Recommended

Container Security

Read this eBook to explore key findings and best practices for developing a security architecture for your containerized applications.

Featured

Whitepapers are partner-offered informational research documents that provide technical and operational data, case studies, and timely views and explanations to help keep your organization safe.


13 Essential Steps to Meeting the Security Challenges of the New EU GDPR

Read this paper to learn how you should be preparing your information security program for compliance with the GDPR.

Security in a Remote Access World

Download this report for findings from a survey of enterprise IT executives illustrating that distributed businesses goes beyond just beefing up network infrastructure and increasing budgets for IT hardware.

Are You Collecting Personal Data Securely?

In this guide, find out the changes to online information processing introduced by GDPR and how they differ from current data privacy legislation, who is at risk, and what the common issues organizations face to comply are.

2017 Beyond the Phish

Learn how real end users are performing on security awareness topics beyond the phish such as protecting confidential information, working safely outside the office, building safe passwords, and more.

Bits in a Box: Containers, a UNIX one-trick pony, make a comeback

The container-vs-virtual machine debate confirms one important sea change for security professionals: containers are back from their UNIX heyday, bringing speed and scalability to cloud-based applications and development.

Reducing Cyber Exposure from Cloud to Containers

Securing the modern attack surface is a critical challenge you must effectively address to reduce cyber exposure. By reading this ebook you’ll learn what’s working – and what’s not – from 29 global infosec leaders.

Whitepapers

Whitepapers are partner-offered informational research documents that provide technical and operational data, case studies, and timely views and explanations to help keep your organization safe.

Who Moved my Data? Securing Cloud Data in a Share-Everything World

Download this white paper to learn best practices for keeping your SaaS applications and the data you store in them safe from cyber-attacks.

Definitive Email Security Strategy Guide

Download this definitive guide to learn the 5 key steps to building your email security strategy across the entire attack chain – from prevention through real-time response.

Getting Started with DMARC

Download this complete DMARC reference guide to learn what DMARC is and how it works, as well as best practices for implementation.

Email Fraud Survival Guide

Download this Email Fraud Survival Guide to learn common email fraud attacks and why they succeed, what groups are most frequently targeted, and key steps to protecting your organization both before and after attacks.

The Human Factor in Advanced Attacks

Today’s advanced attacks focus more on exploiting human flaws than system flaws. Download Proofpoint’s Human Factor Report, based on anonymized data from over 5,300 organizations, for insights into this new trend.

DDoS Attacks No Longer Kids Play

DDoS attacks now rank among the most persistent cybersecurity threats. They are part of the arsenal regularly deployed by cyberattackers with criminal or political aims, as well as for extortion or competitive advantage.

How You Can Use the Dark Web for Threat Intelligence

Download this white paper for a clear definition of the dark web, an understanding of underground threat actor communities, and examples of threat intelligence uncovered by combining dark web, open web, and technical sources.

Threat Intelligence: A New Approach

Learn more about the new approach to sharing threat intelligence and develop a methodology to measure the effectiveness of your current security infrastructure.

Multi-factor Authentication Deployment Guide

In this guide, we share things to consider before deploying MFA and practical advice for building multi-factor authentication for applications.

Automate Security Incident Response with Okta

Read this white paper to learn how to properly address threats with multi-factor authentication, use identity as the foundation for your breach prevention strategy, and integrate all of your security infrastructure apps.

CIO eGuide: Preventing Data Breaches from Stolen Credentials

This guide will explain how Okta Adaptive Multifactor Authentication (MFA) provides the security that IT needs, while also providing the simplicity end users want.

Protect Against Data Breaches

Read about Okta’s modern approach to centralizing identity management, enabling strong authentication, reducing the attack surface and enabling rapid response.

Put The “Ops” In “DevOps”

Read this Forrester Research whitepaper for perspective on trends shaping development and operations strategies. Learn how progressive companies are handling app development and operations faster and at lower costs.

IDC Report: Integrated Cloud-Based Monitoring and Analytics Break Down IT Ops Silos

Discover how Oracle addresses cloud based management, monitoring and analytics with Oracle Management Cloud.

Mitigate the Top Nine Cloud Threats with a Cloud Access Security Broker (CASB)

The Cloud Security Alliance published a report highlighting "The Treacherous 12" threats to cloud computing. Of the 12 challenges identified in the report, the good news is that you can address nine with a single CASB solution.

Making the Case for a Cloud Access Security Broker (CASB)

It's not easy determining who is responsible for what when it comes to cloud technology. It's important to have an effective and trusted CASB partner to help advise on key cloud security and trends so you know you're covered.

Making Sense of the Shared Responsibility Model

This white paper examines the root cause behind the confusion, some unfortunate scenarios that resulted from the confusion, and how some enterprises are successfully addressing and embracing the shared responsibility model.

