Search Results: 150 Articles Found for Security

Header

Tech Top6

1) How to Measure the Cost of Risk (White Paper)
Source: JupiterOne
Category:Security
Author: Mark Miller, JupiterOne & Caroline Wong @ Cobalt
Posting Date: 2021-05-23
Publish Date: 2021-05-19
PDF   White Paper 
 

2) Cyberthreats: A 20-Year Retrospective (White Paper)
Source: SOPHOS
Category:Security
Author: John Shier, Sr Security Advisor @ Sophos
Posting Date: 2021-02-10
Publish Date: 2021-02-10
PDF   White Paper 
 

3) Adopting Encrypted DNS in Enterprise Environments (White Paper)
Source: NSA
Category:Security
Posting Date: 2021-01-15
Publish Date: 2021-01-15
PDF   White Paper 
 

4) What is the Difference Between SOC 2 Privacy & SOC 2 Confidentiality (White Paper)
Source: ByteChek
Category:Security
Author: AJ Yawn, Co-Founder and CEO @ ByteChek
Posting Date: 2020-11-15
Publish Date: 2020-11-12
PDF   White Paper 
 

5) Data Integrity: Recovering from Ransomware and Other Destructive Events (White Paper)
Source: NIST
Category:Security
Posting Date: 2020-09-23
Publish Date: 2020-09-23
PDF   White Paper 
 

6) Type of Phishing Attacks You Need to Know to Stay Safe (White Paper)
Source: Carbonite & WebRoot
Category:Security
Posting Date: 2020-08-22
Publish Date: 2020-08-22
PDF   White Paper 
 

7) Zero Trust Architecture (White Paper)
Source: NIST
Category:Security
Author: Scott Rose, Oliver Borchert, Sean Connelly
Posting Date: 2020-08-14
Publish Date: 2020-08-14
PDF   White Paper 
 

8) Do AI and Machine Learning Make a Difference in Cybersecurity? (White Paper)
Source: WebRoot
Category:Security
Posting Date: 2020-07-12
Publish Date: 2020-07-12
PDF   White Paper 
 

9) Cyber-Risk Oversight 2020 (White Paper)
Source: NACD - National Association of C
Category:Security
Author: Larry Clinton, President & CEO, Internet Security Alliance
Posting Date: 2020-06-12
Publish Date: 2020-06-12
PDF   White Paper 
 

10) Beginner’s Guide to Threat Intelligence (White Paper)
Source: AT&T Cybersecurity
Category:Security
Posting Date: 2020-06-04
Publish Date: 2020-06-04
PDF   White Paper 
 

11) Cyber Essentials Toolkit - Essential Element: Yourself, the Leader (White Paper)
Source: CISA
Category:Security
Posting Date: 2020-05-29
Publish Date: 2020-05-29
PDF   White Paper 
 

12) Guidelines for Managing the Security of Mobile Devices in the Enterprise (White Paper)
Source: NIST
Category:Security
Author: Joshua Franklin, Gema Howell, Vincent Sritapan, Murugiah Souppay
Posting Date: 2020-05-23
Publish Date: 2020-05-23
PDF   White Paper 
 

13) Know Your Enemy. Know Your Risk. (White Paper)
Source: eSentire Inc.
Category:Security
Posting Date: 2020-04-27
Publish Date: 2020-04-27
PDF   White Paper 
 

14) Cost of a Data Breach Report 2019 (White Paper)
Source: IBM
Category:Security
Posting Date: 2020-04-09
Publish Date: 2020-04-09
PDF   White Paper 
 

15) How-to Guide: Security Operations Centers (White Paper)
Source: AT&T Cybersecurity
Category:Security
Posting Date: 2020-04-03
Publish Date: 2020-04-03
PDF   White Paper 
 

16) Legal Considerations when Gathering Online Cyber Threat Intelligence and Purchasing Data from Illici (White Paper)
Source: US Department of Justice (DoJ)
Category:Security
Author: Cybersecurity Unit
Posting Date: 2020-03-03
Publish Date: 2020-02-28
PDF   White Paper 
 

17) The Art of Recognizing and Surviving SOC Burnout (White Paper)
Source: Siemplify
Category:Security
Posting Date: 2020-02-24
Publish Date: 2020-02-24
PDF   White Paper 
 

