

Every year, the public relations specialists from at least one blue-chip company invariably find themselves working around the clock on a crisis communications effort, attempting to explain to an angry and justifiably fearful public what led to their company compromising customer data.
There’s always an immediate...
Published: Sep 29, 2014


In today’s security landscape, IPSs are in the process of radical change. Established IPS companies are rapidly improving the look and feel of their IPS devices, making them much more management friendly. IPS inputs were once confined to direct packet capture, but now the packet capture function, while still critical,...
Published: Apr 07, 2014


Securing your network requires more than just new hardware and software. It’s about a change in your organization’s culture to a more security-conscious environment. Your staff needs strong and diverse passwords. They have to be aware of every link they click on and every attachment they download. Even the...
Published: Jun 10, 2013


If you deployed your security solution even just last year, you may not be protected from some of today’s most common malware. Today’s attacks are more frequent, more devious and more targeted, successfully penetrating many businesses that consider their security strategies to be more than adequate.
...
Published: Jul 18, 2013


SaaS applications continue to provide a tremendous value to end users with easy setup and collaboration capabilities that are changing the way organizations do business.
The concern over the loss of data leaving the corporate network and opening the network to external threats through unknown collaborators has caused...
Published: Jun 06, 2016


VMware NSX networking and security platform is a key element of VMware’s vision for the Software Defined Data Center.
Trend Micro and VMware are working closely together to develop joint solutions that extend NSX’s core networking and security services with best-ofbreed security deployed with enterprise-class...
Published: Jun 30, 2014


Java was originally released with the slogan “write once, run anywhere,” which was intended to underscore its cross-platform capabilities.
Over time, Java has become ubiquitous on endpoints, so “run anywhere” can be interpreted as referring to its ubiquity. Even as fewer websites and Web applications...
Published: Apr 23, 2014


Read how organizations can improve breach readiness and cyber security maturity and see recommendations for areas with greatest opportunity for improvement.
Published: May 27, 2014


New business processes — and the adoption of new technologies within the workplace — are putting even more pressure on IT resources. The task of securing business data is now much harder and more complex.
At the same time, traditional protection tools are no longer adequate to defend businesses against...
Published: Apr 03, 2014


The Security Connected approach from McAfee helps companies implement layered security controls that block, detect, and defeat stealth attacks.
This solution guide provides an overview of the tools and controls that stop stealth attacks in real time; minimize manual correlation and response time; facilitate rapid...
Published: Jun 09, 2014


This paper explores the true TCO for self-signed SSL certificates, including a side-by-side comparison of a self-signed architecture versus working with a third-party SSL vendor. Before a company decides to use self-signed certificates, these issues deserve careful consideration.
Published: Jul 21, 2015


For several years now, Realtime has produced dozens and dozens of high‐quality books that just happen to be delivered in electronic format—at no cost to you, the reader. We’ve made this unique publishing model work through the generous support and cooperation of our sponsors, who agree to bear each book’s...
Published: Sep 23, 2014


Compliance and financial risk used to be the driving concerns for security and risk management. Audits and governance processes were predictable events that IT attempted to minimize and automate. Risk was a fairly static concept.
Published: May 29, 2013


Looking to buy a SIEM? Then you may be interested in learning about the financial benefits associated with the RSA NetWitness® evolved SIEM.
The Business Case for Evolved SIEM quantifies the potential value companies may realize by deploying the RSA solution. The business case is based on a study of 15 large...
Published: Jan 28, 2019