Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like IT, enterprise integration and open source.

Filter the library by ...
CLEAR

White Paper | Presented by Delta Risk

Cybersecurity and the Board of Directors

A spate of high-profile, high-impact cyber breaches at several of the largest financial institutions in the United States has brought attention to a point that cybersecurity professionals have long taken as an article of faith: boards of directors need to take an active role in the management of cyber risk. Yet, there are several factors that tend to prevent effective engagement in cybersecurity risk at the board level.

White Paper | Presented by Delta Risk

Cybersecurity Primer for Banking and Finance

As stated in a recent issue of the FDIC's Supervisory Insights, the risks presented by cyber attacks have become "one of the most critical challenges [in the last decade] facing the financial services sector due to the frequency and increasing sophistication of cyber attacks." In just a year's time, from 2014 to 2015, security incidents increased 38 percent.

White Paper | Presented by Delta Risk

Cyber Security Primer for Healthcare

Healthcare providers hold a special place in today's society. Most people count healthcare workers among the most admirable of professional jobs, and nearly everyone has to trust a healthcare professional with their lives or the lives of loved ones at some point. Nine out of every 10 American adults see doctor as a prestigious profession, for example, with older generations in particular holding it in high regard.

White Paper | Presented by Delta Risk

Top 10 Cyber Incident Pain Points: Are You Prepared?

Regardless of how many security controls are placed on a network and the components that go into making a network operate, there will always be vulnerabilities in a connected world. So, what do you do in an environment that allows for such risk of compromise?

eGuide | Presented by Delta Risk

What You Need To Know About Ransomware & HIPAA Compliance

There is no more hedging on whether ransomware incidents should be identified and treated the same way as other data breaches under the Health Insurance Portability and Accountability Act (HIPAA). The United States Department of Health and Human Services Office for Civil Rights (OCR) has stated that ransomware attacks constitute a breach unless there is substantial evidence to the contrary.

Best Practices for Protecting Your Data When Employees Leave Your Company

When employees leave a company, whether voluntarily or involuntarily, it is quite common for them to take sensitive and confidential data with them, putting them at serious risk of data breaches, non-compliance with their regulatory obligations, and loss of intellectual property. This paper examines this problem in detail and provides solutions for employers to mitigate the risks.

White Paper | Presented by SureID

PIV-I and Mutlifactor Authentication: The Best Defense for Federal Government Contractors

In response to an unprecedented level of espionage and cyber attacks aimed at compromising critical government IT infrastructure-from networks to applications-the federal government last year announced new standards. Regulations have been enacted in 2016 to apply these standards to federal contractors and their subcontractors.

E-Learning Provider Reduces Liferay Development Time with JRebel

In this case study, learn how MSLC was able to view code changes instantly, eliminate redeployment wait time, and subsequently streamline application development and change management.

Rocket-Powered Java Development

Check out this 8-step guide to see how you can increase your productivity by skipping slow application redeploys and by implementing application profiling, as you code!

What Developers Want: The End of Application Redeploys

Eliminate application restarts in Java with JRebel! JRebel is a JVM plugin that eliminates application redeploys from the Java development cycle, a process that takes over 10 minutes of coding time away from developers each working hour.