Security Information and Event Management Reports

Application Development Security Requires Forethought
sponsored by Veracode, Inc.
EGUIDE: Learn how RASP, or runtime application self-protection, could be the answer to prevent vulnerabilities from slipping through the web app review process and block new, unforeseen threats.
Posted: 22 May 2017 | Published: 18 May 2017

Veracode, Inc.

How to Protect Data from Ransomware
sponsored by Dell Software
WHITE PAPER: It can be difficult to recover data that is encrypted by ransomware malware. In this expert guide, discover how to stop ransomware from breaching your network in the first place and backup all of your data.
Posted: 27 Sep 2016 | Published: 22 Sep 2016

Dell Software

Endpoint threat detection gets more response
sponsored by Hewlett Packard Enterprise
EGUIDE: Discover how security teams worldwide are attempting to stop cyber-threats using various security methods and endpoint tools. InfoSec professionals have to evaluate what's best for their organizations and make the best judgment at the time -- knowing full well that today's security approach may become tomorrow's liability.
Posted: 07 Jul 2016 | Published: 06 Jul 2016

Hewlett Packard Enterprise

How To Get the Most Out of SOCs
sponsored by ServiceNow
EGUIDE: This e-guide teaches you how to refocus your security efforts on detection through continuous monitoring and greater network visibility. Learn how to set up your security operations center (SOC) to achieve more timely detection capabilities and learn from industry-recognized security expert Eric Cole, on how to get the most out of SOCs.
Posted: 07 Sep 2016 | Published: 31 Aug 2016

ServiceNow

SWIFT Banking System Boosts Security Following Cyberattacks
sponsored by BAE Systems Applied Intelligence
EGUIDE: Following a number of attacks on the SWIFT banking system that led to the theft of millions of dollars, SWIFT promised new rules to improve security for bank transfers. In this e-guide, we examine these targeted malware attacks and explore SWIFT's response to them. Find out if their 5-part strategic program was enough to bolster security.
Posted: 24 Feb 2017 | Published: 24 Feb 2017

All resources sponsored by BAE Systems Applied Intelligence

Who Needs Security Orchestration, Automation and Response?
sponsored by TechTarget Security
EBOOK: Who needs SOAR? The understaffed security team. Or put it another way: most security teams. In this SOAR guide, our expert contributor providers a detailed list of potential uses and details of what SOAR can do to boost the security of an organization's systems and data.
Posted: 08 May 2019 | Published: 08 May 2019

TechTarget Security

Buyer's Essentials: What to Look for in Single Sign-On Technology
sponsored by TechTarget Health IT
EBOOK: Are you on the hunt for single sign-on (SSO) technology? Discover the differences between the numerous approaches to SSO, their benefits, and what works for various types of healthcare organizations. In this guide, health IT expert Rick Krohn shares his advice on choosing the right SSO tech for your practice.
Posted: 24 Mar 2016 | Published: 18 Mar 2016

TechTarget Health IT

Introduction to Data Loss Prevention Tools
sponsored by InteliSecure
EGUIDE: In this e-guide discover what it means for security for data to be in use, in motion, and at rest; how DLP works in a standalone vs. integrated context; the DLP learning curve; and more.
Posted: 12 Jun 2017 | Published: 07 Jun 2017

InteliSecure

Security Tips for HIPAA-Compliant Cloud Storage and Texting
sponsored by Optum
EGUIDE: Understanding the rules of HIPAA is only the first step. But then, you must ensure your practices – and your vendors – are compliant. Access this e-guide to gain tips and criteria for evaluating cloud storage vendors and texting systems for sensitive healthcare information.
Posted: 13 Jul 2016 | Published: 12 Jul 2016

Optum

Five Ways to Secure Mobile Data with EMM
sponsored by vmware airwatch
EGUIDE: In this expert guide, discover five ways to improve your enterprise mobility management (EMM) policies and secure sensitive data on unsecure devices. Learn how to restrict mobile data movement and neutralize mobile data threats to improve business continuity.
Posted: 12 Oct 2016 | Published: 10 Oct 2016

vmware airwatch