Security Event Log Monitoring Reports

Focus: Infosec17
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Security technologist Bruce Schneier's insights and warnings around the regulation of IoT security and forensic cyber psychologist Mary Aiken's comments around the tensions between encryption and state security were the top highlights of the keynote presentations at Infosecurity Europe 2017 in London.
Posted: 08 Feb 2021 | Published: 19 Jun 2017

TechTarget ComputerWeekly.com

How to Modernize Your Vulnerability Management Program
sponsored by ServiceNow
EGUIDE: Attackers have changed their focus from servers to users. As a result, security professionals should refrain from security strategy complacency, especially when it comes to their vulnerability management programs. In this e-guide, learn how to modernize your vulnerability management program to protect your organization and users.
Posted: 08 Feb 2021 | Published: 22 Oct 2019

ServiceNow

Six Criteria for Buying Data Loss Prevention Products
sponsored by InteliSecure
EGUIDE: Discover 6 steps your organization can take when thinking about what data loss prevention means to your security posture and what to look for to shore up your own defenses.
Posted: 12 Jun 2017 | Published: 07 Jun 2017

InteliSecure

Discover SIEM Capabilities For Real-Time Analysis
sponsored by LogRhythm, Inc.
EGUIDE: In this expert e-guide, learn what 3 SIEM capabilities aid the real-time analysis of collected information and security alarms, allowing for prompt detection of actual or potential attacks.
Posted: 16 Nov 2016 | Published: 16 Nov 2016

LogRhythm, Inc.

What to Include in an SD-WAN Security Checklist
sponsored by Citrix
EGUIDE: SD-WAN can improve security in many ways. Simply migrating to a viable SD-WAN offering can bring benefits. But SD-WAN also provides security features to protect the traffic it manages, as well as features that protect the offering itself. Read this expert e-guide to uncover 4 different areas where enterprises should consider SD-WAN and security.
Posted: 10 Aug 2020 | Published: 30 Apr 2020

Citrix

Application Development Security Requires Forethought
sponsored by tCell
EGUIDE: Learn how to define security requirements at the beginning, and what can be learned from the RASP approach in closing the gap left by application security testing.
Posted: 28 Mar 2017 | Published: 28 Mar 2017

tCell

How to Use an Incident Response Policy to Better Collaborate
sponsored by Delta Risk
EGUIDE: In this e-guide learn how to not only prepare your organization's response to a security incident, but also how to work with outside forces more effectively to detect, analyze, contain, and eradicate – as well as, recover essential data.
Posted: 07 Oct 2016 | Published: 06 Oct 2016

Delta Risk

Comparing Top Shelf Email Encryption Software Products
sponsored by Hewlett Packard Enterprise
EGUIDE: Access this expert e-guide to learn how the top of the line email encryption software measures up to one another. Find out what to look for when it comes to strength of cryptography, file security, mobile device support, and more.
Posted: 04 May 2017 | Published: 28 Apr 2017

Hewlett Packard Enterprise

How to Protect Data from Ransomware
sponsored by Dell Software
WHITE PAPER: It can be difficult to recover data that is encrypted by ransomware malware. In this expert guide, discover how to stop ransomware from breaching your network in the first place and backup all of your data.
Posted: 27 Sep 2016 | Published: 22 Sep 2016

Dell Software

Resource Center: Stop Threats and Prevent Data Loss
sponsored by McAfee, Inc.
RESOURCE: Get a deeper understanding of who is behind theft, the types of data being stolen and the ways it is getting outside of organizations. Though it's difficult to completely stop, discover policies and procedures you can easily follow to reduce overall data loss.
Posted: 21 Nov 2016 | Published: 30 Sep 2016

McAfee, Inc.