Latest Resources

IT Security Ebooks

2014 audit and compliance ebook

2014 audit and compliance ebook

We explore the landscape today with which security teams must contend and compile a number of best practices and strategies you can apply to protect your company.

PCI 2014: From compliance to security

PCI 2014: From compliance to security

The consensus from our panel of experts is that PCI DSS should be just one item on a far broader effort to integrate data security into enterprise risk management.

Road Warrior Spotlight

For access to the internet and corporate networks, today's most efficient road warriors equip themselves with a range of devices, accessories and services - everything from laptops, tablets and smartphones to 3G modems, as well as video and conferencing apps using VoIP, like Google Voice, FaceTime and Skype. But, while mobile connections can be convenient for workers on the go, the security of the transmissions is still a primary concern for those charged with protecting corporate assets. And, individuals emailing and transferring documents from a café, hotel room or any Wi-Fi-enabled hotspot outside of their protected VPN, is potentially putting their own personal data at risk. 

What can road warriors do to better protect their employer's data (as well as their own personal information)? For this latest Spotlight we spoke with a number of industry experts to gain their first-hand knowledge of best practices, tools and strategies that, if implemented, could greatly improve the security of digital transmissions - be it via email, dropping files onto a shared cloud server, mobile phone call or videoconference.

Download the PDF now!

Slideshows

October 2014 Global Threats

October 2014 Global Threats

Again this month, Iran was the producer of the most zombie IP addresses. Also, Norway launched the largest-ever campaign to ...

October 2014 Threat Stats

October 2014 Threat Stats

August's data breach numbers came in this month and confirmed that Russian hackers were able to amass at least 1 ...

Case Studies

Protecting the vault: First Financial Bank's go-to solution

Protecting the vault: First Financial Bank's go-to solution

Needing more than signature-based remedies, First Financial Bank found a way to close the gap between what exists and what's possible. Greg Masters reports.

Forward progress: How the Denver Broncos really play defense

Forward progress: How the Denver Broncos really play defense

Off the field, demand for bandwidth and protection from network threats set the ball in motion for the Denver Broncos. Greg Masters reports.

Case study: Big LAN on campus

Case study: Big LAN on campus

A university rolled out a wireless network, but was hampered with a user-support problem...until a solution was found. Greg Masters reports.

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US