The Definitive Guide to Sharing Threat Intelligence

Despite the popularity of industry-centric sharing initiatives, particularly the sharing of threat intelligence, member organizations are still mostly focused on consuming what is shared instead of adding their own contributions.

North Korea Cybersecurity Profile

This research report provides a detailed examination of North Korea's cybersecurity landscape, analyzing political context, international relations, security posture, economy, cyber-strategy, intelligence and cyber services.

Russian Federation CyberSecurity Profile

This report profiles the Russian Federation, including current political, economic, and security Landscape; national cyber strategy; Russian-based organized crime; civil society and discontents and future concerns.

Cyber Threat Brief: 2018 Winter Olympics

This Cyber Threat Brief provides research on the threat landscape, including detailed analysis of potential vulnerabilities, hacktivist, APT, and organized crime activity, past Olympic attacks and geopolitical tensions.

13 Essential Steps to Meeting the Security Challenges of the New EU GDPR

Read this paper to learn how you should be preparing your information security program for compliance with the GDPR.

Economic, Operational and Strategic Benefits of Security Framework Adoption

Download this ebook for insights into basing your infosec program on an established security framework, giving you the controls, KPIs and vocabulary needed for building and operating a structured, scalable, and effective practice.

Reducing Cyber Exposure from Cloud to Containers

Securing the modern attack surface is a critical challenge you must effectively address to reduce cyber exposure. By reading this ebook you’ll learn what’s working – and what’s not – from 29 global infosec leaders.

Leveraging the Cloud to Achieve Comprehensive Asset Visibility, Tracking, and Security

This IDC Technology Spotlight examines the evolution of vulnerability management.

Global DDoS Attacks & Cyber Security Insights Report

For an in-depth look at the DDoS threat landscape and how organizations like yours are adjusting their defensive strategies, get the latest Neustar Global DDoS Attacks & Cyber Security Insights Report.

A New Approach To Endpoint Preservation And Collection

Is managing litigation data keeping you up at night? Rest easy with these insights from PREX17 on seamless endpoint data preservation.

Frost & Sullivan: The Digital Threat Management Platform Advantage

In this Frost & Sullivan report you’ll see how the RiskIQ Digital Threat Management Platform is being used in organizations today and the ROI benefits it delivers.

Are You Collecting Personal Data Securely?

In this guide, find out the changes to online information processing introduced by GDPR and how they differ from current data privacy legislation, who is at risk, and what the common issues organizations face to comply are.

EMA RadarTM for Digital Threat Intelligence Management: Q4 2017

The EMA Radar for Digital Threat Intelligence Management: Q4 2017 Report evaluates threat intelligence management providers by their ability to help organizations combat a new generation of threats in the digital marketplace.

Mobile Threat Landscape Report

Mobile apps are still the Wild West of online security. In this analysis of mobile app stores and billions of daily scanned resources, RiskIQ re-confirmed most app stores are failing to protect users from malicious app downloads.

5 Security & Compliance Issues Your Saas Company Should Be Prepared for in 2018

Check out this quick reference for clarity and actionable advice on the top security and compliance concerns of 2018.

Container Security

Read this eBook to explore key findings and best practices for developing a security architecture for your containerized applications.

7 Steps To Choosing Litigation Response Software

Ready to bring e-discovery in house? Use these seven steps to select the litigation response software that’s right for you.

2018 State of the Phish

This report analyzes millions of simulated phishing attacks, as well as a survey of infosec professionals. It also includes survey data from end users, measuring their knowledge and behavior around phishing, ransomware and more.

2017 User Risk Report

Download a copy of the 2017 User Risk Report to see how employees shaped up globally and regionally on cybersecurity awareness issues that are impacting organizations worldwide.

2017 Beyond the Phish

Learn how real end users are performing on security awareness topics beyond the phish such as protecting confidential information, working safely outside the office, building safe passwords, and more.

Bits in a Box: Containers, a UNIX one-trick pony, make a comeback

The container-vs-virtual machine debate confirms one important sea change for security professionals: containers are back from their UNIX heyday, bringing speed and scalability to cloud-based applications and development.

What Constitutes Effective Security Awareness Training?

Training personnel to recognize security threats is a critical part of any security strategy. Organizations must consider the content and the training methods, but what constitutes effective security awareness training?

Choosing a Cybersecurity Solution - 11 Key Points to Consider

Download this white paper to learn advantages of cloud-based security, why closing the gap between malware infection and detection should be a priority, and why comprehensive port and protocol visibility is a critical must-have.

The Limitations of Next Generation Firewalls

Next-generation firewalls aim to fill gaps created by ineffective firewalls, but do they really provide an all-encompassing solution for network security? Download this whitepaper to learn how they differ from secure web gateways.

Control Your Cloud: The Pitfalls of Shared Cloud Strategies

Cloud computing remains an abstract concept for many users. Download this whitepaper to learn the benefits of cloud cybersecurity, the difference between multi-tenant and non-shared environments, and how to leverage it.

