White Papers by Topic: Security

Resources available: 336

Advanced Evasion Techniques for Dummies

Advanced evasions will break the security protection model that most organizations are using today. Given this changing threat landscape we need to rethink traditional security models. Here's advice on how to evade AETs.

Top 10 Reasons to Strengthen Information Security with Desktop Virtualization

Explore ten reasons why virtual desktops should be the foundation of your layered approach to information security.

Transforming Security: Designing a State-of-the-Art Extended Team

The information security mission is no longer about implementing and operating controls.

The Big Data Security Analytics Era Is Here

New security risks and old security challenges often overwhelm legacy security controls and analytical tools.

Building an Intelligence-Driven Security Operations Center

The openness of today's networks and the growing sophistication of advanced threats make it almost impossible to prevent cyber attacks and intrusions.

Taking Charge of Security in a Hyperconnected World

In today's highly interconnected business environment, information security can no longer be an isolated endeavor: it's the responsibility of an entire business ecosystem or value-chain.

The Critical Incident Response Maturity Journey

As organizations rebalance their security defenses to combat today's sophisticated threats, they're recognizing that centralized incident response capabilities are key.

Advanced Attacks Demand New Defenses

Cyber-criminals wielding APTs have plenty of innovative techniques to evade network and endpoint defenses. It's scary stuff, and ignorance is definitely not bliss. How to fight back? Think security that's distributed, stratified, and adaptive.

Securing Mobility, From Device to Network

At one time, the process of managing and securing mobile devices and applications was fairly straightforward. Most organizations worried about one application (email) on a single platform (often BlackBerry devices). Those days are long gone. ts.

Data Protection eGuide

In this eGuide, CSO and sister publications IDG News Service, Computerworld, and CIO pull together news, trend, and how-to articles about the increasingly difficult task of protecting corporate data.

©1994-2014 Infoworld, Inc.