White Papers by Topic: Security

Resources available: 312

Top 10 Reasons to Strengthen Information Security with Desktop Virtualization

Explore ten reasons why virtual desktops should be the foundation of your layered approach to information security.

Guard data in government environments by implementing continuous diagnostics and mitigation

IBM Security offerings can help federal organizations employ a continuous diagnostics and mitigation approach to enhance and automate continuous network monitoring capabilities. Read this white paper to learn more.

Reduce federal infrastructure risk with compliance management and situational awareness

IBM continuous monitoring and management solutions deliver real-time situational awareness to help federal agencies understand vulnerabilities, and protect the infrastructure.

Combating Identity Theft in a Mobile, Social World

Offering identity theft protection and remediation allows businesses to give their workforce the confidence to efficiently engage while bringing financial reward to the company at large.

After a Breach: Managing Identity Theft Effectively

This white paper from LifeLock Business Solutions notes that FIs in addition to managing fraud should strive to turn a negative event for customers into a positive, relationship-building experience.

Combating Identity Fraud in a Virtual World

This slide presentation reveals findings from the Javelin Strategy & Research 2012 Identity Fraud Report about mobile and social trends, the real risks of identity fraud and what individuals and businesses can do to keep personal information safe.

Why It Pays to Use Electronic Signatures

No matter the size or what type of business you're in, you want to save money and increase revenue. And you want to make it all easy. Electronic signatures are a powerful way to accomplish all that.

Cloud Managed Security: An Evolution in Enterprise Cloud Security

Private cloud techniques extend the protection of corporate governance and policies to the elasticity of a cloud platform- but that doesn't automatically make it secure.

3 Questions to Ask Your DNS Host about Lowering DDoS Risks

Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size.

The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report

This report compares DDoS findings from 2013 to 2012, based on a survey of 440 North American companies, including 139 businesses delivering technology products and/or services such as software, SaaS, IaaS as well as hardware manufacturers

©1994-2014 Infoworld, Inc.