All Research Sponsored By:TechTarget Security

Surviving in a State of DDoS Denial
EBOOK: DDoS attack prevention begins with understanding the nature of the latest sophisticated attacks. In this guide, leading security pros explain the mechanics of DDoS, the nature of the newest mega-attacks, and provide concrete, actionable guidance to make your systems as strong as possible.
Posted: 15 Jun 2015 | Published: 15 Jun 2015


Information Security Magazine: June Issue
EZINE: In this issue of Information Security magazine, we look at how malware is adapting to virtual machines and strategies that can help organizations secure these environments.
Posted: 01 Jun 2015 | Published: 01 Jun 2015


Buyer's Essentials: What to look for in User Behavioral Analytics
EBOOK: This guide helps InfoSec pros considering a user behavioral analytics tool purchase. It reviews key features, deployment strategies and reasonable performance expectations.
Posted: 21 May 2015 | Published: 21 May 2015


Fighting Cybercrime in the 21st Century
EBOOK: Strengthen your security with these expert insights into fighting advanced crimeware.
Posted: 20 May 2015 | Published: 20 May 2015


Information Security Magazine – May 2015 Issue
EZINE: In this issue of Information Security magazine, we study perimeter network security in the mobile and cloud era, and strategies to secure access from application-layer protection to single sign-on technologies.
Posted: 01 May 2015 | Published: 30 Apr 2015


The Merry-Go-Round of Security Testing
EBOOK: In this Insider Edition of Information Security, InfoSec pros will learn about the pros and cons of RASP, the runtime application self-protection method for secure software delivery.
Posted: 08 Apr 2015 | Published: 08 Apr 2015


Be a Web App Security Superhero
EBOOK: To secure Web applications today means tuning protections using the latest in Web Application Firewalls, Runtime Application Self Protection and other more.
Posted: 07 Apr 2015 | Published: 07 Apr 2015


April Information Security - Defending Against the Digital Invasion
EZINE: In this issue of Information Security magazine, we cover top cyberthreats and countermeasures to help organizations defend against new and evolving attack techniques.
Posted: 01 Apr 2015 | Published: 25 Mar 2015


Making Sign-on Simple and Secure
EBOOK: Single sign-on (SSO) has a complicated history but this technical guide can bring you up to date quickly on how the main protocols for SSO - OpenID and Security Assertion Markup Language (SAML) - compare and how they can be connected to the pieces you already have.
Posted: 13 Mar 2015 | Published: 13 Mar 2015

TOPICS:  Security | SSO

What to Look for in Secure File Transfer
EBOOK: In this exclusive guide, you will discover how secure file transfer products work and determine which will be the best fit for your particular environment. Read on to learn about the key features of secure file transfer and get insight into a file hosting service.
Posted: 12 Mar 2015 | Published: 12 Mar 2015


Information Security ASEAN March 2015
EZINE: Organizations are faced with the double challenge of having to secure a growing volume of endpoints, and dealing with an increasing number of security threats.
Posted: 05 Mar 2015 | Published: 05 Mar 2015


Information Security ANZ March 2015
EZINE: Experts at Dell and Dimension data in Australia discuss the challenge of securing the end point.
Posted: 05 Mar 2015 | Published: 05 Mar 2015


Information Security Magazine – The Hunt for Data Analytics
EZINE: Big data and analytics show promise for better threat detection. Should these technologies be combined with SIEM products, or is it time to move beyond these high alert systems?
Posted: 02 Mar 2015 | Published: 02 Mar 2015


The Essential Guide for Threat Intelligence Services: What to Look For
EBOOK: This Buyer's Essential guide explains what you need to know if you're in the market for a threat intelligence service. It outlines the must-have features, like a threat intelligence score, and also explains what you need to do to ensure you benefit as much as possible from adding a threat intelligence feed to your security system.
Posted: 27 Feb 2015 | Published: 27 Feb 2015


Who's in Your Wallet? Stemming Credit Card Fraud
EBOOK: Access this technical guide and learn about the standards the payment card industry uses to mitigate the problem including the costs of such standards to your business. Find out the latest info on credit card fraud, industry guidance and how to optimize your system for legitimate customers.
Posted: 13 Feb 2015 | Published: 13 Feb 2015


In denial about DDoS: Defense planning falls short
EZINE: In this expert e-guide, you will learn the finer points of DDoS attacks and what your organization needs to do to protect itself.
Posted: 02 Feb 2015 | Published: 30 Jan 2015


The Transformation of Wireless Network Security
EBOOK: This expert guide outlines what you need to know in order to integrate Wi-Fi security into your overarching network security strategy. Read on to learn about how to effectively maintain robust security in the age of wireless connectivity.
Posted: 10 Dec 2014 | Published: 10 Dec 2014


Can virtual data centers (still) be secured by conventional methods?
EZINE: The winners of Information Security magazine's Security 7 awards are announced. The Security 7 awards honor CISOs, security researchers and others at the top of their profession.
Posted: 01 Dec 2014 | Published: 01 Dec 2014


Information Security Magazine – November 2014
EZINE: The votes are tallied. More than 1,700 security practitioners participated in our Security Readers' Choice Awards 2014. Did your tools make the cut?
Posted: 07 Nov 2014 | Published: 07 Nov 2014


What to Look for in Web Application Firewall Products
EBOOK: In this buyer's guide, experts explain how a WAF works, describe the features that different WAFs possess, and reveal how to weight these factors in selecting the right WAF to protect your enterprise's sensitive data.
Posted: 07 Nov 2014 | Published: 07 Nov 2014


Endpoint protection: Whitelisting and Beyond
EBOOK: Application whitelisting is a valuable security tool but it's riddled with complexity. This handbook takes a look at whitelisting capabilities, with an eye to the NIST cybersecurity framework and suggests best practices for implementing or managing a whitelist in your enterprise.
Posted: 05 Nov 2014 | Published: 05 Nov 2014


Information Security ASEAN November 2014
EZINE: High profile Cyber security breaches in Singapore and Malaysia have focused minds and budgets on developing IT security skills.
Posted: 03 Nov 2014 | Published: 03 Nov 2014


Information Security ANZ November
EZINE: In this expert e-zine, learn how industry leaders like Symantec, CSC and BAE Systems are expanding Australian facilities and working to stake their claim in the face of rising threats and a diminishing skills-base. Additionally, learn about operational challenges as cyber security gets "censored" and how open source security needs serious help.
Posted: 03 Nov 2014 | Published: 03 Nov 2014


Why Corporate Data Security Requires a Major Policy Shift in the Age of BYOD
WHITE PAPER: Transitioning from Mobile Device Management (MDM) to Enterprise Mobile Management (EMM) can be daunting. Explore the key differences between EMM and MDM, how EMM features support security objectives, strategies to align EMM and MIS departments, and more.
Posted: 15 Oct 2014 | Published: 15 Oct 2014


Putting Security on Auto-Pilot: What Works, What Doesn't
EBOOK: This technical guide examines the pros, cons, and unknowns of automated penetration testing, from how best to use one to the components of your security system that will still require human intervention.
Posted: 14 Oct 2014 | Published: 14 Oct 2014