security professionals

Results 101 - 125 of 181Sort Results By: Published Date | Title | Company Name
Published By: McAfee EMEA     Published Date: Mar 14, 2018
The General Data Protection Regulation (GDPR) will deliver a long overdue modernization and harmonization of privacy and data protection laws across the EU. It replaces legislation that was drafted before phones became smart and the cloud came to transform business. This guide will help you prepare for the GDPR. It outlines the key facts and figures, the questions organizations should ask to help assess their stage of readiness, and a comprehensive toolkit to help develop the capabilities needed to become GDPR-ready. Finally, we offer a short reference sheet covering the key information security professionals need to be prepared.
Tags : 
    
McAfee EMEA
Published By: Webroot UK     Published Date: Dec 20, 2013
The workplace technology landscape has changed dramatically over the past five years, and the security threats have changed along with it. This whitepaper will show you the growing factors that IT professionals can't afford to ignore.
Tags : 
webroot, mobile apps, mobile workers, mobile devices, accessing networks, workplace technology, security threats, infographic, mmas, mobile malware, webroot security, wireless, access control, application security
    
Webroot UK
Published By: ESET     Published Date: Feb 11, 2010
Why all the hype? Is cyberwarfare really something enterprise information security professionals should be concerned about? It's hard to know what the next cyber crisis will be, but here are a few best practices that enterprise security teams should consider to avoid becoming victims.
Tags : 
eset, cyberwarfare, threat, enterprise information security, botnet, cyberattack, malware, anti spyware, anti virus, internet security, security management, enterprise software, information management
    
ESET
Published By: Lumension     Published Date: Jan 18, 2013
News of the Flame attack has spread faster than wildfire. While the attack effected only a small number of Endpoints, Flame signifies a new level of cyber threat that all IT security professionals need to understand in-depth.
Tags : 
security, network security, network protection, data security, data protection, cyber attack, case study, encryption, hacker detection, internet security, intrusion detection, intrusion prevention, network security appliance, password management, patch management, security management, security policies, best practices, business activity monitoring
    
Lumension
Published By: NetIQ     Published Date: Dec 08, 2011
Learn more about Automating Active Directory in this informative webcast and how it enables security professionals to automate repetitive tasks.
Tags : 
automating, webcast, security, vulnerabilities, resources, productivity, access control, application security, authentication, business continuity, disaster recovery, email security, hacker detection, high availability, identity management, internet security, intrusion detection, intrusion prevention, network security appliance, policy based management
    
NetIQ
Published By: Navisite- A Time Warner Cable Company     Published Date: Aug 07, 2013
Designing and implementing an enterprise security plan can be a daunting task for any business. To help facilitate this endeavor NaviSite has developed a manageable process and checklist that can be used by enterprise security, compliance, and IT professionals as a framework for crafting a successful cloud computing security plan. It defines seven steps—sequentially—that have been tested and refined through NaviSite’s experiences helping hundreds of companies secure enterprise resources according to best practices. This plan enables organizations to gain the economic advantages of secure and compliant managed cloud services.
Tags : 
cloud, security, cloud computing, security plan, enterprise security
    
Navisite- A Time Warner Cable Company
Published By: SilverSky     Published Date: Dec 11, 2014
Forrester's 26-criteria evaluation of managed security service providers (MSSPs) included the 13 most significant vendors in the North American market that security and risk professionals can turn to for solving some of their most important security challenges. Forrester’s assessment evaluates MSS offerings based on current offering, market presence and strategy. SilverSky was named a “leader” in the report, with highest marks for delivery capabilities and services and its market presence in North America. Forrester states in the report that, “SilverSky capabilities rival those of larger companies."
Tags : 
mssps, managed security service, security challenges, security professionals, security, it management, knowledge management, enterprise applications
    
SilverSky
Published By: Cyveillance     Published Date: Apr 03, 2015
In this white paper, we recap notable trends and events in information security from 2014 and look forward to what information security professionals should expect in 2015. The past year was a landmark one in the information security field, with massive data breaches capturing the public’s attention, powerful bugs causing headaches for IT teams and end users, DDoS attacks breaking records, and phishing remaining a general annoyance – or worse – for all Internet users. In this whitepaper, we discuss these trends as well as key areas of concern for 2015, including: - The impact of the Internet of Things - The growing importance of threat intelligence - The increasing influence of BRICS nations - The evolution of encryption standards - The changing role of the CISO
Tags : 
information security threat, information security, protection, security breach, internet security, networking, security, it management
    
