Category Archives: – IT Security – All Papers

Downtime and Data Loss: How Much Can You Afford?

Learn the importance of establishing recovery time and recovery point objectives when planning a business continuity strategy. Aberdeen recently conducted a survey of IT professionals focused on the plans and processes that organizations adopt for continued business operations and recovery in case of a disaster. Download this Analyst Insight to […]

Read More

Modern Web Application Firewalls Fingerprinting and Bypassing XSS Filters

Web applications continue to be a primary attack vector for cyber-crimes, and the charts show no sign of abating. Vulnerabilities in web applications are a target and can be attributed to many problems and can damage a company. This means poor input validation, session management, insecure, system settings configured incorrectly […]

Read More

HITB Magazine – SVFORTH: A Forth for Security Analysis and Visualization

In this issue of HITB Magazine, you will find information on network security, database security, application security, computer forensics, computer security and mobile security. Also included in this issue are the following articles: Practical Attacks Against Encrypted VoIP Communications Hunting for OS X Rootkits in Memory Dynamic Tamper – Evidence […]

Read More

Security for E-Signatures and E-Transactions

Discover how to build effective, end-to-end security around your business tractions with electronic signature security. What is electronic signature security, and why is it important? What security is needed, and how much? How and when to apply security to electronic signatures, transactions and records? What techniques and methodologies will ensure […]

Read More

Web Application Defender’s Cookbook: Battling Hackers and Protecting Users–Free Sample Chapter

Defending your web applications against hackers and attackers. The top-selling book Web Application Hacker's Handbook showed how attackers and hackers identify and attack vulnerable live web applications. This new Web Application Defender's Cookbook is the perfect counterpoint to that book: it shows you how to defend. Authored by a highly credentialed defensive security expert, this […]

Read More

Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions–Free Sample Chapters

A must-have, hands-on guide for working in the cybersecurity profession! Cybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding of potential threats, such as viruses and other malicious code, as well as system vulnerability and security architecture. This essential book addresses cybersecurity strategies that include […]

Read More

Implementing CIFS: The Common Internet File System

The first developer’s guide to Microsoft®’s Internet/Intranet file sharing standard For years, developers and administrators have struggled to understand CIFS, Microsoft's poorly documented standard for Internet file sharing. Finally, there is an authoritative, cross-platform guide to CIFS capabilities and behavior. Implementing CIFS not only delivers the priceless knowledge of a […]

Read More

5 Strategies for Email Data Loss Prevention

The average employee sends and receives about 110 emails each day or 29,000 emails per year. One in every 20 of those emails contains “risky” data – from sensitive attachments to social security numbers to protected health information to valuable corporate secrets that set your organization apart. All of this […]

Read More

The Password Management Guide

By downloading this free guide, you agree to receive regular updates on the latest cool apps, product reviews, and giveaways from MakeUseOf. We are all overwhelmed by passwords. Everyone has an account for Google, Facebook, Twitter, LinkedIn, Outlook/Hotmail, Dropbox…the list goes on.  Unfortunately, most of us use either one password […]

Read More

Citrix XenServer 6.0 Administration Essential Guide–Free 34 Page Excerpt

Virtualization helps an organization reduce costs and achieve low maintenance. It is fast becoming an important skill for all administrators. Citrix’s XenServer is one of the leading virtualization solutions for enterprises and helps companies reduce costs while allowing them to integrate, automate and easily manage their datacenters. It comes with […]

Read More

Let Us Help You Help Your CIO

Why the manufacturing industry needs enterprise grade file sharing. You know how important information security and corporate compliance is to your organization, and how disruptive it is when employees work around IT to find their own productivity tools. Your employees need to securely share and control IP with partners, suppliers, […]

Read More

4 Smart Tips for Secure File Sharing and Improving Productivity

In today’s highly mobile work environment, your company’s intellectual property (IP), whether that’s patents, trade secrets or just employee know-how, may be more valuable than its physical assets. Sending IP outside your firewall can invite a data breach that could be extremely costly. This informative white paper describes 4 file […]

Read More

Fixing the Top 5 Compliance and Security Challenges in Hospitality

Best practices for hotels, restaurants and retail businesses. The number one technology issue faced by hospitality businesses today – including hotels, restaurants and retail stores — is compliance with the Payment Card Industry Data Security Standards (PCI DSS). This paper focuses on the top five compliance and security challenges hospitality […]

Read More

FFIEC Authentication Guidance: How to Conform to Combat Fraud

Fraud prevention best practices for IT professionals in banks and credit unions. The recent supplement to FFIEC authentication guidance for Internet banking puts renewed focus on compliance with the GLBA and the FFIEC guidelines. More importantly, this guidance offers the framework banks and credit unions need to develop an information […]

Read More

Take Action: Best Practices to Protect Against Targeted Malware

Download these best practices to prevent targeted and persistent threats. Only 12% of targeted malware was detected by traditional anti-virus solutions in 2011, based on investigations conducted by Trustwave SpiderLabs.Targeted attacks are highly successful because they focus on specific organizations and are crafted to elude traditional point product security controls, […]

Read More