Recommended

Status Quo Creates Security Risk: Today’s State of Incident Response

Download this whitepaper for a better understanding of how your security challenges compare with those of your industry peers—and for recommendations on ways to build a stronger, faster incident response.

Featured

Whitepapers are partner-offered informational research documents that provide technical and operational data, case studies, and timely views and explanations to help keep your organization safe.


Worldwide Infrastructure Security Report

Download this report to learn direct insights from security professionals at the world's leading enterprise organizations, focusing on the operational challenges they face and the strategies adopted to address and mitigate them.

Survey Report: 2017 Cybersecurity Report Card

We surveyed over 550 security professionals to identify what it takes to earn an "A" in cybersecurity.

How to Implement Practical Security Assessments

Organizations are scrambling to identify security weaknesses. To begin, you need a solid understanding of your organization. This model was developed as a guide for developing a perspective in the oblique world of assessments.

Gartner Magic Quadrant for Security Information & Event Management

This Gartner Report discusses how the need for early targeted attack detection and response is driving the expansion of new and existing SIEM deployments.

Data-Centric Security: Battling Malware, Intrusion and Insider Threats

Organizations are increasingly porous, and cyber-criminal's number one target is end users. Download this white paper to learn why comprehensive, adaptable security strategies must be created to mitigate threats to the enterprise.

IT executive guide to security intelligence

Typical responses to security threats have been proven to be costly, complex, and difficult to implement. Download this whitepaper to address critical concerns, and ensure your organization's security intelligence operations.

Whitepapers

Whitepapers are partner-offered informational research documents that provide technical and operational data, case studies, and timely views and explanations to help keep your organization safe.

Status Quo Creates Security Risk: Today’s State of Incident Response

Download this whitepaper for a better understanding of how your security challenges compare with those of your industry peers—and for recommendations on ways to build a stronger, faster incident response.

Survey Report: 2017 Cybersecurity Report Card

We surveyed over 550 security professionals to identify what it takes to earn an "A" in cybersecurity.

Trends and Tactics: How IT Professionals are Approaching AppSec Today

The Application Security landscape is rapidly changing - download this report to see how over 300 IT professionals responsible for Application Security are doing to meet application security challenges.

Employees at the Frontline in the Battle Against Ransomware

The recent escalating ransomware attacks have shown that no organization is safe and the effects of those attacks can be devastating. Find out how you can train your employees to become a human firewall and combat these attacks.

Are We Getting Any Better at Organizational and Internet Security?

Leading IT analyst firm Enterprise Management Associates latest research has found a shift in awareness training programs. Download this report to read how small and medium size businesses are especially effected.

The DomainTools Report Supplement: Malicious Domain Affix Patterns

Learn from patterns in domain names themselves to calculate their “signal strength” as an indication of nefarious activity with a focus on affixes in malware, phishing, and spam techniques leveraged by threat actors.

EBooks, editorially produced by SC Media

SC eBooks are independent, editorially driven products, sometimes underwritten by sponsors, that offer in-depth analysis of critical areas of interest to our readers. These comprehensive reports provide insights from industry experts specializing in the various aspects of data security, and hands-on analysis by CISOs of companies addressing these challenges on a daily basis.

SC Media eBook on Threat Intelligence

This eBooks looks at some of the ways CISOs are sharing intelligence in order to build better defenses and the challenges they face in making sure this intelligence is actionable.

SC Media eBook on GRC

This eBook looks at how managing the three legs of the GRC stool will keep a company from violating regulations while reducing risk and improving security.

SC Media eBook on Threat Intelligence

Today’s CISO needs to be just as clever in finding ways to catch the attackers