Published: Sat, 24 Sep 2016 13:20:09 EDT
Last Build Date: Sat, 24 Sep 2016 13:20:09 EDT
Sat, 24 Sep 2016 24:00:00 EDTIn this resource, uncover what it means to develop data management and protection policies that reach from the core of the business out to mobile devices, the cloud and beyond. Also, learn how to be ready for whatever security challenges the world sends your way. Published by: Intel Security
Fri, 16 Sep 2016 24:00:00 EDTLearn from the U.S. Department of Health and Human Services on how to know if your healthcare organization is under attack from ransomware, how to recover, and how to know if HIPAA has been violated. Published by: OpenDNS
Fri, 16 Sep 2016 24:00:00 EDTDiscover five key steps for responding to hospital ransomware attacks within this e-guide. Health IT expert Reda Chouffani will help you better understand the anatomy of ransomware and help you devise a recovery plan if ransomware should strike. Published by: OpenDNS
Thu, 15 Sep 2016 24:00:00 EDTThis Security classroom explores the latest in authentication methods and technologies. Published by: SearchSecurity.com
Wed, 31 Aug 2016 24:00:00 EDTDiscover how metadata, rich in context, can help analyze security metrics faster to enable rapid threat remediation. Learn how to enable more in-depth security analysis of traffic that is focused on the areas of concern, ultimately resulting in faster time to detection, response, and mitigation. Published by: Gigamon
Tue, 04 Aug 2015 24:00:00 EDTDiscover how to shift your security strategy from perimeter defenses towards a detect and protect frameworkm gaining greater visibility in the process. Learn how to extend the reach of your security applications everywhere on your network by giving them the right traffic at the right time. Published by: Gigamon
Tue, 31 May 2016 24:00:00 EDTThis white paper explores both old and new security best practices and how to apply them to cloud-based infrastructures. Discover how to make security as agile as the cloud itself by incorporating best practices as an integrated element of a DevOps methodology. Published by: Intel Security
Fri, 23 Sep 2016 24:00:00 EDTDiscover how agile and elastic cloud security solutions need to fundamentally scale protection and segmentation within and across cloud environments. Learn what to look for when on the prowl to protect your enterprise on any and every cloud environment you might find yourself in. Published by: Fortinet, Inc.
Fri, 23 Sep 2016 24:00:00 EDTUncover how today's enterprise data centers are evolving from static internal environments to a mix of private, public, and hybrid clouds. Learn why organizations need to augment traditional firewalls and security appliances with expanded protection for east-west traffic, both within internal networks and across clouds. Published by: Fortinet, Inc.
Fri, 23 Sep 2016 24:00:00 EDTThis article in our Royal Holloway Security series considers the duties of the police in the UK and asks whether these roles remain realistic and achievable in cyber space Published by: ComputerWeekly.com
Wed, 31 Aug 2016 24:00:00 EDTAccess this white paper to better understand the changing role of technology within the healthcare sector and best practices to integrate security without compromising the patient experience. Published by: VASCO Data Security International
Wed, 31 Dec 2014 24:00:00 ESTDiscover unified database infrastructure management that delivers comprehensive monitoring across multiple database servers, as well as will uncover performance bottlenecks. Access now to ensure database integrity with a solution that supports Oracle, IBM DB2, SQL Server, Sybase, and IBM Informix. Published by: CA Technologies
Fri, 23 Sep 2016 24:00:00 EDTThis white paper examines a modern data mobility and security strategy that incorporates both a file sync and share app along with a comprehensive endpoint data backup platform. Access now to find out why just sync and share isn't enough to stand alone and mitigate the potentially permanent loss of critical data. Published by: Code42
Thu, 22 Sep 2016 24:00:00 EDTIn an era where the cloud is considered nontraditional, securing it shouldn't be either. Learn how to segment your applications and data, centrally manage and automate security deployments, and more. Published by: Palo Alto Networks
Thu, 22 Sep 2016 24:00:00 EDTThis report illustrates the explosive growth of SaaS applications, and their role in creating significant security challenges for IT teams. Learn how CASB products can help deliver the visibility and granular control you need to protect and secure these apps. Published by: Palo Alto Networks
Wed, 21 Sep 2016 24:00:00 EDTThis e-guide helps you create a formal incident response plan that allows for effective and efficient collaboration between groups so you can mitigate threats fast. Ensure smooth containment and recovery whenever a breach occurs. Published by: Dimension Data
Wed, 16 Sep 2015 24:00:00 EDTJoin digital identity expert Chris Hickman for a review of the current state of the Internet of Things (IoT) from a security perspective and the critical role that digital identity authentication has in helping companies secure consumer-facing technology. Published by: Certified Security Solutions (CSS)
Wed, 31 Aug 2016 24:00:00 EDTThis report provides CISO team members with detailed technical and architectural guidance based on fifty specific controls that support the reduction of cyber risk. It's a practical handbook and reference guide for the cyber security professional. Published by: Digital Guardian
Thu, 22 Sep 2016 24:00:00 EDTDiscover why choosing the right cloud platform can make or break your PACS. Additionally, view the key benefits accrued from cloud PACS adoption, including the elimination of CDs, seamless cloud delivery and collaboration, reduced time-to-care delivery, and enhanced relationships with referring physicians. Published by: Ambra
Thu, 22 Sep 2016 24:00:00 EDTLearn about the key security considerations for all cloud environments, enforcing the value of agile and elastic cloud security. Discover the ingredients of a solid cloud security approach, including: scalability, underlying cloud infrastructure, micro-and internal segmentation, SIEM, and more. Published by: Fortinet, Inc.