18) 14-Page Guide to the Current State of Ransomware (White Paper)
Source: Datto
Category:Security
Posting Date: 2020-02-17
Publish Date: 2020-02-17
PDF   White Paper 
 

19) Cybersecurity and Resiliency Observations (White Paper)
Source: U.S. Securities And Exchange Com
Category:Security
Author: Office of Compliance Inspections and Examinations
Posting Date: 2020-01-29
Publish Date: 2020-01-29
PDF   White Paper 
 

20) Detect and Stop Advanced Threats Faster to Reduce Security Risk (White Paper)
Source: ESG
Category:Security
Author: Christina Richmond, Principal Analyst @ ESG
Posting Date: 2020-03-23
Publish Date: 2020-01-22
PDF   White Paper 
 

21) The New Norm: Trend Micro Security Predictions for 2020 (White Paper)
Source: Trend Micro
Category:Security
Posting Date: 2019-12-19
Publish Date: 2019-12-18
PDF   White Paper 
 

22) The Road Ahead: Cyber Security In 2020 and Beyond (White Paper)
Source: FireEye
Category:Security
Posting Date: 2019-12-18
Publish Date: 2019-12-18
PDF   White Paper 
 

23) How Ransomware Attacks (White Paper)
Source: Sophos
Category:Security
Author: Mark Loman, Director, Engineering @ Sophos
Posting Date: 2019-11-16
Publish Date: 2019-11-16
PDF   White Paper 
 

24) 2019 Insider Threat Report (White Paper)
Source: Haystax
Category:Security
Posting Date: 2019-11-09
Publish Date: 2019-11-09
PDF   White Paper 
 

25) Five Steps to a Zero Trust Security Strategy (White Paper)
Source: IONIC
Category:Security
Author: Stephanie Balaouras, Forreste VP Research Director for Security
Posting Date: 2019-11-08
Publish Date: 2019-11-08
PDF   White Paper 
 

26) The Ultimate Guide to CISSP (White Paper)
Source: (ISC)²
Category:Security
Posting Date: 2019-10-30
Publish Date: 2019-10-30
PDF   White Paper 
 

27) The Threat Intelligence Handbook: Moving Toward a Security Intelligence Program.” (White Paper)
Source: WebRoot
Category:Security
Author: Gartner
Posting Date: 2019-10-29
Publish Date: 2019-10-29
PDF   White Paper 
 

28) Managed Detection and Response (MDR) Services (White Paper)
Source: AT&T Cybersecurity
Category:Security
Posting Date: 2019-10-25
Publish Date: 2019-10-25
PDF   White Paper 
 

29) Stratis Blockchain Solutions (White Paper)
Source: Stratis Platform
Category:Security
Author: Chris Trew, Guy Brandon and Nicolas Dorier
Posting Date: 2019-10-25
Publish Date: 2019-10-25
PDF   White Paper 
 

30) Datto’s Global State of the Channel Ransomware Report (White Paper)
Source: Datto
Category:Security
Posting Date: 2019-10-24
Publish Date: 2019-10-24
PDF   White Paper 
 

31) Streamlining the Major Incident Resolution Process: Define, Plan, Staff and Communicate (White Paper)
Source: everbridge
Category:Security
Posting Date: 2019-10-24
Publish Date: 2019-10-24
PDF   White Paper 
 

32) The Essential Cybersecurity Toolkit for SMBs (White Paper)
Source: Datto
Category:Security
Posting Date: 2019-10-22
Publish Date: 2019-10-22
PDF   White Paper 
 

33) CIS Controls Version 7 (White Paper)
Source: Center for Internet Security
Category:Security
Posting Date: 2019-10-20
Publish Date: 2019-10-20
PDF   White Paper 
 

34) CIS 20 (White Paper)
Source: Center for Internet Security
Category:Security
Posting Date: 2019-10-20
Publish Date: 2019-10-20
PDF   White Paper 
 

35) Securing the Digital Business (White Paper)
Source: RSA
Category:Security
Author: Gartner, Inc.
Posting Date: 2019-10-09
Publish Date: 2019-10-09
PDF   White Paper 
 

36) The US Department of Homeland Security's Office 365 Security Best Practices (White Paper)
Source: ManageEngine
Category:Security
Posting Date: 2019-10-03
Publish Date: 2019-10-03
PDF   White Paper 
 

