White Papers by Topic: Security

Resources available: 198

IT Security by the Numbers: Calculating the Total Cost of Protection

Humorist Franklin P. Jones may have said it best: "When you get something for nothing, you just haven't been billed for it yet." These are wise words of warning for businesses counting on so-called "free" IT security software.

Mapping Organizational Roles & Responsibilities for Social Media Risk

Social media has introduced a wide array of opportunities for organizations to engage with customers, employees and partners. But with these opportunities come risks.

Secure Your Social Organization

Teams throughout your enterprise are creating new social media accounts and adopting their own platforms to manage them.

5 Step Guide to Social Media Security

As businesses embrace social media, related security breaches are on the rise. Corporate Twitter hackings. Rogue employees on the company Facebook account. Executives sharing confidential info on their personal accounts.

Social Media in Technology: A Unified Strategy for Success

Find out how social media is sparking a new era of customer and industry-understanding in technology enterprises and how industry leaders are overcoming the challenges of integrating social media across their organization.

Security in the Cloud

The main obstacle to enterprise cloud deployment, according to a new survey of more than 350 IT executives by Unisys and IDG Research, is security. What can enterprise IT professionals do to help make their cloud deployments more secure?

A user-centric path to mobile security

Mobile technology has revolutionized the way millions of people do their jobs. Employees now have unprecedented levels of flexibility, including the ability to work anytime from anywhere.

SBIC: Transforming Information Security

This report combines perspectives on technologies with experience in strategy to help security teams navigate complex decisions regarding technology deployments while maximizing investments.

Cybersecurity for Dummies eBook

This book provides an in-depth examination of real-world attacks and APTs, the shortcomings of legacy security solutions, the capabilities of next-generation firewalls, and security best practices

©1994-2014 Infoworld, Inc.