Latest Resources

IT Security Ebooks

2014 Application security ebook

2014 Application security ebook

We speak with a number of industry experts to gain a lucid understanding of the threat landscape and provide tools and strategies companies can put in place to achieve success in safeguarding their enterprises from porous software coding in their applications.

2014 Big Data ebook

2014 Big Data ebook

In this new ebook we speak with a range of experts to glean their insights on the technologies and strategies they are putting in place to guard their treasure troves and prevent both insider incidents and attacks from the outside.

Road Warrior Spotlight

For access to the internet and corporate networks, today's most efficient road warriors equip themselves with a range of devices, accessories and services - everything from laptops, tablets and smartphones to 3G modems, as well as video and conferencing apps using VoIP, like Google Voice, FaceTime and Skype. But, while mobile connections can be convenient for workers on the go, the security of the transmissions is still a primary concern for those charged with protecting corporate assets. And, individuals emailing and transferring documents from a café, hotel room or any Wi-Fi-enabled hotspot outside of their protected VPN, is potentially putting their own personal data at risk. 

What can road warriors do to better protect their employer's data (as well as their own personal information)? For this latest Spotlight we spoke with a number of industry experts to gain their first-hand knowledge of best practices, tools and strategies that, if implemented, could greatly improve the security of digital transmissions - be it via email, dropping files onto a shared cloud server, mobile phone call or videoconference.

Download the PDF now!

Slideshows

Weekend news review: December 15-19

Weekend news review: December 15-19

Sony's breach continued to worsen this week with the attackers successfully getting the studio to cancel its premiere of The ...

Weekend news review: December 8-12

Weekend news review: December 8-12

Sony's massive breach that spawned leaked emails and movies took over headlines this week. We also launched our annual Reboot ...

A look back at notable breaches

A look back at notable breaches

From health care providers to grocery store chains to retailers, no business is safe from the reach of hackers. Breaches ...

"Best Buy" products in 2014

"Best Buy" products in 2014

Yet another year produces a collection of phenomenal security products. Here's a list of what our SC Labs team deemed ...

Case Studies

Network care: Case study

Network care: Case study

When a care provider supplied laptops to its roving employees, it added a security solution to enable efficient collaboration. Greg Masters reports.

Protecting the vault: First Financial Bank's go-to solution

Protecting the vault: First Financial Bank's go-to solution

Needing more than signature-based remedies, First Financial Bank found a way to close the gap between what exists and what's possible. Greg Masters reports.

Forward progress: How the Denver Broncos really play defense

Forward progress: How the Denver Broncos really play defense

Off the field, demand for bandwidth and protection from network threats set the ball in motion for the Denver Broncos. Greg Masters reports.

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US