Cyveillance
Published By: Cyveillance     Published Date: Apr 06, 2015
In this white paper, we examine notable trends and events in physical security from 2014 and assess what security professionals should expect in 2015. 2014 was truly an unpredictable year in the physical security and executive protection worlds, as large scale events targeted for disruption were executed relatively smoothly, while unforeseen developments in Ukraine and the Ebola outbreak caught many off guard. Looking ahead to 2015, we predict that local issues will continue to gain global importance, threat actors and activists will find new ways to utilize social media to spread their messages, and the lines between physical and digital threats will continue to converge. We also highlight ongoing developments in France, Mexico, Ukraine, and Germany.
Tags : 
information security threat, information security, protection, security breach, internet security, networking, security
    
Cyveillance
Published By: Singlehop     Published Date: Oct 01, 2014
As cloud adoption grows, Alert Logic has observed a shift in security concerns. While cloud security remains a major concern, the business benefits of moving applications to the cloud are too compelling to resist. Now, having largely committed to a cloud strategy, IT professionals are redirecting their focus to finding the best ways to secure their cloud-based applications and data. Download the Cloud Security Report today to gain insight on how Alert Logic continues its practice of uncovering trends that threaten both cloud and on-premises environments.
Tags : 
cloud security, infrastructure threats, security data, chp infrastructure, security, it management, business analytics, risk management
    
Singlehop
Published By: Intel Security     Published Date: Jan 20, 2015
Industry experts discuss the common and risky tradeoff many organizations are forced to make between network performance and security. Nearly half of IT professionals report they continue to make this tradeoff, and if you believe our experts, that number is being under-reported based on what they’re seeing.
Tags : 
next generation firewall, network performance, mcafee next generation firewall, ngfw, security
    
Intel Security
Published By: Evident.io     Published Date: Nov 19, 2015
Collaboration services, email, managed services, and backups and disaster recovery are the most common current use cases for cloud services, according to the results of a new SANS survey on cloud security. The 485 IT professionals who participated in the survey reported using a variety of cloud providers and service models, including software-as-aservice (SaaS) cloud offerings, along with a fairly even mix of infrastructure-as-a-service (IaaS) and platform-as-a-service (PaaS) implementations. Most respondents said they are investing in both public and private clouds as needs dictate.
Tags : 
evident, cloud security, collaboration services, 485 it, disaster recovery, cloud services, saas, networking, it management, wireless, data management
    
Evident.io
Published By: CrowdStrike     Published Date: May 10, 2018
Finding out your organization has been breached can be devastating news — knowing how to deal with an intruder that’s broken through your cyber defenses can be even more challenging. This white paper, “You’ve Been Breached — Now What? How to Respond to a Worst-Case Scenario,” offers practical steps IT and security professionals should take after a cyberattack occurs. You’ll receive guidance for both short-term and long-term strategies to help minimize damage, protect sensitive assets and preserve forensic evidence that can help during the investigation and remediation process. This paper also includes recommendations for strengthening your organization’s defenses against a future breach. They are based on decades of experience from CrowdStrike® incident responders who work on the front lines fighting cyberthreat actors every day. Download this White Paper to learn: • How to collect and preserve data after a breach so that critical forensic information can be retrieved • What sort of in
Tags : 
    
CrowdStrike
Published By: CrowdStrike     Published Date: Nov 28, 2018
Finding out your organization has been breached can be devastating news — knowing how to deal with an intruder that’s broken through your cyber defenses can be even more challenging. This white paper, “You’ve Been Breached — Now What? How to Respond to a Worst-Case Scenario,” offers practical steps IT and security professionals should take after a cyberattack occurs. You’ll receive guidance for both short-term and long-term strategies to help minimize damage, protect sensitive assets and preserve forensic evidence that can help during the investigation and remediation process. This paper also includes recommendations for strengthening your organization’s defenses against a future breach. They are based on decades of experience from CrowdStrike® incident responders who work on the front lines fighting cyberthreat actors every day. Download this White Paper to learn: How to collect and preserve data after a breach so that critical forensic information can be retrieved What sort of int
Tags : 
    
