Sign up for our weekly newsletter!
REGISTER NOW
Information Resources
Content posted in April 2019
The Essential Guide to Understanding Risk and Quantification
Information Resources  
4/24/2019  
To minimize risk associated with non-compliance, FS companies must first understand their compliance exposer. To do that, they need to evaluate their security practices in the context of regulatory frameworks. Download the Whitepaper to learn more.
7 Experts on Threat and Vulnerability Management
Information Resources  
4/24/2019  
One of the greatest challenges security teams face is identifying, assessing, and eliminating vulnerabilities before the bad guys find them. There are no simple answers, but the essays in this eBook contain many observations and valuable lessons from experts actively facing these challenges.
A CISO’S Guide to Hybrid Cloud Security
Information Resources  
4/16/2019  
Hybrid clouds are an integral component of most businesses, yet CISOs face major challenges achieving consistent security and compliance across environments. This guide explores the top challenges in securing hybrid cloud, and outlines a modern approach for CISOs to overcome them.
Endpoint EcoSystems E-Book: Collaborating To Conquer Security Threats
Information Resources  
4/12/2019  
Employees are traveling more frequently and using their own devices for business purposes, adding layers of complexity to the already tough job the IT department has of protecting company data and endpoint devices. Tablets and smartphones now can hold copies of entire customer databases, and connect to cloud services and removable media where even more sensitive company info is kept.
(Sans) Understanding the (True) Cost of Endpoint Management Survey
Information Resources  
4/12/2019  
In this paper, the SANS Institute reviews the challenges in dealing with complex, ever-changing environments and offers suggestions and recommendations in effective endpoint management. Additionally, they discuss enterprise security as it relates to endpoint management and examine the benefits of integrating endpoint management into your security posture.
Forrester Research - The Total Economic Impact of IBM BigFix Patch And BigFix Compliance
Information Resources  
4/12/2019  
The Total Economic Impact™ of IBM BigFix Patch and Compliance is a thorough research report that examines the return on investment (ROI) actual BigFix clients have experienced deploying the solution across their enterprises over multiple years.
CISOs Investigate: Endpoint Security Peer-authored Research
Information Resources  
4/12/2019  
Read the CISOs Investigate Research Report on Endpoint Security. The Value of the peer input cannot be overstated. Authored by leading Chief Information Security Officers across a multitude of industries, CISOs offer first-hand insights to security leaders as they make business driven risk and technology decisions.
Understanding the True Cost of Endpoint Management Webinar
Information Resources  
4/12/2019  




Latest Articles
DHS-CISA has issued a security advisory about GE Carescape medical instrumentation that enumerates many vulnerabilities present in them.
Inside of Windows is a methodology called Encrypting File System. It works on individual files or folders, rather than at the whole disk level like BitLocker does.
Microsoft is doing something concrete about container security with the release of the Microsoft Application Inspector, a cross-platform tool whose primary objective is to identify source code features in a systematic and scalable way.
One threat actor is taking advantage of the current problems with Citrix ADC/Netscaler for their own advantage.
The European data infrastructure GAIA-X can help connect thedisparate needs of German firms and create market access for providers from the EU and beyond.
Information Resources
upcoming Webinars
ARCHIVED
Top Tips for Blocking pwned [email protected]$$wOrds in Your Organization
Tuesday, October 29, 2019
12 p.m. New York/ 4:00 p.m. London
Podcasts
Podcast: Infrastructure Hunting – Stopping Bad Actors in Their Tracks
Being able to effectively build a threat intelligence ecosystem or threat-hunting identification response requires both user and systems sophistication and capabilities. Security, orchestration, automation and response (SOAR) is a new technology designed to provide organizations a single comprehensive platform they can use to implement an intelligence driven security strategy.
Podcast: Digital Transformation, SD-WAN & Optimal Security
Dan Reis chats to Cybera's Josh Flynn about how to achieve digital transformation without sacrificing security.
Podcast archive
Flash Poll
Video
In a wide-ranging interview, Cisco security boss Gee Rittenhouse talks about how machine learning, AI, blockchain and other emerging technologies ...
CloudPassage's new technology, called Container Secure, involves a five-step process to ensure seamless security in container deployments from the ...
You can't so much as go to a coffee shop today without hearing the word 'blockchain.' Hearing about a useful blockchain is less common, but ...
Last year, 60 million companies changed owners worldwide. That turnover makes it incredibly difficult to avoid doing business with entities (e.g., ...
Keith Furst of Data Derivatives interviews Daniel Wagner, author of a new book, Virtual Terror: 21st Century Cyber Warfare. They discuss the ways ...
All Videos
Sponsored Video
Sage Wagner, senior security pre-sales engineer with RiskSense, provides a demo of the company's latest technology 'RiskSense Solution,' a ...
Janus Technologies is launching a line of products that protect against the many threats to enterprises' sensitive data. David Schultz, vice ...
This new video will inspire companies to reimagine their business for success in a world where connectivity is more than a commodity. Sponsored Video
All Videos
like us on facebook
Security Now
About Us     Contact Us     Help     Register     Events     Supporting Partners     Twitter     Facebook     RSS
Copyright © 2020 Light Reading, part of Informa Tech,
a division of Informa PLC. All rights reserved. Privacy Policy | Cookie Policy | Terms of Use
in partnership with