37) Guide to Cybersecurity (White Paper)
Source: Law Society of Scotland
Category:Security
Posting Date: 2019-10-03
Publish Date: 2019-10-03
PDF   White Paper 
 

38) SIEM +Threat Intelligence: Quickly Identify the Threats that Matter to You (White Paper)
Source: ThreatConnect
Category:Security
Posting Date: 2019-10-01
Publish Date: 2019-10-01
PDF   White Paper 
 

39) Ransomware (White Paper)
Source: Department of Homeland Security
Category:Security
Posting Date: 2020-02-06
Publish Date: 2019-09-30
PDF   White Paper 
 

40) Peer-to-Peer Financial Protection based on Blockchain Technology (White Paper)
Source: Sagittae
Category:Security
Author: Robert Volkert, CEO & Founder @ Sagittae
Posting Date: 2019-09-02
Publish Date: 2019-09-27
PDF   White Paper 
 

41) Streamlining Threat Detection Through User Behavior Analytics (White Paper)
Source: ADAudit Plus
Category:Security
Posting Date: 2019-09-24
Publish Date: 2019-09-24
PDF   White Paper 
 

42) Enterprise Endpoint Protection Buyers Guide (White Paper)
Source: Malwarebytes
Category:Security
Posting Date: 2019-09-13
Publish Date: 2019-09-13
PDF   White Paper 
 

43) How To Develop the Best Plan of Attack™ (White Paper)
Source: Endgame
Category:Security
Author: Mark Dufresne, VP of Research @ Endgame
Posting Date: 2019-09-04
Publish Date: 2019-09-04
PDF   White Paper 
 

44) 8 Types of Digital Risk and How to Manage Them (White Paper)
Source: RSA
Category:Security
Posting Date: 2019-08-28
Publish Date: 2019-08-28
PDF   White Paper 
 

45) Countering Escalating Cyberthreats with a New Security Architecture (White Paper)
Source: Gigamon
Category:Security
Posting Date: 2019-08-21
Publish Date: 2019-08-21
PDF   White Paper 
 

46) The Sharing Economy – The Seven Challenges of Online Identity Verification (White Paper)
Source: EVIDENT
Category:Security
Posting Date: 2019-08-19
Publish Date: 2019-08-19
PDF   White Paper 
 

47) The Threat Intelligence Handbook (White Paper)
Source: WebRoot
Category:Security
Author: Gartner
Posting Date: 2019-08-15
Publish Date: 2019-08-15
PDF   White Paper 
 

48) Identity Powered Security (White Paper)
Source: APORETO
Category:Security
Posting Date: 2019-08-12
Publish Date: 2019-08-12
PDF   White Paper 
 

49) What Every Security Leader Needs to Know Handbook (White Paper)
Source: HackerOne
Category:Security
Posting Date: 2019-08-12
Publish Date: 2019-08-12
PDF   White Paper 
 

50) Cognitions of a Cybercriminal (White Paper)
Source: Carbon Black
Category:Security
Author: Tom Kellermann Cybersecurity Officer@ Carbon Black
Posting Date: 2019-08-30
Publish Date: 2019-07-31
PDF   White Paper 
 

51) Your First IT Security Job: Three Things that Might Surprise You (White Paper)
Source: Hewlett Packard Enterprise
Category:Security
Author: Josh Fruhlinger, Contributing Writer
Posting Date: 2019-09-16
Publish Date: 2019-07-19
PDF   White Paper 
 

52) Buyers Guide: Identity, Access and API Management Solutions (White Paper)
Source: CA Technologies
Category:Security
Author: Steve Firestone
Posting Date: 2019-07-12
Publish Date: 2019-07-12
PDF   White Paper 
 

53) APAC Guide Yo Plugging Endpoint Security Gaps (White Paper)
Source: ComputerWeekly
Category:Security
Posting Date: 2019-07-11
Publish Date: 2019-07-11
PDF   White Paper 
 

54) Preparing For a Data Breach: Not If, But When (White Paper)
Source: A-LIGN
Category:Security
Author: Petar Besalev, SVP Cybersecurity and Privacy Services @ A-LIGN
Posting Date: 2019-12-13
Publish Date: 2019-07-11
PDF   White Paper 
 

55) Data-at-rest Encryption (White Paper)
Source: DATACORE SOFTWARE
Category:Security
Posting Date: 2019-07-09
Publish Date: 2019-07-09
PDF   White Paper 
 

