Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like IT, enterprise integration and open source.

Filter the library by ...
CLEAR

White Paper | Presented by Delta Risk

Cybersecurity Primer for Banking and Finance

As stated in a recent issue of the FDIC's Supervisory Insights, the risks presented by cyber attacks have become "one of the most critical challenges [in the last decade] facing the financial services sector due to the frequency and increasing sophistication of cyber attacks." In just a year's time, from 2014 to 2015, security incidents increased 38 percent.

White Paper | Presented by Delta Risk

Cyber Security Primer for Healthcare

Healthcare providers hold a special place in today's society. Most people count healthcare workers among the most admirable of professional jobs, and nearly everyone has to trust a healthcare professional with their lives or the lives of loved ones at some point. Nine out of every 10 American adults see doctor as a prestigious profession, for example, with older generations in particular holding it in high regard.

White Paper | Presented by Delta Risk

Top 10 Cyber Incident Pain Points: Are You Prepared?

Regardless of how many security controls are placed on a network and the components that go into making a network operate, there will always be vulnerabilities in a connected world. So, what do you do in an environment that allows for such risk of compromise?

eGuide | Presented by Delta Risk

What You Need To Know About Ransomware & HIPAA Compliance

There is no more hedging on whether ransomware incidents should be identified and treated the same way as other data breaches under the Health Insurance Portability and Accountability Act (HIPAA). The United States Department of Health and Human Services Office for Civil Rights (OCR) has stated that ransomware attacks constitute a breach unless there is substantial evidence to the contrary.

White Paper | Presented by Smarsh

3 Ways Text Messaging Exposes Government Organizations to Massive Risk

Texting is simple, concise and compatible with virtually every mobile device, operating system and wireless carrier - making it extremely accessible when a government official or employee wants to communicate with staff or community members in a time-crunched world. But even though text is easy, reliable and intuitive - if it's used for official business communications, it can create tremendous risk.

White Paper | Presented by Smarsh

Digital Record Management for Government

State, federal, and local government agencies need to keep important records (including digital communications) for a long time, to stay in compliance with public records laws, open meeting, Freedom of Information Act (FOIA), and various state sunshine laws. If an agency has email, social media, web and other digital communications related to business activities, records must be available to anyone who asks for them.

eBook | Presented by Safebreach

Get a Virtual Hacker on Your Squad

Can you answer the question "Are we secure?" If you're only as strong as your security defenses, understanding how well the controls that you've deployed will stand up to attackers is critical. This eBook looks at how breach simulations can quantify your security risks and continuously validate the efficacy of your security controls.

White Paper | Presented by Safebreach

Hacker's Playbook 2nd Edition

Download the SafeBreach Hacker's Playbook, the first report of its kind to report on enterprise security trends and issues from the perspective of an attacker. Incorporating analysis of more than 4 million breach methods executed in real-world enterprise deployments, you will learn how attackers view you as a target, the mistakes security teams are making in their organization, and best practices to stay secure.

How Analytics Optimize Migration to Amazon Web Services, Microsoft Azure and Other Public Clouds

The question of whether to transition enterprise applications to the cloud is a valid question in most organizations. Determining which applications should go and how to maintain control once they are there, however, is slowing down the journey to the cloud. Join us for this on-demand webinar featuring Torsten Volk, Managing Research Director of Hybrid Cloud at EMA, and Andrew Hillier, CTO at CiRBA.

White Paper | Presented by Safebreach

Learning From Hackers: Understanding Your Adversaries For Better Security

Cybersecurity has become one of the biggest challenge for organizations today. To better defend against attackers, organizations must better understand how they think and act. Read this whitepaper to understand the steps hackers take to breach an organization and how to defend with an offensive mindset.

Load More