Wed, 31 Aug 2016 24:00:00 EDTCreating meaningful threat intelligence requires specialized tools and expertise that go well beyond simple alerts and content searches. Discover hot to achieve this level of expertise within this short white paper. You'll gain a greater visibility into the deepest part of your network and better understand malware and the actors behind it. Published by: SecureWorks
Thu, 22 Sep 2016 24:00:00 EDTThe following resource features in-depth interviews with legal, technical, and regulatory subject-matter experts on the digital data privacy debate. Explore challenges and strategies global businesses must face regarding this complex, fluctuating policy environment. Published by: Hewlett Packard Enterprise
Fri, 22 Apr 2016 24:00:00 EDTThis white paper explores the 5 traits every cloud environment has to have to ensure its safety. The first three things you need to be are: scalable, to meet volume and performance demands, aware, for deep visibility of the traffic traveling your network, and actionable, in order to be able to adapt to any discovered threat. Published by: Fortinet, Inc.
Wed, 31 Aug 2016 24:00:00 EDTAccess this white paper to learn the changing role of technology within the health sector and why healthcare organizations continue to experience major data breaches. Discover best practices to help your organization integrate and adopt security without compromising the patient experience. Published by: VASCO Data Security International
Thu, 22 Sep 2016 24:00:00 EDTSaaS security concerns can no longer be ignored: Discover how to safely enable Office 365. Read on to address O365-specific security concerns, including details on how to secure O365 from malware insertion and data loss, gain visibility into SaaS usage, and more. Published by: Palo Alto Networks
Wed, 22 Jun 2016 24:00:00 EDTIn this webinar IT experts Ted Shorter and Matthew McKenna join forces to outline common enterprise challenges, risks, and best practices related to controlling digital certificates and SSH user keys. Learn how to reduce risk, meet and exceed audit requirements, and streamline disparate complex IT and security workflows. Published by: Certified Security Solutions (CSS)
Wed, 31 Aug 2016 24:00:00 EDTSIEM products are ever-changing technologies. Here's what you need to know now about security information and event management tools. Published by: SearchSecurity.com
Fri, 29 Jul 2016 24:00:00 EDTBecause high-profile data breaches have become routine, a programmatic approach to security testing and vulnerability management is clearly required. This data sheet details one group of security professionals whose goal is to help you discover vulnerabilities in your computer networks, hardware, and software applications before criminals do. Published by: IBM
Thu, 22 Sep 2016 24:00:00 EDTSee how Jefferson Radiology, a Connecticut-based innovative practice, revolutionized imaging workflows by replacing their legacy image exchange vendor and migrating to a new cloud-enabled PACS. Learn about best-in-class image management that will automate workflows and provide seamless cloud access to records. Published by: Ambra
Mon, 16 May 2016 24:00:00 EDTOutdated backup technologies and patchwork add unnecessary burdens for IT and end users, increase costs, and leave the business vulnerable to disastrous data breach and data loss. This white paper highlights the five classic fails of enterprise backup, so you can avoid these common missteps. Published by: Code42
Sun, 31 Jul 2016 24:00:00 EDTThis paper describes common problems and potential benefits of Test Data Management (TDM) in a testing and development environment. Debunk assumptions that could be holding you back from better TDM, learn why masking production data is not a simple solution, and discover a more efficient and easier TDM policy for IT. Published by: CA Technologies
Thu, 22 Sep 2016 24:00:00 EDTAs you evaluate potential CSPs, keep these security, privacy, and operational questions in mind. Explore ways to determine who has access to your data, how your data is kept private, and more. Published by: Intel Security
Wed, 21 Sep 2016 24:00:00 EDTWhen you have a hybrid environment you need to ensure security on premise and in the cloud. In these settings threats can be disguised. Get an overview of visibility, governance and privacy considerations. Published by: SecureWorks
Wed, 21 Sep 2016 24:00:00 EDTLearn how organizations have to revisit considerations for products and services already in use to protect data. Discover how they are satisfying regulatory or compliance requirements, remediating issues, preserve reputations and promoting a competitive advantage. Published by: Certified Security Solutions (CSS)
Wed, 31 Aug 2016 24:00:00 EDTUncover a guide for your questions as you get into the process of choosing the right provider to meet your specific security testing needs. Learn key considerations that must be implemented in the selection process for technical testing providers. Published by: SecureWorks