56) Why, When & How to Implement Employee Monitoring (White Paper)
Source: Interfocus
Category:Security
Posting Date: 2019-07-09
Publish Date: 2019-07-09
PDF   White Paper 
 

57) Zero Trust Security: A New Paradigm for a Changing World (White Paper)
Source: CENTRIFY
Category:Security
Posting Date: 2019-07-09
Publish Date: 2019-07-09
PDF   White Paper 
 

58) Law Firm CyberSecurity (White Paper)
Source: Discovery Computers and Forensic
Category:Security
Author: Rod Mac Kenzie
Posting Date: 2019-07-08
Publish Date: 2019-07-08
PDF   White Paper 
 

59) Cyber Security Report (White Paper)
Source: CSC
Category:Security
Author: Ken Linscott, Quinn Taggart, Letitia Thian
Posting Date: 2019-07-05
Publish Date: 2019-06-26
PDF   White Paper 
 

60) The SMBs Guide to Modern Identity (White Paper)
Source: LogMeIn, Inc
Category:Security
Posting Date: 2020-04-27
Publish Date: 2019-06-26
PDF   White Paper 
 

61) Ransomware: to Pay Or Not to Pay (White Paper)
Source: JLT Specialty Limited
Category:Security
Author: Sarah Stephens
Posting Date: 2019-06-17
Publish Date: 2019-06-17
PDF   White Paper 
 

62) Cybersecurity Capability Maturity Model (C2M2) (White Paper)
Source: US Department of Energy
Category:Security
Posting Date: 2020-07-31
Publish Date: 2019-06-16
PDF   White Paper 
 

63) Understanding DNS: Essential Knowledge for All IT Professionals, White Paper (White Paper)
Source: AppliedTrust
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-06-13
PDF   White Paper 
 

64) Fighting ATO Attacks, White Paper (White Paper)
Source: riskified
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-06-12
PDF   White Paper 
 

65) Improving the Effectiveness of the Security Operations Center (White Paper)
Source: Ponemon Institute
Category:Security
Author: Devo Technology
Posting Date: 2019-08-26
Publish Date: 2019-06-12
PDF   White Paper 
 

66) Defending Against Crypto-Ransomware, White Paper (White Paper)
Source: netwrix
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-06-11
PDF   White Paper 
 

67) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 1, What Is Securit (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-06-08
PDF   White Paper 
 

68) The Smarter SMB's Guide to Ransomware, White Paper (White Paper)
Source: Barracuda
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-06-06
PDF   White Paper 
 

69) A Beginner's Guide To Ransomware, White Paper (White Paper)
Source: Unitrends
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-06-06
PDF   White Paper 
 

70) The Comprehensive Guide to Ransomware Protection, White Paper (White Paper)
Source: Invenio IT
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-06-06
PDF   White Paper 
 

71) Learning to Rank Strings Output for Speedier Malware Analysis, Blog (White Paper)
Source: Fireeye
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-06-02
PDF   White Paper 
 

72) Evaluating Identity Verification Solutions, White Paper (White Paper)
Source: onfido
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-06-01
PDF   White Paper 
 

73) Choosing the Right Security Orchestration, Automation, and Response Platform, White Paper (White Paper)
Source: Splunk
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-31
PDF   White Paper 
 

74) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 2 - Usability and (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

75) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 3 - Protocols, Whi (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

76) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 4 - Access Control (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

77) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 6 - Distributed Sy (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

78) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 5 - Cryptography, (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

79) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 7 - Economics, Whi (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

80) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 8 - Multilevel Sec (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

81) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 9 - Multilateral S (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

82) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 10 - Banking and B (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

83) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 11 - Physical Secu (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

84) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 12 - Monitoring an (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

85) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 13 - Nuclear Comma (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

86) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 14 - Security Prin (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

87) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 15 - Biometrics, W (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

88) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 16 - Physical Tamp (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

89) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 17 - Emission Secu (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

90) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 18 - API Attacks, (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

91) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 19 - Electronic an (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

92) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 20 - Telecom Syste (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

93) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 21, Network Attack (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

94) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 22 - Copyright and (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

95) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 23 - The Bleeding (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

96) Security Engineering: A Guide to Building Dependable Distributed Systems, 3 Chapter 24 - Terror, Jus (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

97) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 25 - Managing the (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

