Latest Resources

IT Security Ebooks

2013 eBook on surviving SIEM

2013 eBook on surviving SIEM

Protecting mission-critical systems against cyber attacks has become a national priority for government, critical infrastructure and military sites, and a business priority for corporations.

2013 eBook on cyber espionage

2013 eBook on cyber espionage

Nation-states can now skip over costly and time-consuming R&D by stealing corporate and government data and turning that information into a competitive advantage.

Social Media Spotlight

Our special Spotlight series is back for the holidays, this time with a fresh focus on social media and its security and privacy ramifications.

Cyber criminals have taken a particular liking to these platforms, given the amount of users who flock there to interact. Plus, sites like Twitter and Facebook form a vast repository for personal or proprietary data, making accidental disclosure or intentional targeting a real concern.


As such, business executives must discern just how to marry business-related social media use with all of the risks that it embodies, and then decide if social networking is friend or foe.


Download the PDF now!

Slideshows

2013 Website security statistics report

2013 Website security statistics report

This infographic created by WhiteHat Security, provides insight into the state of website security and issues organizations face today.

May 2013 Threat Stats

May 2013 Threat Stats

This month's threat stats indicate that the encounter rate of web malware across the retail and wholesale industry was over ...

May 2013 global threats

May 2013 global threats

In this month's global threat map, events across the globe are highlighted that include the sentencing of a man who ...

InfoSecurity Europe 2013 day three

InfoSecurity Europe 2013 day three

The final day of the conference held in London may have ended earlier than the first two, but the showroom ...

InfoSecurity Europe 2013 day two

InfoSecurity Europe 2013 day two

The action continued on Day Two of the InfoSecurity Europe conference in London. With engaging and compelling presentations, keynotes, and ...

Case Studies

Compliance confluence: 1st Credit and SureCloud

Compliance confluence: 1st Credit and SureCloud

A highly regulated debt collector from the U.K. needed to achieve compliance, but it wanted to scrap all of the point solutions on which it traditionally relied.

Game on: Case study with Electronic Arts and Allgress

Game on: Case study with Electronic Arts and Allgress

Video game players are used to fending off alien invaders, but the IT staff at Electronic Arts (EA) was challenged to reduce cyber risk within its own environment.

Staying current: Merit Medical Systems and Symplified

Staying current: Merit Medical Systems and Symplified

The apps used on mobile devices connected to its network contained sensitive data, so a medical device manufacturer needed to ensure that access control and authorization policies were enforced.

Podcasts

2012 Luminary Podcast: Chris Soghoian

Chris Soghoian, who was recently hired as the ACLU's first-ever principal technologist, has never been afraid to ruffle the feathers of the corporate establishment when it comes to privacy and security issues.

2012 Luminary Podcast: Valerie Aurora and Mary Gardiner

Valerie Aurora and Mary Gardiner have united to form a decade-long collaboration on a variety of "women in open source" advocacy projects, including developing anti-harassment policies at conferences.