across mainstream media outlets. As the world becomes more connected, it is no longer enough for enterprises to react once an alert indicates an attacker is inside the network.
  • Making a business case for fraud-prevention technology - Financial institutions need to consider a broad array of key business case components, beyond fraud loss reduction and fraud-management operating costs, when examining the business ramifications of various fraud-prevention technology approaches.
  • IBM QRadar Security Intelligence: Evidence of Value - In this report, Ponemon Institute presents findings from in-depth interviews with enterprises who switched to IBM Security QRadar from another Security Information and Event Management (SIEM) solution. 
  • IAM Buyers Guide: Select the right solution for identity and access assurance - This buyer's guide can help you select the right identity and access management solution to successfully manage and control user access within, across and between organizations. The guide outlines the most common identity and access management challenges organizations face from the perspective of CSOs, IT operations staff, line-of-business managers and enterprise architects
  • Forrester Research: Rethinking Data Discovery And Data Classification - Read this Forrester whitepaper to learn more about the critical, yet often overlooked, role that data classification and data discovery can play in reducing your organization's risk and enhancing security.
  • Fighting cybercrime with actionable insights - Cybercriminals use hacked or misrepresented information to exploit flaws in your business processes for their gain. Meanwhile, you suffer the consequences in the form of financial losses and damage to your reputation.
  • Cyber Intelligence Brochure - Securing your infrastructure, your customer interactions and protecting your data are critical to preserving your reputation and your bottom line. Many cyber attacks remain undetected for up to eight months1 and can cost an organization an average of 11 million USD2.

Archives