98) NIST Recommendation for Key Management: Part 2: Best Practices, White Paper (White Paper)
Source: NIST
Category:Security
Posting Date: 2019-06-12
Publish Date: 2019-05-27
PDF   White Paper 
 

99) NIST Recommendation for Key Management Part 3: Application-Specific, White Paper (White Paper)
Source: NIST
Category:Security
Posting Date: 2019-06-12
Publish Date: 2019-05-27
PDF   White Paper 
 

100) NIST Recommendation for Key Management Part 1: General, White Paper (White Paper)
Source: NIST
Category:Security
Posting Date: 2019-06-12
Publish Date: 2019-05-26
PDF   White Paper 
 

101) The Growing Consequences of Security Breaches, White Paper (White Paper)
Source: Rhythmic
Category:Security
Posting Date: 2019-06-12
Publish Date: 2019-05-23
PDF   White Paper 
 

102) Beginners Guide to Encryption and Key Management, White Paper (White Paper)
Source: NetLib Security
Category:Security
Posting Date: 2019-06-12
Publish Date: 2019-05-23
PDF   White Paper 
 

103) 7 Experts on Threat and Vulnerability Management, White Paper (White Paper)
Source: RiskSense, Inc
Category:Security
Posting Date: 2019-06-12
Publish Date: 2019-05-16
PDF   White Paper 
 

104) Everything You Always Wanted to Know About Security at the Edge But Were Afraid to Ask (White Paper)
Source: Akamai
Category:Security
Posting Date: 2019-09-13
Publish Date: 2019-05-13
PDF   White Paper 
 

105) Medical Device Encryption & Security, White Paper (White Paper)
Source: NetLib Security
Category:Security
Posting Date: 2019-06-12
Publish Date: 2019-05-08
PDF   White Paper 
 

106) Explore Why Identity Proofing is Key to Avoiding Identity Theft, White Paper (White Paper)
Source: Evident
Category:Security
Posting Date: 2019-05-16
Publish Date: 2019-05-06
PDF   White Paper 
 

107) 2019 Webroot Threat Report, White Paper (White Paper)
Source: WebRoot
Category:Security
Posting Date: 2019-05-16
Publish Date: 2019-05-03
PDF   White Paper 
 

108) Security as a Service Has Arrived, White Paper (White Paper)
Source: Armour
Category:Security
Posting Date: 2019-05-16
Publish Date: 2019-05-01
PDF   White Paper 
 

109) Authentication for Your Ever-Changing Needs, White Paper (White Paper)
Source: Micro Focus
Category:Security
Posting Date: 2019-05-16
Publish Date: 2019-05-01
PDF   White Paper 
 

110) Becoming the Security Team Your Business Needs, White Paper (White Paper)
Source: BAE Systems
Category:Security
Posting Date: 2019-04-10
Publish Date: 2019-04-30
PDF   White Paper 
 

111) Encryption: A Guide for Business Leaders. White Paper (White Paper)
Source: TechRepublic
Category:Security
Posting Date: 2019-05-16
Publish Date: 2019-04-29
PDF   White Paper 
 

112) A Guide To Assessing Security Maturity, White Paper (White Paper)
Source: InformationWeek
Category:Security
Posting Date: 2019-04-10
Publish Date: 2019-04-09
PDF   White Paper 
 

113) Why Security Awareness Training is an Essential Part of Your Security Strategy (White Paper)
Source: WebRoot
Category:Security
Posting Date: 2019-04-10
Publish Date: 2019-03-25
PDF   White Paper 
 

114) Distributed Denial Of Service Threats: Risks, Mitigation, and Best Practices (White Paper)
Source: Cisco Systems
Category:Security
Posting Date: 2019-03-11
Publish Date: 2019-03-21
PDF   White Paper 
 

115) Global Threat Intelligence Report (White Paper)
Source: NTT Security
Category:Security
Posting Date: 2020-03-10
Publish Date: 2019-03-10
PDF   White Paper 
 

116) Blockchain White Paper (White Paper)
Source: National Archives
Category:Security
Posting Date: 2019-03-11
Publish Date: 2019-03-05
PDF   White Paper 
 

117) Ransomware To Pay Or Not To Pay (White Paper)
Source: JLT Specialty Limited
Category:Security
Author: Sarah Stephens
Posting Date: 2019-07-06
Publish Date: 2019-02-28
PDF   White Paper 
 

