Infosecurity White Papers
Tokenless Two-Factor Authentication: It Finally Adds Up
For most companies, information security is a top priority. Demand for protecting data and employee confidentiality is continuing to grow, especially in industries that require a regulatory-compliant environment. However, applying user names and passwords for authentication is insufficient.
New Data Storage Options & Services
The archiving market continues to expand as ‘cool’ vendors enter with new storage options and services that make archiving more cost-effective and ease the migration of older data.
Preventing Data Breaches in Privileged Accounts Using Access Control
It is critical that organizations are proactive in their approach to mitigating insider threats. Week-after week there are disturbing, déjà vu-like stories of significant data breaches, arrests connected to insider attacks, or investigation reports emphasizing the necessity to control privileged accounts that hold highly sensitive data.
State of Resilience & Optimization on IBM Power Systems
This report includes the input of over 2,000 companies running AIX and IBM i (i5/OS) environments regarding their data protection, recovery and optimization technologies and strategies.
Portable Panic: Evolution of USB Insecurity
Once a mere novelty peripheral, USB storage devices are now as common as the mouse and keyboard. Analysts say by 2010 the market will have shipped 2.8 billion USB-enabled devices. Unfortunately, even as USB devices have evolved into useful storage media, they’ve also turned into a security nightmare for organisations.
10 Things You Really Wished You had Known about PDF Security
Is the PDF security software you are looking to purchase really secure? If the PDF security software you are evaluating can be simply broken, then you might as well save your money.
Document Security: A Guide to Securing Your Documents
When you talk about document security, there are many different ideas as to what security is actually wanted or needed. But the important question is, “what are you trying to achieve?”
Turning the Spotlight on IT’s Dirty Little Secret: Securing the Common Point of Failure in IT Risk Controls
The rise of identity and access management has revolutionized how the enterprise defines a key domain of IT risk control. Access management has become a cornerstone of best practice in IT governance, risk and compliance control — except for the most important access of all, the privileged user for shared administrative accounts, and the embedded application identities found within applications, scripts and application servers.
Outthink the Threat
eBook reports on how data-stealing malware is thwarting enterprise security, and offers solutions to combating these threats.
Reducing the Cost of Achieving PCI Compliance with Lumension® Compliance and IT Risk Management
This whitepaper will examine PCI DSS and explain how Lumension® Compliance and IT Risk Management can help organizations reduce the cost of addressing compliance by streamlining and automating the IT audit process, unifying control and compliance frameworks, automating assessment and remediation processes, and enabling continuous monitoring of their compliance and IT risk management posture.
Realising Compliance
White paper addresses new approach to protecting data, assets and IP.
The Security Implications of Web 2.0
The collaborative benefits of Web 2.0 technologies have fueled rapid growth in online consumer markets and now are being adopted by businesses worldwide. With these technologies come new types of attack vectors.
The Web Hacking Incidents Database 2008: Annual Report
The much anticipated Breach Security Lab’s Web Hacking Incidents Database (WHID) 2008 Annual Report is ready for download.
Vulnerability assessment strategies revealed: a primer for novices and further education for experts
Vulnerability assessment is a complex and wide-ranging subject. This timely and informative white paper will help you understand the subject and learn how to cost-effectively implement the IT security strategy within your organisation. Written by Information security industry veteran Bigfix, this paper will be a valuable addition to your educational resources - download it today.