GDPR Compliance

On May 25, 2018, all organizations that collect data within the EU will be subject to GDPR. Download this whitepaper to learn what is within the regulation, who does it affect, and what are the penalties for noncompliance.

"Defense-in-depth" and the Distributed Gateway Platform

This whitepaper explores “defense-in-depth,” including best practices for establishing a “defense-in-depth” strategy, the important role cloud SWGs play in defending a network, and solutions that can beef up network security.

Security in a Remote Access World

Download this report for findings from a survey of enterprise IT executives illustrating that distributed businesses goes beyond just beefing up network infrastructure and increasing budgets for IT hardware.

EBooks, editorially produced by SC Media

SC eBooks are independent, editorially driven products, sometimes underwritten by sponsors, that offer in-depth analysis of critical areas of interest to our readers. These comprehensive reports provide insights from industry experts specializing in the various aspects of data security, and hands-on analysis by CISOs of companies addressing these challenges on a daily basis.

Phishing for Ransomware

SC Media looks at best practices to identify and stop phishing attacks with their destructive payloads before they take down the corporate network or hold your corporate data for ransom.

Phishing Reference Guide: Taking the Sport Out of Phishing

Phishing has become the cyber attacker's go-to option for identifying vulnerability in the corporate network. This guide looks at how phishing came to be, how to identify it and how to remove the profit from phishing attacks.

The Clock is Ticking on GDPR

GDPR is right around the corner. We look at how you should prioritize your time to reduce your vulnerability, providing expert advice on what to do and, more importantly, what not to do, with the data you collect.

Is the Thrill of Your SIEM Gone?

SIEM technology is evolving, but it remains the cornerstone of corporate security. What's the future for SIEM and will it remain relevant tomorrow? This eBook looks at how it is evolving to keep current with emerging technologies.

The Picture of Threat Intelligence

Threat intelligence is a popular buzzword, but is it meeting its hype? Some swear by it; others swear at it. We explain the disconnect.

Who Goes There? Authentication in the cloud is the next great challenge

Conventional wisdom is that if you want to protect data, the best bet is the cloud. Better security. Better access. The question is: Are these assumptions true? We explore those claims and delve into the underlying technology.

Risking It All on Risk Management

Risk management rules are changing fast and furiously worldwide. Is your company able to cope with the rapid change? For global firms, these changes can be daunting.

SIEMs of Change

The SIEM you installed 5 years ago is not necessarily the one you need today. While rip-and-replace supporters say you need a fully integrated threat intelligence “solution,” it might not be the answer to your problem.

Bank Fraud for the Holidays

There was a time when criminals robbed banks because that's where the money was. Today, stealing from banks is more enticing with more than a savings account at stake -- the entire SWIFT system is vulnerable. Check out our report.

GDPR: Conflicted Compliance

GDPR is all about privacy, but some of the EU rules are in conflict with US laws and regulations.

How will this all play out? We provide insights on this conundrum.

Have any corporate secrets? Go Phish

Training your employees to recognize a social engineering attack is the best way to defend against phishing, experts say. How else can you defend yourself? We provide some suggestions.

AI: Utopia or dystopia?

Today AI is being used to find vulnerabilities in software and systems before the attackers do so, enabling defenders to be proactive in finding zero days and potential Patient 0 victims. We explain how this works.

Beware the Insidious IoT Devices

As security professionals determine how to protect IoT devices, end users still add more vulnerable devices to their networks. When do you draw the line? Listen to some security execs who have and are facing just that decision.

Managing Threats

As data threats change, CISOs must determine if their company is prepared. This ebook looks at how threat management is changing and why security that worked a few years ago might be insufficient in today’s threat landscape.

Cloud-based Backup: Surviving Ransomware

This SC Media eBook provides practical advice on protecting your network from the next WannaCry-like attack.

Normalizing Behavioral Analytics

Understanding how and why your employees act the way they do can reduce the potential for insider attacks and potential losses. Behavioral analytics helps identify and reduce potential losses. Here’s how it works.

It's Classified

This eBook looks at who determines who classifies the data and who implements the security around classifications.

Predicting the future (ATTACK): Is predictive analytics in your data center's future?

Big Data is everywhere, greatly expanding the potential for predictive analytics. This ebook looks at how predictive analytics works and how machine learning can spot trends long before a human might see a vulnerability.

Defending the elusive Endpoint

How do CISOs defend against endpoint attacks? This ebook looks at capabilities of basic endpoint security, as well as addresses how CISOs can defend against more sophisticated attacks, such as ransomware, spear phishing and APTs.

Snakebit at the GRC Corral

This eBook looks at how managing the three legs of the GRC stool will keep a company from violating regulations while reducing risk and improving security.

SC Media eBook on Incident Response

This eBook looks at the first 9 essential steps you need to take immediately upon finding a breach. Miss one of these steps and you could be looking at long-term problems.