Wed, 21 Sep 2016 24:00:00 EDTDiscover how to secure unpatchable systems and software with advanced endpoint protection, defending against the most complex cyberattacks. You will learn how to prevent the exploitation of both known and zero-day vulnerabilities, as well as the execution of malware, as demonstrated by two case studies. Published by: Palo Alto Networks
Tue, 20 Sep 2016 24:00:00 EDTCan that CA be trusted? Certificate authority risks are many, but since there's no avoiding SSL and TLS, at least for now. Here's how to increase CA security. Published by: SearchSecurity.com
Wed, 21 Sep 2016 24:00:00 EDTThis short resource acknowledges that the nature of healthcare is changing. Connectivity is increasingly mandatory, but degradation of security is out of the question. Access now to see how a connected healthcare ecosystem can thrive on the cloud, despite the particular needs of the industry. Published by: CloudMine
Wed, 21 Sep 2016 24:00:00 EDTToday's hackers require less money and time than ever before to start their campaign. Learn more about how marketplace dynamics are shifting the scale of the modern attack landscape, and uncover access to a valuable resource for security professionals. Published by: Radware
Wed, 21 Sep 2016 24:00:00 EDTThe following resource lists an acronym that highlights four key areas criminals will assess in their decision to target people and companies. Learn how to avoid being a victim by getting inside the mind of a ransomware attacker. Published by: Radware
Wed, 21 Sep 2016 24:00:00 EDTThe wave of automation is forcing companies to think differently about how they structure their security resources. Learn what your peers are doing to keep the network impermeable, including employing ex-hackers, automating security models, and more. Published by: Radware
Wed, 21 Sep 2016 24:00:00 EDTTraditional antivirus (AV) is no longer the solution to preventing endpoint breaches—it's the problem. Access this resource to learn why traditional AV no longer offers meaningful security value for your organization, and see how to get started protecting your endpoints without AV. Published by: Palo Alto Networks
Wed, 21 Sep 2016 24:00:00 EDTThis research report aims to convey the challenges, threats, and opportunities that C-level security executives face when it comes to information security. Learn why the IoT is one of today's top concerns, and what organizations can do to ensure security. Published by: Radware
Wed, 21 Sep 2016 24:00:00 EDTWherein lays the path to seamless, secure medical image access? Learn how to improve patient care with a cloud imaging suite that will reduce time spent loading and viewing patient CDs. Additionally, discover how transitioning on premise CDs to the cloud for storage and retrieval will transform patient care. Published by: Ambra
Wed, 21 Sep 2016 24:00:00 EDTAs mobile applications grow to reach wider audiences, they become larger targets for cyberattackers. Access this list of 21 mobile security guidelines for developers and security pros when developing Android and iOS mobile apps. Learn how to provide security at every step of the mobile application development and management processes. Published by: Proofpoint, Inc.
Mon, 01 Aug 2016 24:00:00 EDTExpert independent testing has emerged as a critical shortlisting and decision-making tool for IT security teams. In this year's NSS Labs BDS testing, products were tested over a month-long period and subjected to more than 600 attacks. Learn what BDS provides your enterprise with the best protection. Published by: Fortinet, Inc.
Wed, 31 Aug 2016 24:00:00 EDTDiscover how to mix anti-malware capabilities with high-level visibility and behavioral based detection to eliminate endpoint threats. By arming yourself with these weapons, your organization can not only detect threat actors and their tradecraft, but also slash time of response, minimizing the damage they cause. Published by: SecureWorks
Wed, 21 Sep 2016 24:00:00 EDTDiscover how to streamline image management, reduce risk of data exposure, and eliminate barriers to siloed information across the network by cloud-enabling PACS. Learn from Carewell's case study how to streamline every aspect of the patient journey. Published by: Ambra
Tue, 20 Sep 2016 24:00:00 EDTThis white paper outlines how Public Key Infrastructure (PKI) has evolved and highlights some common PKI weaknesses of today. Access now to uncover best practices on how to identify challenges, address questions, and manage issues to reduce risk and meet audit and compliance requirements for PKI operations. Published by: Certified Security Solutions (CSS)
Tue, 20 Sep 2016 24:00:00 EDTDiscover 18 examples of how curated app stores are failing to protect enterprises from malware and dangerous apps, and cannot provide compliance or privacy protection, including: no privacy or security certification standards, the millions of consumer, data-mining apps, narrow definitions of malware, and more. Published by: Proofpoint, Inc.