Information Security Research Library

Powered by Bitpipe.com

All Research Sponsored By:Dell SecureWorks

  • All the Ingredients for a Solid Security Incident Response Plan

    Access this expert e-guide that presents the crucial steps in creating a solid security incident response plan, and the benefits one will bring to your organization.

  • ISM Essentials Guide – Threat Management

    In this essential guide, gain a complete overview of today's threat landscape. Discover the new platforms – such as mobile devices, social media, and the cloud – that cybercriminals are targeting, learn key antimalware strategies, and more by reading on today.

  • E-Guide: New Malware Threats Require New Antimalware Protection Strategy

    This expert e-guide examines emerging threats and malware that are targeting smartphones, mobile apps, social media, and cloud services. Inside, discover essential strategies and best practices for mitigating these risks and ensuring enterprise security.

  • E-Guide: Clearing Up the Confusion to Prepare for APTs

    Consult this expert e-guide today to learn about the critical risks that cyberwar and advanced persistent threats (APTs) pose to your organization. Discover essential strategies for mitigating these risks by reading on now.

  • 10 Tips for Mobile Application Security

    While the rapid growth of mobility has enabled increased customer satisfaction, operational efficiencies, employee productivity and more; it has also introduced a number of new security challenges. In this paper, uncover 10 must-know tips for deploying secure mobile applications to help you leverage mobility while keeping the bad guys out.

  • Staying Ahead of Cyberthreats: Recommendations for Financial Institutions

    Today’s investment firms and banks continue to struggle with the growing number of security and regulatory challenges they face. This paper explores the serious threats that financial institutions face and what they can do to address them.

  • Stop strategies for preventing network intrusions

    This expert E-Guide will provide you with the steps, processes, and prevention methods to maintain a secure network within your industry.

  • Maintaining security in managed services

    Security management has and will always be a key part of any organization. Whether it’s finding a way to secure data in the cloud or simply within the walls of your own organization, finding and implementing a process is of the utmost importance. This expert E-Guide will discuss important security considerations within a managed services model.

  • Presentation Transcript: Cloud Service Delivery Models - Security Risks and Recommendations

    This presentation transcript examines how different levels of isolation and multi-tenancy in cloud models introduce different risks to organizations leveraging cloud services. We also discuss what organizations can do to address these risks and we recommend ways to deliver an improved security posture to organizations utilizing cloud services.

  • Five Critical Rules for Firewall Management: Lessons from the Field

    This white paper will teach you five things to consider when managing your firewall, and will present you with real life examples of how these five things have helped other organizations improve their firewall management.

  • Threat Analysis: Understanding and Combating DDoS Attacks

    This analysis focuses on the types of attacks generally referred to as distributed denial-of-service, or DDoS, attacks. DDoS attacks are most often used to extort or damage businesses whose websites or online assets are a major source of revenue, are an indicator of brand value, or are critical to operations.

  • The Next Generation of Cybercrime

    This white paper will educate you about a range of different security threats, as well as, the hackers that perpetrated these viruses. You will also receive a list of best practices for protecting your organization the right way.

  • The Essentials Series: Security Information Management

    This collection of articles from Realtime Publishers presents a clear and concise overview of security information management (SIM). The articles present the business case for SIM, operational and organizational issues, and hints and tips for ensuring a successful SIM implementation.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

Information Security Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.