eBook

Browser security

Browser security

The easiest way to compromise a corporate network is through a user running a browser application.

GRC

GRC

Global companies facing a slew of regional laws, as well as small and midsized companies required to meet regulatory demands, need governance, risk and compliance solutions.

Privacy

Privacy

Companies tout their privacy measures, but ensuring protection requires more than lip service.

The state of SIEM

The state of SIEM

The technology is capable of providing all of the data organizations need for compliance, but managing the log activity to make sense of it can be a challenge.

Virtualization

Virtualization

While cost reductions are a leading factor in the migration to cloud environments, security in virtualized implementations is still a concern.

The insider threat

The insider threat

The theft or misuse of corporate assets and customer data poses challenges, but there are strategies and tools to put in place to help mitigate the possibility.

APTs

APTs

Exposing and defeating cyber criminal campaigns out for financial gain or trade secrets is the challenge of the day, but there are strategies and tools available to help.

Sign up for our newsletters

POLL