TAG Cyber Report: 2017 Security Annual – Vol. 1

This report provides CISO team members with detailed technical & architectural guidance based on fifty specific controls that support the reduction of cyber risk.


Whitepapers are partner-offered informational research documents that provide technical and operational data, case studies, and timely views and explanations to help keep your organization safe.

Application Security in the Changing Risk Landscape

Explore the types of incidents IT and IT security professionals experience today, the trends that may impact their application security posture in the future, and everything in between

Improve Fraud Investigation with Web Behavior Analytics

Cyber security practitioners commonly lament that reducing consumer fraud would be a whole lot more effective if only the products could understand the business better.

Security for the Internet of Radios (White Paper)

As the number of connected devices grows to 50 billion by 2020, the IoT will provide an unprecedented expansion of threat vectors and Enterprises need to be able to respond.


Whitepapers are partner-offered informational research documents that provide technical and operational data, case studies, and timely views and explanations to help keep your organization safe.

Key Considerations in Choosing a Web Application Firewall

Today, enterprises are extending their businesses by using more web-based and cloud-hosted applications, so a robust and agile web application firewall (WAF) isn’t a luxury—it’s a requirement.

Two Approaches to Cloud Security - APIs versus Proxies

This paper compares the two primary security deployment modes in use by CASBs today: the proxy service approach and the API approach.

Protecting the Private Cloud with Integrated and Automated Security

Enterprises have evolved their data centers to include private clouds and are now challenged to secure these environments. This technical white paper explains how.

EBooks, editorially produced by SC

SC eBooks are independent, editorially driven products, sometimes underwritten by sponsors, that offer in-depth analysis of critical areas of interest to our readers. These comprehensive reports provide insights from industry experts specializing in the various aspects of data security, and hands-on analysis by CISOs of companies addressing these challenges on a daily basis.

SC Magazine Ebook On Threat Intelligence

This ebook looks at how you can focus your threat intelligence feeds and tune your network hardware to provide the data you need.

SC Magazine eBook on Ransomware

Ransomware attacks are profitable and effective for the attackers. What's to stop them from continuing with these types of breaches? This ebook looks at why these attacks have become so popular in the past few years.

SC Magazine eBook on Identity & Access Management

Managing identity and access management (IAM) has become one of the most important underlying security challenges as CISOs battle the massive number of intruders attempting to compromise user credentials.

MarketFocus, editorially produced by SC

Market Focus reports are detailed, single-topic analyses of data security issues facing corporations’ C-suite. These are sponsored market research reports conducted on behalf of Haymarket Custom Studio with input provided by sponsor. Market Focus reports are research-based and data-driven using research questions prepared by the sponsor. Research is professionally conducted and results are reported in accordance with the industry’s ethical standards and policies.

House of the Rising Sun

This research report from Intel Security addresses the types of threats that most concern CISOs,

Market Focus: Employing Cyber Threat Intelligence

This market guide is the product of surveys and interviews with over 300 IT professionals and provides insight in purchase and use activities for both small and medium sized businesses and large enterprises.

Security Brief, editorially produced by SC