Recommended

2016 Cyberthreat Defense Report

CyberEdge Group’s third annual Cyberthreat Defense Report (CDR) provides a penetrating look at how IT security professionals perceive cyberthreats and plan to defend against them.

Featured

Whitepapers are partner-offered informational research documents that provide technical and operational data, case studies, and timely views and explanations to help keep your organization safe.


S.I.R.M.: Security Incident Response Matrix

This white paper discusses a new threat intelligence model, the Security Incident Response Matrix (SIRM), that can be a guide for the creation of organizational threat intelligence.

Digital Guardian for Healthcare Solutions Sheet

This Solutions Sheet explains how DLP can provide a simple compliance framwork to prevent the loss of PHI for healthcare systems.

Securing Windows XP with Traps Advanced Endpoint Protection

Palo Alto Networks Traps Advanced Endpoint Protection enables you to manage your XP upgrade policy at your own pace while maintaining acceptable levels of security and compliance.

Whitepapers

Whitepapers are partner-offered informational research documents that provide technical and operational data, case studies, and timely views and explanations to help keep your organization safe.

5 Practical Tips to Protect Manufacturing Trade Secrets

Five key recommendations to help evaluate if you organization’s security program can protect your IP from cyber espionage attacks. Get the eBook today.

Stopping Cyber Threats: Your Field Guide to Threat Hunting

Get this practical guide to set up a threat hunting initiative in your organization. Learn what you can do to stop advanced persistent threats and prevent serious damage to your organization.

Hiding in Plain Sight: How a CASB with UBA Unmasks Insider Threats in the Cloud

According to IBM’s 2015 Cyber Security Intelligence Index, 55% of cyberattacks were due to insiders. How do you close that gap? Download our white paper to learn how you can implement a Cloud Access Security Broker (CASB)

EBooks, editorially produced by SC

SC eBooks are independent, editorially driven products, sometimes underwritten by sponsors, that offer in-depth analysis of critical areas of interest to our readers. These comprehensive reports provide insights from industry experts specializing in the various aspects of data security, and hands-on analysis by CISOs of companies addressing these challenges on a daily basis.

SC Magazine eBook on Security Analytics

It’s no longer a question of will you be breached but how quickly and effectively you respond to the breach. We discuss some of your options.

SC Magazine eBook on Ransomware

Ransomware attacks are profitable and effective for the attackers. What's to stop them from continuing with these types of breaches? This ebook looks at why these attacks have become so popular in the past few years.

SC Magazine eBook on DDoS

This eBook will look at modern defensive measures organizations can employ to protect themselves from these relatively inexpensive and easily exploitable attacks and new defenses that will be available shortly.

MarketFocus, editorially produced by SC

Market Focus reports are detailed, single-topic analyses of data security issues facing corporations’ C-suite. These are sponsored market research reports conducted on behalf of Haymarket Custom Studio with input provided by sponsor. Market Focus reports are research-based and data-driven using research questions prepared by the sponsor. Research is professionally conducted and results are reported in accordance with the industry’s ethical standards and policies.

House of the Rising Sun

This research report from Intel Security addresses the types of threats that most concern CISOs,

Market Focus: Employing Cyber Threat Intelligence

This market guide is the product of surveys and interviews with over 300 IT professionals and provides insight in purchase and use activities for both small and medium sized businesses and large enterprises.

Security Brief, editorially produced by SC