LATEST ARTICLES

Penetration Testing: DIY or Hire a Pen Tester?

|

The best approach may be to do both: Hire a pen tester to get started, and learn to do it yourself for ongoing penetration testing. We give you everything you need to know about DIY and third-party pen testing.

READ MORE

Incident Response: How to Prepare for Attacks and Breaches

|

Make sure your organization is prepared for attacks and breaches by putting together an incident response plan and incident response team.

READ MORE

IaaS Security: Threats and Protection Methodologies

|

Cloud infrastructure services face unique security threats that require a variety of different protection methodologies.

READ MORE

How to Stop Ransomware

|

Ransomware is a fast-growing security threat. Here's how to prevent it - or get rid of it if you have it.

READ MORE

Securing MySQL DBMS

|

These steps can help you secure your deployment of the open source MySQL Community Server.

READ MORE

SECURITY DAILY NEWSLETTER

GET SECURITY NEWS IN YOUR INBOX EVERY DAY
|

How to Secure Devices in the Internet of Things

Internet of Things security brings its own unique challenges. With the variety of connected applications and devices in operation now in the hundreds of thousands, it's critical to ensure your IoT-related security standards are up to the task. In this white paper, Rob Black, CISSP Senior …

Business Perception of IT Security: In the Face of Inevitable Compromise

To investigate cyber threat landscape perception and reality, Kaspersky Lab together with B2B International conducted a global study of more than 4,000 business representatives from 25 countries. We asked businesses about their perceptions of the main security threats they face and the …

ESG Research Insights Paper: Network Security Trends

In the second half of 2016, Gigamon commissioned the Enterprise Strategy Group (ESG) to conduct a survey of 300 IT and cybersecurity professionals. Respondents to the survey all had responsibility and involvement in the planning, implementation, and/or operations of their organization's …

451 Research - A Deeper Dive into Hybrid Cloud Storage

This report from 451 Research examines the challenges faced by IT teams managing data in a hybrid cloud environment. It identifies key considerations in the areas of security, cost management and performance and provides recommendations for both cloud managers and administrators.
 
SEE ALL WHITEPAPERS
 
Considerations for Adding FIDO U2F to Your Security Protocol

Considerations for Adding FIDO U2F to Your Security Protocol

|

If you're considering using the FIDO U2F protocol, here's what you need to know.

READ MORE
Top 5 Rootkit Threats and How to Root Them out

Top 5 Rootkit Threats and How to Root Them out

|

Rootkits are tough to detect and tough to eradicate, making them an especially tricky security threat.

READ MORE
5 Essential IoT Security Best Practices

5 Essential IoT Security Best Practices

|

With IoT security top of mind in the wake of recent IoT-based attacks, here are four tips on improving your Internet of Things security measures.

READ MORE
How to Hire an Ethical Hacker

How to Hire an Ethical Hacker

|

An ethical hacker can help you find application security vulnerabilities. So how do you hire an ethical hacker?

READ MORE