118) Security Orchestration and Incident Response (White Paper)
Source: TechRepublic
Category:Security
Posting Date: 2019-02-12
Publish Date: 2019-02-15
PDF   White Paper 
 

119) Investigation or Exasperation? The State of Security Operations (White Paper)
Source: IDC
Category:Security
Posting Date: 2019-02-12
Publish Date: 2019-02-04
PDF   White Paper 
 

120) Our Own Worst Enemy: Tackling the Social Engineering Problem (White Paper)
Source: RSA Conference
Category:Security
Author: Ira Winkler, Lance Hayden, Britta Glade, Dr Hugh Thompson
Posting Date: 2019-09-16
Publish Date: 2018-12-18
PDF   White Paper 
 

121) 15 Skills You Need to Be a Whitehat Hacker And Make Up to $145K Per Year (White Paper)
Source: TechRepublic
Category:Security
Posting Date: 2018-12-24
Publish Date: 2018-12-15
PDF   White Paper 
 

122) The State Of Email Security (White Paper)
Source: Mimecast Limited
Category:Security
Posting Date: 2018-12-24
Publish Date: 2018-12-14
PDF   White Paper 
 

123) The Cybersecurity Insight Report (White Paper)
Source: CDW
Category:Security
Posting Date: 2019-12-07
Publish Date: 2018-12-07
PDF   White Paper 
 

124) Blockchain Applications for Identity Verification (White Paper)
Source: Evident
Category:Security
Posting Date: 2018-12-24
Publish Date: 2018-11-28
PDF   White Paper 
 

125) Fundamental Concepts of Cyber Resilience: Introduction and Overview (White Paper)
Source: US Army R&D Center
Category:Security
Posting Date: 2018-12-24
Publish Date: 2018-11-26
PDF   White Paper 
 

126) Would You Know if You've Been Breached? (White Paper)
Source: thycotic
Category:Security
Posting Date: 2018-11-02
Publish Date: 2018-11-18
PDF   White Paper 
 

127) AI and Cybersecurity for Dummies (White Paper)
Source: IBM
Category:Security
Posting Date: 2018-11-02
Publish Date: 2018-11-16
PDF   White Paper 
 

128) Zero Trust Security For Dummies (White Paper)
Source: Centrify
Category:Security
Posting Date: 2018-11-02
Publish Date: 2018-11-09
PDF   White Paper 
 

129) Gaining Ground On The Cyber Attacker (White Paper)
Source: Accenture
Category:Security
Posting Date: 2018-11-02
Publish Date: 2018-11-04
PDF   White Paper 
 

130) Internet Security Threat Report (White Paper)
Source: Symantec
Category:Security
Posting Date: 2018-11-02
Publish Date: 2018-10-29
PDF   White Paper 
 

131) The Changing Face of Cyber Attacks (White Paper)
Source: Neustar, Inc.
Category:Security
Posting Date: 2018-11-02
Publish Date: 2018-10-29
PDF   White Paper 
 

132) Endpoint Security Report (White Paper)
Source: NYOTRON
Category:Security
Author: Holger Schulze, Founder & CEO @ Cybersecurity Insiders
Posting Date: 2019-10-28
Publish Date: 2018-10-28
PDF   White Paper 
 

133) The Five News Headlines You Don't Want to Be About YOUR Organization (White Paper)
Source: Juniper Networks
Category:Security
Posting Date: 2018-10-23
Publish Date: 2018-10-25
PDF   White Paper 
 

134) Collaborating for Change in Cybersecurity (White Paper)
Source: ATLAS Council
Category:Security
Posting Date: 2018-10-23
Publish Date: 2018-10-12
PDF   White Paper 
 

135) Vendor Security Assessment: 40 Questions To Address (White Paper)
Source: BitSight Technologies
Category:Security
Posting Date: 2018-10-23
Publish Date: 2018-10-10
PDF   White Paper 
 

136) There is No Peacetime from Advanced DDoS Attacks (White Paper)
Source: NetScout Systems
Category:Security
Posting Date: 2019-10-09
Publish Date: 2018-09-18
PDF   White Paper 
 

137) Market Guide for User and Entity Behavior Analytics (White Paper)
Source: Gartner
Category:Security
Author: Gorka Sadowski, Avivah Litan, Toby Bussa, Tricia Phillips
Posting Date: 2019-09-27
Publish Date: 2018-04-23
PDF   White Paper 
 