CrowdStrike
Published By: McAfee     Published Date: Mar 31, 2017
1,400 IT Security professionals from around the globe report their organizations have been adopting cloud at a rapid pace and trusting more sensitive data to reside there.
Tags : 
cloud, cloud usage, cloud security
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
The relentless march of end user organizations toward cloud services continued during the past 12 months, according to a new SANS survey, despite long-standing fears about information security, the lack of visibility into cloud provider security controls and the shortcomings of controls available to those who utilize cloud services. One big difference since the 2015 SANS cloud security survey:1 Information security professionals appear to have accepted that the cloud is here to stay and are, sometimes unenthusiastically, doing what they can to make the frontier secure.
Tags : 
cloud security, cloud data center, sans survey
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
The relentless march of end user organizations toward cloud services continued during the past 12 months, according to a new SANS survey, despite long-standing fears about information security, the lack of visibility into cloud provider security controls and the shortcomings of controls available to those who utilize cloud services. One big difference since the 2015 SANS cloud security survey:1 Information security professionals appear to have accepted that the cloud is here to stay and are, sometimes unenthusiastically, doing what they can to make the frontier secure.
Tags : 
cloud security, cloud data center, sans survey
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
1,400 IT Security professionals from around the globe report their organizations have been adopting cloud at a rapid pace and trusting more sensitive data to reside there.
Tags : 
cloud, cloud usage, cloud security
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
The relentless march of end user organizations toward cloud services continued during the past 12 months, according to a new SANS survey, despite long-standing fears about information security, the lack of visibility into cloud provider security controls and the shortcomings of controls available to those who utilize cloud services. One big difference since last year’s SANS cloud security survey, “Information security professionals appear to have accepted that the cloud is here to stay and are, sometimes unenthusiastically, doing what they can to make the frontier secure.” To learn more, get the full SANS report.
Tags : 
cloud security, cloud data center, sans survey
    
McAfee
Published By: Rapid7     Published Date: Jul 12, 2012
In this webcast, Bernd Leger, VP of Marketing, Products & Solutions at Rapid7 and Nate Crampton, Product Manager at Rapid7 discuss the current state of how organizations are prioritizing vulnerabilities in their environments and what security professionals can do to lower their security thresholds.
Tags : 
rapid7, technology, security, it management, business technology, security management, security policies, data protection, data quality, vulnerability management
    
Rapid7
Published By: Rapid7     Published Date: Nov 27, 2012
What's your security protection factor (SPF)? In this on demand webcast for IT and security professionals, Rapid7's CSO and Chief Architect of Metasploit, HD Moore, shows how you can reduce your remediation workload by testing which vulnerabilities really matter.
Tags : 
rapid7, technology, security, it management, business technology, access control, application security
    
Rapid7
Published By: Qualys     Published Date: Nov 05, 2013
The SANS 20 Critical Security Controls are known for driving effective security programs across government agencies, establishing guidelines for security professionals to ensure the confidentiality, integrity and availability of information technology assets. This paper describes how automating these controls using QualysGuard can protect your organization with continuous security while drastically lowering costs.
Tags : 
automation, cyber security, critical controls, malware defense, application software security, data recovery, compliance applications, qualysguard, internet security, intrusion detection, intrusion prevention, policy based management, security management, vulnerability management
    
Qualys
Published By: Mimecast     Published Date: Oct 22, 2018
What if your employees were more informed about security threats, more skeptical about what they receive in email, and less likely to click on malicious links in email without first verifying them? There are some impactful, quick wins that you and your organization can realize by implementing security awareness training. This recent in-depth survey of security professionals by Osterman Research shows that the leading security concerns across organizations are all areas in which security awareness training can yield significant benefits. Here are some suggestions on processes and practices to consider when developing a security awareness training program that will actually change behavior and make the organization less likely to fall prey to a cyberattack.
Tags : 
    
Mimecast
Published By: Qualys     Published Date: Nov 11, 2009
New network vulnerabilities appear constantly and the ability for IT security professionals to handle new flaws, fix misconfigurations and protect against threats requires constant attention. However, with shrinking budgets and growing responsibilities, time and resources are at constrained. Therefore, sifting through pages of raw vulnerability information yields few results and makes it impossible to accurately measure your security posture.
Tags : 
qualys, network secure, it security, vulnerability, it budget, risk management, vulnerability management, misconfigurations, guard, identity management, internet security, policy based management, security management, security policies
    
Qualys
Start   Previous    1 2 3 4 5 6 7 8    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.