• Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us

Sign Up

USA | UK | CA | DE | ES | FR | IT | NL | PL | SE | SG | BR
Sign Up
main-logo
  • Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us
  • Sign Up
  • Home
  • |
  • IT Security
flow-image
Proofpoint

The Anatomy of an Insider Threat Investigation

For decades, perimeter-based security strategies have been the starting point for most cybersecurity programs. But in today’s cloud-based, mobile and remote work setting, that perimeter has all but dissolved. Learn how Proofpoint Insider Threat Management can help make your investigations more efficient, detailed...

Published: Dec 21, 2021
View More
flow-image
RSA Security

SANS Review

In this in-depth, review of the RSA NetWitness Platform, SANS explains in clear detail how the evolved SIEM works to address the cybersecurity talent shortage and accelerate threat detection and response. As part of the review, SANS simulated a cyberattack and used RSA NetWitness Platform to detect and investigate it....

View More
flow-image
Palo Alto Networks

Protect yourself from antivirus

Despite attempts to pivot from outdated security methodologies, legacy antivirus continues to fail in preventing security breaches on the endpoint. Although AV satisfies many regulatory, governance and compliance requirements by layering on multiple products, it saddles organizations with hidden costs while providing questionable...

View More
flow-image
Mitel

The Only Certainty is Uncertainty

We cannot anticipate change, although we can bet on its coming, be it from weather, pandemics, socio-political events or economic growth or decline. And we can be prepared to handle it when it does. Today, being ready for anything is mission-critical for all businesses, regardless of industry, size or location. In...

Published: May 11, 2021
View More
flow-image
McAfee

Corporate AV /EPP Comparative Analysis - Exploits Evasion Defences

Cyber criminals do not just develop one attack and then abandon it after one use. Rather, they seek to make their software usable for as long as possible. Evasion techniques allow known threats to circumvent detection by security products. Research indicates that cyber criminals perform their own testing and make...

View More
flow-image
Symantec

Symantec Intelligence Report: August

The monthly intelligence report, provides the latest analysis of cyber security threats, trends, and insights from the Symantec intelligence team concerning malware, spam, and other potentially harmful business risks.

View More
flow-image
AlienVault

The SIEM Evaluator's Guide

When evaluating any technology, it's essential to outline your primary use cases and success factors. This guide provides essential SIEM evaluation criteria, 'Pro Tips' and use cases, plus an overview of how AlienVault Unified Security Management (USM) meets each requirement.

View More
flow-image
Lumension

Endpoint and Mobile Security Buyers Guide

As you move into 2015 endpoint security planning, prioritizing your initiatives can be time consuming. Last year analyst firm, Securosis, offered their thoughts on buying Endpoint Security Management solutions – including patching, configuration, device control and file integrity monitoring – which are increasingly...

View More
flow-image
F5 Networks

10 Steps to Mitigate a DDoS Attack in Real Time

If you don’t stop a distributed denial of service (DDoS) attack right away, your entire system could be compromised. Access this concise guide that breaks down 10 steps to mitigating a DDoS attack as quickly as possible. 

View More
flow-image
GeoTrust

Stop Phishing: A Guide to Protecting Your Web Site Against Phishing Scams

In this guide, you’ll learn more about phishing, why it has become such a widespread problem, and the negative impact that a phishing attack can have on your company and your customers. You’ll also learn how SSL and EV SSL technology can help protect your web site, your business, and ultimately your bottom...

View More
flow-image
Symantec

The Cyber Resilience Blueprint: A New Perspective on Security

This whitepaper presents best practice-based approaches recommended for minimizing cyber risk. These are arranged across five pillars and provide specific actions for each pillar to be performed by identifiable IT jobs. 

View More
flow-image
Proofpoint

An Overview of Insider Threat Management

As organistions move towards a more distributed workforce, the traditional perimeter of the office network is long gone. Changes in workforce dynamics have created a unique set of cybersecurity considerations where people are the new perimeter. It’s more important than ever to build a people-centric insider...

Published: Apr 22, 2021
View More
flow-image
SafeNet

Virtual Private Networks: When Virtual Security is Not Enough

This technical paper is prepared from an interview with Senetas CTO Julian Fay, in which these topics are discussed and practical considerations given for using encryption on VPNs to enhance organizations’ data security.

View More
flow-image
Kaspersky

Who's Spying on You?

In this report, Kaspersky Lab’s cybersecurity experts give you an insight into: • How businesses can suffer from direct – and indirect – cyber-espionage attacks • What you can do to protect your business… and its hard-won reputation • How specific technologies can...

View More
  •  
  •  
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • ...
  •  
  •  
Site Map
  • Home
  • Categories
  • Vendors A-Z
  • Latest Whitepapers
  • Contact Us
  • Privacy
technology topics
  • Cloud Computing
  • Data Center
  • Desktop/Laptop OS
  • Email
  • Hardware
  • IT Management
  • IT Security
  • Mobile Computing
  • Network
  • Software
  • Storage
  • Telecommunications
Contact Us

info@headleymedia.com

Call +44 (0) 1932 564999

Contact Us

© Copyright 2022: Headley Media Technology Division Ltd. Company Number: 112774219

We use cookies to improve user experience on our website. If you continue, we'll assume you are happy for your web browser to receive all cookies from our website. See our cookies policy for more information on cookies and how to manage them
close icon