138) Framework for Improving Critical Infrastructure Cybersecurity (White Paper)
Source: NIST
Category:Security
Posting Date: 2019-08-20
Publish Date: 2018-04-16
PDF   White Paper 
 

139) NIST Cybersecurity Framework (White Paper)
Source: NIST
Category:Security
Posting Date: 2019-12-19
Publish Date: 2018-04-11
PDF   White Paper 
 

140) IoT Security Needs a White Knight (White Paper)
Source: Network World
Category:Security
Posting Date: 2018-01-15
Publish Date: 2018-01-15
PDF   White Paper 
 

141) Who Needs Malware? How Adversaries Use Fileless Attacks to Evade Your Security (White Paper)
Source: CrowdStrike
Category:Security
Posting Date: 2019-08-13
Publish Date: 2017-08-16
PDF   White Paper 
 

142) Ransomware Defense for Dummies (White Paper)
Source: Cisco Systems
Category:Security
Author: Lawrence C. Miller
Posting Date: 2020-06-19
Publish Date: 2017-06-19
PDF   White Paper 
 

143) Quantum Computing Has the Cybersecurity World White-Knuckled (White Paper)
Source: ComputerWorld
Category:Security
Posting Date: 2016-09-19
Publish Date: 2016-09-07
PDF   White Paper 
 

144) 3 Ways to Fight Fraud (White Paper)
Source: Vantiv
Category:Security
Posting Date: 2019-08-24
Publish Date: 2016-08-24
PDF   White Paper 
 

145) Guide to Enterprise Telework, Remote Access, and Bring Your Own Device (BYOD) Security (White Paper)
Source: NIS
Category:Security
Posting Date: 2020-05-23
Publish Date: 2016-07-23
PDF   White Paper 
 

146) The Fundamental Guide to Building a Better Security Operation Center (White Paper)
Source: Cisco Systems
Category:Security
Posting Date: 2019-10-07
Publish Date: 2015-09-10
PDF   White Paper 
 

147) Introduction to Security Operations and the SOC (White Paper)
Source: CISCO SYSTEMS
Category:Security
Posting Date: 2020-04-03
Publish Date: 2015-09-10
PDF   White Paper 
 

148) At What Point Do White Hat Hackers Cross the Ethical Line? (White Paper)
Source: Network World
Category:Security
Posting Date: 2015-08-01
Publish Date: 2015-08-14
PDF   White Paper 
 

149) Manage Risk By Protecting Apps, Data and Usage (White Paper)
Source: Citrixx
Category:Security
Posting Date: 2019-08-04
Publish Date: 2015-08-04
PDF   White Paper 
 

150) CISOs Look to Hire White Hat Hackers to Head Off Security Breaches (White Paper)
Source: IT World
Category:Security
Posting Date: 2014-06-12
Publish Date: 2014-06-04
PDF   White Paper 
 


0 Articles Added in the Last 7 Days
20,492 Articles with 17,726 subscribers
4,758 C-Level and 11,642 LinkedIn Connections


“The only system which is truly secure is one which is switched off and unplugged locked in a titanium lined safe, buried in a concrete bunker, and is surrounded by nerve gas and very highly paid armed guards. Even then, I wouldn’t stake my life on it.”
- Gene Spafford - Professor at Purdue, recognized expert in InfoSec/Cybersecurity -
The only IT and Data Center Newsletter that is 100% unbiased in its content and delivery. We cut through the spin and get to the facts. Clean, unvarnished and fresh. Every week there are more than 400 online sources that contain articles of interest to IT and DC Professionals at all levels. We harvest and compile 40+ of the absolute best technical articles with no pop-up ads or sales angles. We address everyday IT and Data Center issues involving:
  • Reducing Business and IT Risk
  • Improving Infrastructure Quality of Service
  • Increasing Availability and Reliability
  • Reducing Application Response Time
  • Increasing Business Productivity and Agility
  • Improving Server, Storage and Networks
  • Improving Security and Compliance
  • Protecting, Preserving and Restoring Data
  • Improving Regulatory Compliance
  • Reducing Audit Errors
  • Reducing IT and DC Costs
  • Developing Proactive Business Solutions
Header

Tech Top6

Copyright © 2019 Promethean Data Solutions, Inc.   -   Warren Avery   -   602-463-6558   -   wavery@ITWeeklyNewsletter.com